A Security Analysis Method for Security Protocol Implementations Based on Message Construction
Lu, Jintian, Yao, Lili, He, Xudong, Huang, Chintser, Wang, Dejun, Meng, BoVolume:
8
Journal:
Applied Sciences
DOI:
10.3390/app8122543
Date:
December, 2018
File:
PDF, 9.45 MB
2018