Verification of security protocols with lists: From length one to unbounded length.
Autor: | Paiola, Miriam1, Blanchet, Bruno1 |
---|---|
Zdroj: | Journal of Computer Security. 2013, Vol. 21 Issue 6, p781-816. 36p. |
Databáze: | Business Source Ultimate |
Externí odkaz: |