(2012). Modeling Adversaries in a Logic for Security Protocol Analysis. Logical Methods in Computer Science.
Successfully copied to clipboard
Copying to clipboard failed
Chicago Style (17th ed.) Citation
"Modeling Adversaries in a Logic for Security Protocol Analysis."
Logical Methods in Computer Science 2012.
Successfully copied to clipboard
Copying to clipboard failed
MLA (9th ed.) Citation
"Modeling Adversaries in a Logic for Security Protocol Analysis."
Logical Methods in Computer Science, 2012.
Successfully copied to clipboard
Copying to clipboard failed
Warning: These citations may not always be 100% accurate.