The Scyther Tool: Verification‚ Falsification‚ and Analysis of Security Protocols
C.J.F. Cremers
Details
Book Title |
Computer Aided Verification‚ 20th International Conference‚ CAV‚ Princeton‚ USA‚ Proc. |
Pages |
414–418 |
Publisher |
Springer |
Series |
Lecture Notes in Computer Science |
Volume |
5123/2008 |
Year |
2008 |
Links
DOI (10.1007/978-3-540-70545-1_38)
Related pages
People |