Author of the publication

A Heuristic State Space Search Model for Security Protocol Verification.

, , and . ICETE (2), page 113-118. INSTICC Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Analysis of Human-Assisted Smart City Emergency Services., , , and . IEEE Access, (2019)Modeling Operator Performance in Human-in-the-Loop Autonomous Systems.. IEEE Access, (2021)Analysis of In-vehicle Security System of Smart Vehicles., , and . FNSS, volume 1113 of Communications in Computer and Information Science, page 198-211. Springer, (2019)Dual Connectivity-Based Mobility Management and Data Split Mechanism in 4G/5G Cellular Networks., , , and . IEEE Access, (2020)Modeling and Analyzing MAC Frame Aggregation Techniques in 802.11n Using Bi-dimensional Markovian Model., and . NDT (1), volume 293 of Communications in Computer and Information Science, page 408-419. Springer, (2012)Design and implementation of reliable auctioning algorithms for multi-robot systems., , and . ICACCI, page 288-293. IEEE, (2013)Logic-Based Formal Analysis of Cryptographic Protocols., , and . ICON, page 1-6. IEEE, (2006)Model Checking Based Unmanned Aerial Vehicle (UAV) Security Analysis., , and . ICCSPA, page 1-6. IEEE, (2020)Applying authentication tests to discover Man-In-The-Middle attack in security protocols.. ICDIM, page 35-40. IEEE, (2013)AnimalWeb: A Large-Scale Hierarchical Dataset of Annotated Animal Faces., , , , , , , and . CVPR, page 6937-6946. Computer Vision Foundation / IEEE, (2020)