Amadou KANE
International Journal of Information Security Science
2012-Cilt: 1 - Sayı: 3
88-99
Authentication, continued fraction, cryptography, Needham-Schroeder protocol
158 97