Security Analysis. In this section, we discuss the security of our proposed protocol by analyzing some possible attacks, then evaluating the security of the protocol.
Appears in 2 contracts
Sources: Password Authenticated Key Agreement Protocol, Authenticated Key Agreement Protocol