Verification of security protocols with lists: From length one to unbounded length

Miriam Paiola, Bruno Blanchet. Verification of security protocols with lists: From length one to unbounded length. Journal of Computer Security, 21(6):781-816, 2013. [doi]

@article{PaiolaB13,
  title = {Verification of security protocols with lists: From length one to unbounded length},
  author = {Miriam Paiola and Bruno Blanchet},
  year = {2013},
  doi = {10.3233/JCS-130471},
  url = {http://dx.doi.org/10.3233/JCS-130471},
  researchr = {https://researchr.org/publication/PaiolaB13},
  cites = {0},
  citedby = {0},
  journal = {Journal of Computer Security},
  volume = {21},
  number = {6},
  pages = {781-816},
}