Ren, W., Yu, L., Ma, L., & Ren, Y. How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack. Wiley.
Chicago Style (17th ed.) CitationRen, Wei, Linchen Yu, Liangli Ma, and Yi Ren. How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending Against Ghost Compromising Attack. Wiley.
MLA (9th ed.) CitationRen, Wei, et al. How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending Against Ghost Compromising Attack. Wiley.
Warning: These citations may not always be 100% accurate.