Verification of the security of a secure network component | IEEE Conference Publication | IEEE Xplore