Article,

Analyzing security protocols with secrecy types and logic programs.

, and .
J. ACM, 52 (1): 102-146 (2005)

Meta data

Tags

Users

  • @dblp

Comments and Reviews