@inproceedings{kurkowski:hal-01496073, TITLE = {{Using Backward Induction Techniques in (Timed) Security Protocols Verification}}, AUTHOR = {Kurkowski, Miroslaw and Siedlecka-Lamch, Olga and Dudek, Pawel}, URL = {https://inria.hal.science/hal-01496073}, NOTE = {Part 5: Various Aspects of Computer Security}, BOOKTITLE = {{12th International Conference on Information Systems and Industrial Management (CISIM)}}, ADDRESS = {Krakow, Poland}, EDITOR = {Khalid Saeed and Rituparna Chaki and Agostino Cortesi and Slawomir Wierzcho{\'n}}, PUBLISHER = {{Springer}}, SERIES = {Computer Information Systems and Industrial Management}, VOLUME = {LNCS-8104}, PAGES = {265-276}, YEAR = {2013}, MONTH = Sep, DOI = {10.1007/978-3-642-40925-7\_25}, KEYWORDS = {Security Protocols Verification ; Backward Induction}, PDF = {https://inria.hal.science/hal-01496073/file/978-3-642-40925-7_25_Chapter.pdf}, HAL_ID = {hal-01496073}, HAL_VERSION = {v1}, }