Page 80 - IJEEE-2022-Vol18-ISSUE-1
P. 80
76 | Hamed & Yassin
Fig.4: Login and Authentication phase that cannot be Fig. 6: Model checking of the login and authentication
attacked
phase.
Figure 7 refers to the code of the login and authentication
phase.
Fig. 5: Login and authentication phase that can be attacked Fig. 7: The Proposed Scheme In SPDL-Scyther.
In the healthcare phase, we apply the same mechanism
to check the correctness, security, verification of this phase.
The figure 8 demonstrates the safety and security of the
healthcare phase.