Article,

The Inductive Approach to Verifying Cryptographic Protocols.

.
J. Comput. Secur., 6 (1-2): 85-128 (1998)

Meta data

Tags

Users

  • @dirkachenbach
  • @giuliano.losa
  • @dblp

Comments and Reviews