Article,

A method for symbolic analysis of security protocols.

, and .
Theor. Comput. Sci., 338 (1-3): 393-425 (2005)

Meta data

Tags

Users

  • @dblp

Comments and Reviews