Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ccs/Cremers08a
%A Cremers, Cas J. F.
%B ACM Conference on Computer and Communications Security
%D 2008
%E Ning, Peng
%E Syverson, Paul F.
%E Jha, Somesh
%I ACM
%K dblp
%P 119-128
%T Unbounded verification, falsification, and characterization of security protocols by pattern refinement.
%U http://dblp.uni-trier.de/db/conf/ccs/ccs2008.html#Cremers08a
%@ 978-1-59593-810-7
@inproceedings{conf/ccs/Cremers08a,
added-at = {2018-11-06T00:00:00.000+0100},
author = {Cremers, Cas J. F.},
biburl = {https://www.bibsonomy.org/bibtex/2896e254b64b9ed0888f93e29c8873e47/dblp},
booktitle = {ACM Conference on Computer and Communications Security},
crossref = {conf/ccs/2008},
editor = {Ning, Peng and Syverson, Paul F. and Jha, Somesh},
ee = {https://doi.org/10.1145/1455770.1455787},
interhash = {32afef4670e2b489f4086b9fc669cb60},
intrahash = {896e254b64b9ed0888f93e29c8873e47},
isbn = {978-1-59593-810-7},
keywords = {dblp},
pages = {119-128},
publisher = {ACM},
timestamp = {2020-11-11T11:37:53.000+0100},
title = {Unbounded verification, falsification, and characterization of security protocols by pattern refinement.},
url = {http://dblp.uni-trier.de/db/conf/ccs/ccs2008.html#Cremers08a},
year = 2008
}