Login / Signup

A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols.

Christoph SprengerDavid A. Basin
Published in: TPHOLs (2007)
Keyphrases
  • security protocols
  • cost effective
  • key management
  • cryptographic protocols