@dblp

The Man-in-the-Middle Defence.

. Security Protocols Workshop, volume 5087 of Lecture Notes in Computer Science, page 157-163. Springer, (2006)

Links and resources

Tags