A formal analysis of authentication protocols for mobile devices in next generation networks

Mahdi Aiash. A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency - Practice and Experience, 27(12):2938-2953, 2015. [doi]

@article{Aiash15,
  title = {A formal analysis of authentication protocols for mobile devices in next generation networks},
  author = {Mahdi Aiash},
  year = {2015},
  doi = {10.1002/cpe.3260},
  url = {http://dx.doi.org/10.1002/cpe.3260},
  researchr = {https://researchr.org/publication/Aiash15},
  cites = {0},
  citedby = {0},
  journal = {Concurrency - Practice and Experience},
  volume = {27},
  number = {12},
  pages = {2938-2953},
}