Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

e-coupons: An Efficient, Secure and Delegable Micro-Payment System., and . Inf. Syst. Frontiers, 7 (4-5): 371-389 (2005)Mapping Linear Recurrence Equations onto Systolic Architectures., , and . Int. J. High Speed Comput., 8 (3): 229-270 (1996)Landcoin: A Practical Protocol for Transfer-of-Asset., and . ICISS, volume 13146 of Lecture Notes in Computer Science, page 124-141. Springer, (2021)Correctness proof for the majority consensus algorithm., and . Inf. Sci., 38 (3): 213-227 (1986)Static Security Certification of Programs via Dynamic Labelling., , and . ICETE (2), page 400-411. SciTePress, (2018)Opacity Proof for CaPR+ Algorithm., , and . CoRR, (2015)Security and protection of SCADA: a bigdata algorithmic approach.. SIN, page 20-27. ACM, (2013)A Graphical Environment for the Specification and Verification of Reactive Systems., , , and . SAFECOMP, volume 1698 of Lecture Notes in Computer Science, page 431-444. Springer, (1999)Compositional Semantics for Real-time Distributed Computing., , , , and . Logic of Programs, volume 193 of Lecture Notes in Computer Science, page 167-189. Springer, (1985)A Proof System for a PGAS Language., and . Concurrency, Compositionality, and Correctness, volume 5930 of Lecture Notes in Computer Science, page 162-184. Springer, (2010)