Proving security protocols with model checkers by data independence techniques
Main Author: | |
---|---|
Format: | Conference item |
Published: |
IEEE
1998
|
Main Author: | |
---|---|
Format: | Conference item |
Published: |
IEEE
1998
|