Stem scyther$ (all stems)
1 papers:
CAV-2008-Cremers #analysis #protocol #security #verification- The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (CJFC), pp. 414–418.
CAV-2008-Cremers #analysis #protocol #security #verification