July 2017
·
107 Reads
·
1 Citation
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
... However, the result demonstrates that Man in Middle attack may exist in the PKMv3 protocol. In [25], the PKMv3 has been formalized in an algebraic language called Maude. For verification, the authors considered the time features and the behavior of the intruders. ...
July 2017