Login / Signup

Automated analysis of cryptographic protocols using Mur-phi.

John C. MitchellMark MitchellUlrich Stern
Published in: IEEE Symposium on Security and Privacy (1997)
Keyphrases