DMCA

A Computational Logic-based approach to security protocols verification, and its application to the Needham-Schroeder Public Key authentication protocol

by Marco Gavanelli , Mgavanelli Ing. Unife. It , Evelina Lamma , Paola Mello , Pmello Deis. Unibo. It , Paolo Torroni