Login / Signup
Modeling and Verification of WPA3 Security Protocol Based on SPIN.
Meihua Xiao
Shanshan Qiao
Tao Liu
Ke Yang
Zehuan Li
Dongming Zhan
Published in:
NCTCS (2023)
Keyphrases
</>
security protocols
automated design
authentication protocol
artificial immune algorithm
cryptographic protocols
databases
low cost
security services