D Bolignano - Proceedings of the 3rd ACM Conference on Computer …, 1996 - dl.acm.org
We present an approach to the verification of authentication protocols. The approach is
based on the use of general purpose formal methods. It is complementary with modal logic …