Login / Signup
Verifying Software Vulnerabilities in IoT Cryptographic Protocols.
Fatimah Aljaafari
Lucas C. Cordeiro
Mustafa A. Mustafa
Published in:
CoRR (2020)
Keyphrases
</>
cryptographic protocols
security vulnerabilities
security properties
management system
standard model
source code
computer systems
real time
security protocols
information security
cloud computing
e government
database
model checking
software architecture
software systems
lightweight
software development