Last update: Sun Jan 6 02:01:01 MST 2019
@Article{Hagalisletto:2010:DAS,
author = "Anders Moen Hagalisletto and Lars Strand",
title = "Designing attacks on {SIP} call set-up",
journal = j-INT-J-APPL-CRYPTOGR,
volume = "2",
number = "1",
pages = "13--22",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1504/IJACT.2010.033795",
ISSN = "1753-0563 (print), 1753-0571 (electronic)",
ISSN-L = "1753-0563",
MRnumber = "2767307",
bibdate = "Fri Mar 17 10:02:54 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/ijact.bib",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Applied Cryptography. IJACT",
journal-URL = "http://www.inderscienceonline.com/loi/ijact",
}