Up a level |
Alam, Q. and Tabbasum, S. and Malik, S.U.R. and Alam, M. and Ali, T. and Akhunzada, A. and Khan, S.U. and Vasilakos, A.V. and Buyya, R. (2016) Formal Verification of the xDAuth Protocol. IEEE Transactions on Information Forensics and Security, 11 (9). pp. 1956-1969. ISSN 1556-6013, DOI https://doi.org/10.1109/TIFS.2016.2561909.