Cited By
View all- Bauereiβ TPesenti Gritti APopescu ARaimondi F(2018)CoSMedJournal of Automated Reasoning10.1007/s10817-017-9443-361:1-4(113-139)Online publication date: 1-Jun-2018
- Chadha RSistla AViswanathan MAceto LIngólfsdóttir A(2017)Verification of randomized security protocolsProceedings of the 32nd Annual ACM/IEEE Symposium on Logic in Computer Science10.5555/3329995.3330061(1-12)Online publication date: 20-Jun-2017
- Basin DCremers CDreier JSasse R(2017)Symbolically analyzing security protocols using tamarinACM SIGLOG News10.1145/3157831.31578354:4(19-30)Online publication date: 3-Nov-2017
- Show More Cited By