Cited By
View all- Lounis KZulkernine M(2020)Attacks and Defenses in Short-Range Wireless Technologies for IoTIEEE Access10.1109/ACCESS.2020.29935538(88892-88932)Online publication date: 2020
- Cremers CMauw SCremers CMauw S(2012)Historical Background and Further ReadingOperational Semantics and Verification of Security Protocols10.1007/978-3-540-78636-8_8(143-155)Online publication date: 2012
- Cremers CMauw Sde Vink E(2006)Injective synchronisation: An extension of the authentication hierarchyTheoretical Computer Science10.1016/j.tcs.2006.08.034367:1-2(139-161)Online publication date: Nov-2006
- Show More Cited By