"Vulnerability detection of the authentication protocol in the IOT based on ..."

Shihong Chen (2023)

Details and statistics

DOI: 10.1504/IJAACS.2023.10034567

access: closed

type: Journal Article

metadata version: 2023-03-27

a service of  Schloss Dagstuhl - Leibniz Center for Informatics