Author of the publication

Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders.

, , and . CoRR, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic Timed Observational Equivalence., , and . CoRR, (2018)Reasoning about effects: from lists to cyber-physical agents., and . CoRR, (2018)A formal model for reasoning about adaptive QoS-enabled middleware., , and . ACM Trans. Softw. Eng. Methodol., 13 (1): 86-147 (2004)A semantic model for safe protocol interaction., , and . SAC, page 1599-1600. ACM, (2006)Representing and Simulating Protein Functional Domains in Signal Transduction Using Maude., , , , and . CMSB, volume 2602 of Lecture Notes in Computer Science, page 164-165. Springer, (2003)Reasoning About Programs with Effects., and . PLILP, volume 456 of Lecture Notes in Computer Science, page 189-203. Springer, (1990)Eos: An Approach of Using Behavior Implications for Policy-Based Self-Management., , and . DSOM, volume 2867 of Lecture Notes in Computer Science, page 16-27. Springer, (2003)Towards a Theory of Mechanizable Theories: I, FOL Contexts: The Extensional View., and . ECAI, page 634-639. (1990)A Compositional Framework for Preference-Aware Agents., , and . V2CPS@IFM, volume 232 of EPTCS, page 21-35. (2016)Program Transformation via Contextual Assertions., and . Logic, Language and Computation, volume 792 of Lecture Notes in Computer Science, page 225-254. Springer, (1994)