Validating Security Protocols under the General Attacker

Publication Type:

Book Chapter

Source:

Foundations and Applications of Security Analysis, Springer, Berlin, Heidelberg, p.33-51 (2009)
Share/Save
Last updated: Tuesday, 04 April 2017