Skip to main content

Verifying layered security protocols

Thomas Gibson−Robinson‚ Allaa Kamil and Gavin Lowe

Journal
Journal of Computer Security
Number
3
Pages
259–307
Volume
23
Year
2015