@dblp

The Man-in-the-Middle Defence.

, and . Security Protocols Workshop, volume 5087 of Lecture Notes in Computer Science, page 153-156. Springer, (2006)

Links and resources

Tags