Cite
HARVARD Citation
Vossaert, J. et al. (2016). Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices. Security and communication networks. 9 (2), pp. 106-117. [Online].
This is an interim version of our Electronic Legal Deposit Catalogue-eJournals and eBooks while we continue to recover from a cyber-attack.
Vossaert, J. et al. (2016). Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices. Security and communication networks. 9 (2), pp. 106-117. [Online].