Reasoning about Resource-Bounded Knowledge Theory and Application to Security Protocol Analysis

  • Published 2004