Sign in

An interpolation-based method for the verification of security protocols.

Marco RocchettoLuca ViganòMarco Volpe
Published in: J. Comput. Secur. (2017)
Keyphrases
  • response time
  • sensor data