Formal methods for security protocols : three examples of the black-box approach

C.J.F. Cremers, S. Mauw, E.P. Vink, de

Research output: Contribution to journalArticleAcademicpeer-review

Original languageEnglish
Pages (from-to)21-32
JournalNieuwsbrief van de Nederlandse Vereniging voor Theoretische Informatica
Volume7
Publication statusPublished - 2003

Cite this