Author of the publication

Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus.

, , , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic treatment of service assurance in distributed information systems., and . DSC, page 318-325. IEEE, (2017)A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud., , and . ICPP Workshops, page 279-287. IEEE Computer Society, (2012)Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications., , and . ICDCS Workshops, page 362-367. IEEE Computer Society, (2013)Textact: A text-action based web authentication scheme., and . GLOBECOM, page 955-960. IEEE, (2012)Fates: A Granular Approach to Real-Time Anomaly Detection., and . ICCCN, page 605-610. IEEE, (2007)Investigation of 5G and 4G V2V Communication Channel Performance Under Severe Weather., , , , , , and . WiSEE, page 12-17. IEEE, (2022)Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification., , and . DSC, page 1-8. IEEE, (2021)Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions., , and . ISC2, page 1-8. IEEE, (2019)Key Trees and the Security of Interval Multicast., , and . ICDCS, page 467-468. IEEE Computer Society, (2002)PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers., , , and . INFOCOM, page 210-214. IEEE, (2013)