Designing Security Protocols Adapted to the Constraints of Mobile Environments | IEEE Conference Publication | IEEE Xplore