Common use of Performance Analysis Clause in Contracts

Performance Analysis. ‌ We analyze the proposed solution in terms of the correctness, the security and the overall comparison with related solutions. For the security verification, we refer to [8,18–22] to evaluate session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that the proposed solution is safe when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks.

Appears in 2 contracts

Sources: Authenticated Key Agreement Scheme, Authenticated Key Agreement Scheme