Using Horn Clauses for Analyzing Security Protocols

Bruno Blanchet. Using Horn Clauses for Analyzing Security Protocols. In Véronique Cortier, Steve Kremer, editors, Formal Models and Techniques for Analyzing Security Protocols. Volume 5 of Cryptology and Information Security Series, pages 86-111, IOS Press, 2011. [doi]

Abstract

Abstract is missing.