Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
2005 ◽
Vol 9
(4)
◽
pp. 372-374
◽
2004 ◽
Vol 28
(2)
◽
pp. 95-106
◽
2006 ◽
Vol 5
(9)
◽
pp. 2586-2593
◽
Keyword(s):