A logic for constraint-based security protocol analysis (0)

by R Corin, A Saptawijaya
Venue:in Proc. of IEEE Symposium on Security and Privacy