CITATION STYLE
Cremers, C. J. F. (2008). The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5123 LNCS, pp. 414–418). https://doi.org/10.1007/978-3-540-70545-1_38
Mendeley helps you to discover research relevant for your work.