A method for symbolic analysis of security protocols

From MaRDI portal
Publication:557806