![An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture | EURASIP Journal on Wireless Communications and Networking | Full Text An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture | EURASIP Journal on Wireless Communications and Networking | Full Text](https://media.springernature.com/lw685/springer-static/image/art%3A10.1186%2Fs13638-021-02022-1/MediaObjects/13638_2021_2022_Fig5_HTML.png)
An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture | EURASIP Journal on Wireless Communications and Networking | Full Text
GitHub - binhnguyen1984/scyther-abstraction: The Scyther-abstraction Tool for the symbolic analysis of security protocols
Snapshot of SCYTHER tool: experimenting using various types of attacks | Download Scientific Diagram
![Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther - Mohammad - 2020 - International Journal of Communication Systems - Wiley Online Library Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther - Mohammad - 2020 - International Journal of Communication Systems - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/95c444cb-c6dc-418f-bf14-790872eb9447/dac4386-toc-0001-m.jpg)
Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther - Mohammad - 2020 - International Journal of Communication Systems - Wiley Online Library
![PDF] Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool | Semantic Scholar PDF] Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/df932f9db948e0e49c26a748ca2eec9d76e3c118/6-Figure4-1.png)
PDF] Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool | Semantic Scholar
![An online security protocol for NFC payment: Formally analyzed by the scyther tool | Semantic Scholar An online security protocol for NFC payment: Formally analyzed by the scyther tool | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/61b5fe2caec0f93bf4751a46d89d362bd3c0b8ce/7-Figure4-1.png)
An online security protocol for NFC payment: Formally analyzed by the scyther tool | Semantic Scholar
![Sensors | Free Full-Text | IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices | HTML Sensors | Free Full-Text | IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices | HTML](https://www.mdpi.com/sensors/sensors-20-06546/article_deploy/html/images/sensors-20-06546-g018.png)