[1]
S. Pranata, H. Nugroho, and H. Yamaki, “Analisis dan Implementasi Protokol Otentikasi FIDO U2F”, Ultima Computing : Jurnal Sistem Komputer, vol. 9, no. 1, pp. 30-35, Jun. 2017.