Source: MOSTWiedzy.pl - publication "An integrated method for security protocols analysis" link open in new tab
link open in new tab