Analysing Security Protocols Using Refinement in iUML-B

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-319-57288-8_6
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer International Publishing