@dblp

Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders.

, , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 450-470. Springer, (2016)

Links and resources

Tags