作者: Cas Cremers , Sjouke Mauw
DOI: 10.1007/978-3-540-78636-8_8
关键词: Horn clause 、 Reading (process) 、 Cover (telecommunications) 、 Model checking 、 Authentication protocol 、 Cryptographic protocol 、 Programming language 、 Computer science
摘要: We provide historical background on our approach, we give pointers for further reading and describe alternative approaches. only cover those approaches that are closely related to ours.