Login / Signup
An interpolation-based method for the verification of security protocols.
Marco Rocchetto
Luca Viganò
Marco Volpe
Published in:
J. Comput. Secur. (2017)
Keyphrases
</>
response time
sensor data