<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wihem Arsac</style></author><author><style face="normal" font="default" size="100%">Giampaolo Bella</style></author><author><style face="normal" font="default" size="100%">Xavier Chantry</style></author><author><style face="normal" font="default" size="100%">Luca Compagna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Validating Security Protocols under the General Attacker</style></title><secondary-title><style face="normal" font="default" size="100%">Foundations and Applications of Security Analysis</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Berlin, Heidelberg</style></pub-location><pages><style face="normal" font="default" size="100%">33-51</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>