Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Attack trace generation of cryptographic protocols based on coloured Petri nets model
Yunli Bai; Xinming Ye
International Journal of Wireless and Mobile Computing (IJWMC), 2013 Vol.6 No.1, pp.91 - 97
10 - 15 =

Thank you for your feedback.