Multi-attacker protocol validation.

dc.contributor.authorArsac, W.
dc.contributor.authorBella, Giampaolo
dc.contributor.authorChantry, X.
dc.contributor.authorCompagna, L.
dc.date.accessioned2010-08-04T10:54:14Z
dc.date.available2010-08-04T10:54:14Z
dc.date.issued2010
dc.identifier.citationArsac, W. et al. (2010) Multi-attacker protocol validation. Journal of Automated Reasoning, 46 (3-4), pp. 353-388.en
dc.identifier.doihttps://doi.org/10.1007/s10817-010-9185-y
dc.identifier.issn0168-7433
dc.identifier.urihttp://hdl.handle.net/2086/3964
dc.language.isoenen
dc.peerreviewedYesen
dc.publisherSpringeren
dc.ref2014.selected1367395509_1010680226037_11_1
dc.researchgroupSoftware Technology Research Laboratory (STRL)en
dc.titleMulti-attacker protocol validation.en
dc.typeArticleen

Files

License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
3.25 KB
Format:
Item-specific license agreed upon to submission
Description: