Towards the automated verification of cyber-physical security protocols: bounding the number of timed intruders
From MaRDI portal
Publication:2165489
DOI10.1007/978-3-319-45741-3_23zbMath1499.68053arXiv1605.08563OpenAlexW2395334218MaRDI QIDQ2165489
Carolyn L. Talcott, Vivek Nigam, Abraão Aires Urquiza
Publication date: 19 August 2022
Full work available at URL: https://arxiv.org/abs/1605.08563
Cryptography (94A60) Specification and verification (program logics, model checking, etc.) (68Q60) Computer security (68M25)
Related Items (4)
Protocol analysis with time ⋮ Protocol analysis with time and space ⋮ Quantitative Robustness Analysis of Sensor Attacks on Cyber-Physical Systems ⋮ A Symbolic Framework to Analyse Physical Proximity in Security Protocols
This page was built for publication: Towards the automated verification of cyber-physical security protocols: bounding the number of timed intruders