2005
An intruder model for verifying termination in security protocols
Publication
Publication
| Additional Metadata | |
|---|---|
| UT | |
| TR-CTIT | |
|
Cederquist, J. G. (2005). An intruder model for verifying termination in security protocols. TR-CTIT. UT. |
|