CITATION STYLE
Steel, G., Bundy, A., & Denney, E. (2006). Using the CORAL System to Discover Attacks on Security Protocols. In Computer Systems (pp. 279–285). Springer-Verlag. https://doi.org/10.1007/0-387-21821-1_42
Mendeley helps you to discover research relevant for your work.