Analyzing security protocols with secrecy types and logic programs

From MaRDI portal
Publication:5178896