Sign in

Verifying multicast-based security protocols using the inductive method.

Jean Everson MartinaLawrence C. Paulson
Published in: Int. J. Inf. Sec. (2015)
Keyphrases
  • databases
  • information systems
  • database systems