Download Zerrouki
More about this item Keywords physically unclonable function; authentication protocol; known-key attack; key-compromise impersonation; backward secrecy; All these keywords.Statistics Access and download statistics Corrections All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:22:p:4310-:d:975763. See general information about how to correct material in RePEc.
Download Zerrouki
Download File: https://www.google.com/url?q=https%3A%2F%2Fgohhs.com%2F2uioPi&sa=D&sntz=1&usg=AOvVaw1LubkTR5tnw8LUN1Njd40v
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: . 041b061a72