Verification of security protocols with lists: From length one to unbounded length

Miriam Paiola, Bruno Blanchet. Verification of security protocols with lists: From length one to unbounded length. Journal of Computer Security, 21(6):781-816, 2013. [doi]

Authors

Miriam Paiola

This author has not been identified. Look up 'Miriam Paiola' in Google

Bruno Blanchet

This author has not been identified. Look up 'Bruno Blanchet' in Google