//-->
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K., (2008)
E-business and telecommunications : 4th international conference ; revised selected papers
Filipe, Joaquim, (2008)
Design of a password-based EAP method
Manganaro, Andrea, (2008)
QoS-aware middleware for web services composition : a qualitative approach
Issa, Hassan, (2009)
Efficient sensor network management for asset localization
Soeanu, Andrei, (2018)