[1]
Boreale, M. and Gorla, D. 2002. Process calculi and the verification of security protocols. Journal of Telecommunications and Information Technology. 10, 4 (Dec. 2002), 28–40. DOI:https://doi.org/10.26636/jtit.2002.4.147.