Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 1 Security analysis of the proposed scheme using Scyther during authentication phase

From: MDA: message digest-based authentication for mobile cloud computing

Role Sl.Num. Claim Status Comment
Mobile 1 secret A u t h_Key i Ok No Attacks
  2 secret SI Ok No Attacks
  3 secret password Ok No Attacks
  4 secret userID Ok No Attacks
  5 secret M D user Ok No Attacks
  6 secret M D cloud Ok No Attacks
  7 Alive Ok No Attacks
  8 Weakagree Ok No Attacks
  9 Niagree Ok No Attacks
  10 Nisynch Ok No Attacks
Cloud 1 secret A u t h_Key i Ok No Attacks
  2 secret password Ok No Attacks
  3 secret userID Ok No Attacks
  4 secret SI Ok No Attacks
  5 Alive Ok No Attacks
  6 Weakagree Ok No Attacks
  7 Niagree Ok No Attacks
  8 Nisynch Ok No Attacks