Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project

Jan Jürjens. Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project. Electronic Notes in Theoretical Computer Science, 250(1):123-136, 2009. [doi]

@article{Jurjens09-0,
  title = {Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project},
  author = {Jan Jürjens},
  year = {2009},
  doi = {10.1016/j.entcs.2009.08.009},
  url = {http://dx.doi.org/10.1016/j.entcs.2009.08.009},
  tags = {protocol, security},
  researchr = {https://researchr.org/publication/Jurjens09-0},
  cites = {0},
  citedby = {0},
  journal = {Electronic Notes in Theoretical Computer Science},
  volume = {250},
  number = {1},
  pages = {123-136},
}