Cite
APA Citation
Vossaert, J., Lapon, J., De Decker, B., & Naessens, V. (2016). symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices. Security and communication networks, 9(2), 106–117. http://access.bl.uk/ark:/81055/vdc_100028118606.0x000017