An intruder model for verifying liveness in security protocols

J.G. Cederquist, Muhammad Torabi Dashti

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    11 Citations (Scopus)

    Fingerprint

    Dive into the research topics of 'An intruder model for verifying liveness in security protocols'. Together they form a unique fingerprint.