Verification of security protocols with lists: From length one to unbounded length

Miriam Paiola, Bruno Blanchet. Verification of security protocols with lists: From length one to unbounded length. Journal of Computer Security, 21(6):781-816, 2013. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.