ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2001.09837
  4. Cited By
Verifying Software Vulnerabilities in IoT Cryptographic Protocols

Verifying Software Vulnerabilities in IoT Cryptographic Protocols

27 January 2020
Fatimah Aljaafari
Lucas C. Cordeiro
Mustafa A. Mustafa
ArXivPDFHTML

Papers citing "Verifying Software Vulnerabilities in IoT Cryptographic Protocols"

1 / 1 papers shown
Title
Extracting and Verifying Cryptographic Models from C Protocol Code by
  Symbolic Execution
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Mihhail Aizatulin
Andrew D. Gordon
Jan Jurjens
66
66
0
06 Jul 2011
1