Lu, J., Yao, L., He, X., Huang, C., Wang, D., & Meng, B. (2018, December). A Security Analysis Method for Security Protocol Implementations Based on Message Construction. Applied Sciences.
Chicago Style (17th ed.) CitationLu, Jintian, Lili Yao, Xudong He, Chintser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method for Security Protocol Implementations Based on Message Construction." Applied Sciences Dec. 2018.
MLA (9th ed.) CitationLu, Jintian, et al. "A Security Analysis Method for Security Protocol Implementations Based on Message Construction." Applied Sciences, Dec. 2018.
Warning: These citations may not always be 100% accurate.
