Mahdi Aiash. A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency - Practice and Experience, 27(12):2938-2953, 2015. [doi]
@article{Aiash15, title = {A formal analysis of authentication protocols for mobile devices in next generation networks}, author = {Mahdi Aiash}, year = {2015}, doi = {10.1002/cpe.3260}, url = {http://dx.doi.org/10.1002/cpe.3260}, researchr = {https://researchr.org/publication/Aiash15}, cites = {0}, citedby = {0}, journal = {Concurrency - Practice and Experience}, volume = {27}, number = {12}, pages = {2938-2953}, }