Validating Security Protocols under the General Attacker

Publication Type:

Book Chapter

Source:

Foundations and Applications of Security Analysis, Springer, Berlin, Heidelberg, p.33-51 (2009)
Share/Save