An Intruder Model for Verifying Termination in Security Protocols

J.G. Cederquist, M.T. Dashti

    Research output: Book/ReportReportProfessional

    54 Downloads (Pure)

    Fingerprint

    Dive into the research topics of 'An Intruder Model for Verifying Termination in Security Protocols'. Together they form a unique fingerprint.