On vulnerability analysis of several password authentication protocols
Crossref DOI link: https://doi.org/10.1007/s11334-015-0250-x
Published Online: 2015-06-18
Published Print: 2015-09
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Garrett, Keith
Talluri, S. Raghu
Roy, Swapnoneel
Text and Data Mining valid from 2015-06-18