Showing 1 - 1 results of 1 for search '"identity authentication protocol"', query time: 0.03s Refine Results
  1. 1

    Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA

    Published 2013-08-01
    Subjects: “…identity authentication protocol…”
    Get full text
    Article