Common use of Security and functionality analysis Clause in Contracts

Security and functionality analysis. In this section, we analyze the security and functionality of the proposed protocol to verify whether the essential security and func- tionality requirements mentioned in Section 1 have been satisfied. In order to examine the proposed protocol further, we compared it with the other related protocols [3, 6, 19] in Table 2.

Appears in 2 contracts

Sources: Research Paper, Chaotic Maps Based Mutual Authentication and Key Agreement Using Smart Cards for Wireless Communications