The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step.
The paper deals with the authentication protocol analysis using Scyter. The paper also includes a case-study that shows the analysis process step-by-step. (en)