Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 7042835, 15 pages
https://doi.org/10.1155/2017/7042835
Research Article

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace

1Computer School of Wuhan University, Wuhan 430072, China
2Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, Wuhan University, Wuhan 430072, China

Correspondence should be addressed to Huanguo Zhang; nc.ude.uhw@ssil

Received 6 May 2017; Revised 12 August 2017; Accepted 20 August 2017; Published 18 October 2017

Academic Editor: Jiankun Hu

Copyright © 2017 Fusheng Wu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

How to Cite this Article

Fusheng Wu, Huanguo Zhang, Wengqing Wang, Jianwei Jia, and Shi Yuan, “A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace,” Security and Communication Networks, vol. 2017, Article ID 7042835, 15 pages, 2017. https://doi.org/10.1155/2017/7042835.