Verification of security protocols with lists: From length one to unbounded length.

Autor: Paiola, Miriam1, Blanchet, Bruno1
Zdroj: Journal of Computer Security. 2013, Vol. 21 Issue 6, p781-816. 36p.
Databáze: Business Source Ultimate