@inproceedings{DBLP:conf/cav/Cremers08, author = {Cas J. F. Cremers}, title = {The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols}, booktitle = {CAV}, year = {2008}, pages = {414-418}, ee = {http://dx.doi.org/10.1007/978-3-540-70545-1_38}, crossref = {DBLP:conf/cav/2008}, bibsource = {DBLP, http://dblp.uni-trier.de} } @proceedings{DBLP:conf/cav/2008, editor = {Aarti Gupta and Sharad Malik}, title = {Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, NJ, USA, July 7-14, 2008, Proceedings}, booktitle = {CAV}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5123}, year = {2008}, isbn = {978-3-540-70543-7}, bibsource = {DBLP, http://dblp.uni-trier.de} }