Showing 1 - 1 results of 1 for search 'Zheng Yin (Middle Tang)', query time: 0.01s Refine Results
  1. 1
    ... of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM...
    Get full text
    Thesis