Using Horn Clauses for Analyzing Security Protocols

Publication Type:

Book Chapter

Source:

Formal Models and Techniques for Analyzing Security Protocols, IOS Press, Amsterdam, p.86-111 (2011)
Share/Save