Security and functionality analysis. In this section, we analyze the security and functionality of the proposed protocol to verify whether the essential security and func- tionality requirements mentioned in Section 1 have been satisfied. In order to examine the proposed protocol further, we compared it with the other related protocols [3, 6, 19] in Table 2.
Appears in 2 contracts
Sources: Research Paper, Chaotic Maps Based Mutual Authentication and Key Agreement Using Smart Cards for Wireless Communications