![Sensors | Free Full-Text | Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone | HTML Sensors | Free Full-Text | Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone | HTML](https://www.mdpi.com/sensors/sensors-21-02057/article_deploy/html/images/sensors-21-02057-g006.png)
Sensors | Free Full-Text | Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone | HTML
![Result using 'automatic claim' procedure in Scyther tool (see online... | Download Scientific Diagram Result using 'automatic claim' procedure in Scyther tool (see online... | Download Scientific Diagram](https://www.researchgate.net/profile/Samaher-Al-Janabi/publication/306921207/figure/fig2/AS:429792861396992@1479482011002/Result-using-automatic-claim-procedure-in-Scyther-tool-see-online-version-for-colours.png)
Result using 'automatic claim' procedure in Scyther tool (see online... | Download Scientific Diagram
![The results using 'verification claim' procedure in Scyther tool (see... | Download Scientific Diagram The results using 'verification claim' procedure in Scyther tool (see... | Download Scientific Diagram](https://www.researchgate.net/profile/Samaher-Al-Janabi/publication/306921207/figure/fig1/AS:429792857202689@1479482010942/The-results-using-verification-claim-procedure-in-Scyther-tool-see-online-version-for.png)
The results using 'verification claim' procedure in Scyther tool (see... | Download Scientific Diagram
![Mathematics | Free Full-Text | BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things | HTML Mathematics | Free Full-Text | BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things | HTML](https://www.mdpi.com/mathematics/mathematics-09-03241/article_deploy/html/images/mathematics-09-03241-g006.png)
Mathematics | Free Full-Text | BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things | HTML
![The results using 'verification claim' procedure in Scyther tool (see... | Download Scientific Diagram The results using 'verification claim' procedure in Scyther tool (see... | Download Scientific Diagram](https://www.researchgate.net/profile/Samaher-Al-Janabi/publication/306921207/figure/fig1/AS:429792857202689@1479482010942/The-results-using-verification-claim-procedure-in-Scyther-tool-see-online-version-for_Q320.jpg)
The results using 'verification claim' procedure in Scyther tool (see... | Download Scientific Diagram
![PDF] Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool | Semantic Scholar PDF] Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/df932f9db948e0e49c26a748ca2eec9d76e3c118/6-Figure4-1.png)
PDF] Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool | Semantic Scholar
![An online security protocol for NFC payment: Formally analyzed by the scyther tool | Semantic Scholar An online security protocol for NFC payment: Formally analyzed by the scyther tool | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/61b5fe2caec0f93bf4751a46d89d362bd3c0b8ce/7-Figure4-1.png)
An online security protocol for NFC payment: Formally analyzed by the scyther tool | Semantic Scholar
![On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments | SpringerLink On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments | SpringerLink](https://media.springernature.com/lw685/springer-static/image/art%3A10.1007%2Fs12652-020-02465-2/MediaObjects/12652_2020_2465_Fig4_HTML.png)
On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments | SpringerLink
![Applied Sciences | Free Full-Text | An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme | HTML Applied Sciences | Free Full-Text | An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme | HTML](https://www.mdpi.com/applsci/applsci-11-02082/article_deploy/html/images/applsci-11-02082-g011.png)