[1]
M. Boreale and D. Gorla, “Process calculi and the verification of security protocols”, JTIT, vol. 10, no. 4, pp. 28–40, Dec. 2002, doi: 10.26636/jtit.2002.4.147.