Login / Signup

A formal analysis of authentication protocols for mobile devices in next generation networks.

Mahdi Aiash
Published in: Concurr. Comput. Pract. Exp. (2015)
Keyphrases