Page 81 - IJEEE-2022-Vol18-ISSUE-1
P. 81
Hamed & Yassin | 77
Fig. 8: Healthcare phase that cannot be attacked. Fig.10: Model checking of the healthcare phase.
Figure 9 demonstrates the result of a safe system without
faultless cryptographic mechanisms. As a result, this method
becomes subject to malicious assaults and is rendered
unsecure (see Figure 10).
Fig. 9: Healthcare phase that can be attacked.
Fig. 11: The Proposed Scheme In SPDL-Scyther