Skip to main content

Model checking cryptographic protocols subject to combinatorial attack

A.W. Roscoe‚ T. Smyth and L. Nguyen

Year
2012