How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack

Wei Ren, Linchen Yu, Liangli Ma, Yi Ren. How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack. IJDSN, 2013, 2013. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.