//-->
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K., (2008)
A security hardening language based on aspect-orientation
Mourad, Azzam, (2008)
E-business and telecommunications : 4th international conference ; revised selected papers
Filipe, Joaquim, (2008)