Verification of Security Protocols with Lists: From Length One to Unbounded Length

Miriam Paiola, Bruno Blanchet. Verification of Security Protocols with Lists: From Length One to Unbounded Length. In Pierpaolo Degano, Joshua D. Guttman, editors, Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings. Volume 7215 of Lecture Notes in Computer Science, pages 69-88, Springer, 2012. [doi]

@inproceedings{PaiolaB12,
  title = {Verification of Security Protocols with Lists: From Length One to Unbounded Length},
  author = {Miriam Paiola and Bruno Blanchet},
  year = {2012},
  doi = {10.1007/978-3-642-28641-4_5},
  url = {http://dx.doi.org/10.1007/978-3-642-28641-4_5},
  researchr = {https://researchr.org/publication/PaiolaB12},
  cites = {0},
  citedby = {0},
  pages = {69-88},
  booktitle = {Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings},
  editor = {Pierpaolo Degano and Joshua D. Guttman},
  volume = {7215},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-28640-7},
}