Proving Security Protocols with Model Checkers by Data Independence Techniques

A. W. Roscoe, Philippa J. Broadfoot. Proving Security Protocols with Model Checkers by Data Independence Techniques. Journal of Computer Security, 7(1):147-190, 1999.

Abstract

Abstract is missing.