1. Kwon, S., Choim, H.K.: Evolution of Wi-Fi protected access: security challenges. IEEE Consum. Electron. Mag. 99, 1–1 (2020)
2. Ting, C., Guozheng, W., Liu, Z., Geguang, P., Zhao, R., Liu, K.: Analysis of NSFC formal methods field fund applications. Prospective Technol. 2(01), 132–140 (2023)
3. Tian, C., Deng, Y., Jiang, Y.: Introduction to the special topic on formal methods and applications. J. Soft. 32(06) (2021)
4. Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Soft. Concepts Tools. 17, 93–102 (1996)
5. Vanhoef, M., Piessens, F.: Key reinstallation attacks: Forcing nonce reuse in WPA2. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM (2017)