Application of dependency graphs to security protocol analysis
Tšahhirov, Ilja
;
Laud, Peeter
Trustworthy global computing
2008
/
p. 294-311 : ill
https://link.springer.com/chapter/10.1007/978-3-540-78663-4_20