"Using Interpolation for the Verification of Security Protocols."

Marco Rocchetto et al. (2013)
a service of Schloss Dagstuhl - Leibniz Center for Informatics