How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack

Wei Ren, Linchen Yu, Liangli Ma, Yi Ren. How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack. IJDSN, 2013, 2013. [doi]