A Compositional Logic for Proving Security Properties of Protocols*

Journal of Computer Security - Netherlands
doi 10.3233/jcs-2003-11407