To infinity and beyond or, avoiding the infinite in security protocol analysis

James Heather, Steve Schneider. To infinity and beyond or, avoiding the infinite in security protocol analysis. In Hisham Haddad, editor, Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006. pages 346-353, ACM, 2006. [doi]

Abstract

Abstract is missing.