DMCA
A Computational Logic-based approach to security protocols verification, and its application to the Needham-Schroeder Public Key authentication protocol
by
Marco Gavanelli
,
Mgavanelli Ing. Unife. It
,
Evelina Lamma
,
Paola Mello
,
Pmello Deis. Unibo. It
,
Paolo Torroni