Analyzing Protocol Implementations Publication details Part of: Information Security Practice and Experience (Springer, 2009) Pages: 171–182 Year: 2009 You are here: Home Publications Scientific chapter / article / conference article Analyzing Protocol Implementations