Login / Signup

Modeling and Verification of WPA3 Security Protocol Based on SPIN.

Meihua XiaoShanshan QiaoTao LiuKe YangZehuan LiDongming Zhan
Published in: NCTCS (2023)
Keyphrases
  • security protocols
  • automated design
  • authentication protocol
  • artificial immune algorithm
  • cryptographic protocols
  • databases
  • low cost
  • security services