@dblp

Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders.

, , and . CoRR, (2016)

Links and resources

Tags