Article,

An interpolation-based method for the verification of security protocols.

, , and .
Journal of Computer Security, 25 (6): 463-510 (2017)

Meta data

Tags

Users

  • @dblp

Comments and Reviews