ZM Fadlullah, T Taleb, AV Vasilakos, M Guizani… - IEEE/ACM Transactions …, 2010 - infona.pl
The unbridled growth of the Internet and the network-based applications has contributed to
enormous security leaks. Even the cryptographic protocols, which are used to provide …