Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders
2008 ◽
Vol 75
(1)
◽
pp. 3-51
◽
2016 ◽
Vol 2
(1)
◽
pp. 78
Keyword(s):
Keyword(s):