• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Modeling and Verification of WPA3 Security Protocol Based on SPIN.

Meihua XiaoShanshan QiaoTao LiuKe YangZehuan LiDongming Zhan
Published in: NCTCS (2023)
Keyphrases
  • security protocols
  • automated design
  • authentication protocol
  • artificial immune algorithm
  • cryptographic protocols
  • databases
  • low cost
  • security services