Modeling Adversaries in a Logic for Security Protocol Analysis
Logical Methods in Computer Science - Germany
doi 10.2168/lmcs-8(1:21)2012
Full Text
Open PDFAbstract
Available in full text
Date
March 9, 2012
Authors
Publisher
Logical Methods in Computer Science e.V.