Verifying multicast-based security protocols using the inductive method
Crossref DOI link: https://doi.org/10.1007/s10207-014-0251-z
Published Online: 2014-08-08
Published Print: 2015-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Martina, Jean Everson
Paulson, Lawrence Charles
Text and Data Mining valid from 2014-08-08