Using Horn Clauses for Analyzing Security Protocols (bibtex)
by Bruno Blanchet
Reference:
Using Horn Clauses for Analyzing Security Protocols (Bruno Blanchet), Chapter in Formal Models and Techniques for Analyzing Security Protocols (Véronique Cortier, Steve Kremer, eds.), IOS Press, volume 5, 2011.
Bibtex Entry:
@InCollection{BlanchetBook09,
  author = 	 {Bruno Blanchet},
  title = 	 {Using {H}orn Clauses for Analyzing Security Protocols},
  booktitle = 	 {Formal Models and Techniques for Analyzing Security Protocols},
  publisher = {IOS Press},
  pages = {86--111},
  volume = 	 5,
  series = 	 {Cryptology and Information Security Series},
  month = 	 mar,
  year = 	 2011,
  editor = 	 {V{\'e}ronique Cortier and Steve Kremer},
  isbn = {978-1-60750-713-0},
  url = {http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetBook09.pdf},
  PDF = {http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetBook09.pdf}
}
Powered by bibtexbrowser