[1]
S. Pranata, H. T. Nugroho, and H. Yamaki, “Analisis dan Implementasi Protokol Otentikasi FIDO U2F”, ULTIMA Computing, vol. 9, no. 1, pp. 30–35, Jun. 2017.