Using Backward Induction Techniques in (Timed) Security Protocols Verification

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-40925-7_25
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer Berlin Heidelberg


Related search