Using the coral System to Discover Attacks on Security Protocols

Research output: Chapter in Book/Report/Conference proceedingChapter

Original languageEnglish
Title of host publicationComputer Systems: Theory, Technology and Applications
EditorsA. Herbert, K. Sp¨arck Jones
PublisherSpringer
ISBN (Print)0-387-20170-X
Publication statusPublished - 2004

Cite this