Author of the publication

On Evaluating the Performance of Security Protocols.

, , , , , , and . PaCT, volume 3606 of Lecture Notes in Computer Science, page 1-15. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VICE: A VIrtual CEll., , , and . CMSB, volume 3082 of Lecture Notes in Computer Science, page 207-220. Springer, (2004)Formal Executable Descriptions of Biological Systems., , and . QEST, page 2-12. IEEE Computer Society, (2005)Causal pi-Calculus for Biochemical Modelling., , and . CMSB, volume 2602 of Lecture Notes in Computer Science, page 21-33. Springer, (2003)Modelling biochemical pathways through enhanced pi-calculus., , , and . Theor. Comput. Sci., 325 (1): 111-140 (2004)Performance Evaluation of Security Protocols Specified in LySa., , , , , , and . QAPL, volume 112 of Electronic Notes in Theoretical Computer Science, page 167-189. Elsevier, (2004)A Quantitative Study of Two Attacks., , , and . WISP@ICATPN, volume 121 of Electronic Notes in Theoretical Computer Science, page 65-85. Elsevier, (2004)