Miriam Paiola, Bruno Blanchet. Verification of security protocols with lists: From length one to unbounded length. Journal of Computer Security, 21(6):781-816, 2013. [doi]
No references recorded for this publication.
No citations of this publication recorded.