Cited By
View all- Chadha RCheval VCiobâcă ŞKremer S(2016)Automated Verification of Equivalence Properties of Cryptographic ProtocolsACM Transactions on Computational Logic (TOCL)10.1145/292671517:4(1-32)Online publication date: 20-Sep-2016
- Baudet MCortier VDelaune S(2013)YAPAACM Transactions on Computational Logic (TOCL)10.1145/2422085.242208914:1(1-32)Online publication date: 1-Feb-2013
- Comon-Lundh H(2008)Challenges in the Automated Verification of Security ProtocolsProceedings of the 4th international joint conference on Automated Reasoning10.1007/978-3-540-71070-7_34(396-409)Online publication date: 12-Aug-2008
- Show More Cited By