1.
Rajanna P, Renukamba Sunitha N. Security Analysis of Biometric Verification Protocol Using Scyther Model Checker: A Case Study. Curr. Appl. Sci. Technol. [internet]. 2025 May 8 [cited 2025 Dec. 8];25(6):e0257532. available from: https://li01.tci-thaijo.org/index.php/cast/article/view/257532