Research Article

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace

Figure 2

The Needham-Schroeder protocol.