Modeling Adversaries in a Logic for Security Protocol Analysis

Logical Methods in Computer Science - Germany
doi 10.2168/lmcs-8(1:21)2012
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Logical Methods in Computer Science e.V.


Related search