Article,

Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders.

, , and .
CoRR, (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews