[1]
A. ADEBOWALE, N. GOGA, O. OLUWABUKOLA, and A. SAMUEL, “Formal Methods in Information Security”, IJCT, vol. 14, no. 4, pp. 5621–5631, Feb. 2015.