Login / Signup

Analysing a stream authentication protocol using model checking.

Philippa J. HopcroftGavin Lowe
Published in: Int. J. Inf. Sec. (2004)
Keyphrases