Analysis of security protocols based on challenge-response

From MaRDI portal
Publication:2372525