Impersonation attacks on a mobile security protocol for end-to-end communications
- Reiner Dojen
- , Vladimir Pasca
- , Tom Coffey
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review