Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Veronique Cortier, Stephanie Delaune, Jannik Dreier

Journal title: Computer Security – ESORICS 2020

Journal publisher: Springer

Published year: 2020

DOI identifier: 10.1007/978-3-030-59013-0_1