Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Calculus for Wireless Networks of Named Data Networking., , , and . ICFEM, volume 11852 of Lecture Notes in Computer Science, page 170-185. Springer, (2019)From Operational Semantics to Denotational Semantics for Verilog, , and . (2001)From Operational Semantics to Denotational Semantics for Verilog, , and . (2001)Modeling and verifying NLSR protocol of NDN for CPS using UPPAAL., , and . J. Softw. Evol. Process., (July 2023)Formalization and Analysis of Ceph Using Process Algebra., , and . IEICE Trans. Inf. Syst., 104-D (12): 2154-2163 (2021)UTP semantics for the MCA ARMv8 architecture., and . J. Syst. Archit., (2022)SC4MEC: Automated Implementation of A Secure Hierarchical Calculus for Mobile Edge Computing., , and . DATE, page 990-993. IEEE, (2021)Verifying Static Aspects of UML models using Prolog (S)., , , , and . SEKE, page 259-342. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)Formalization and Verification of RTPS StatefulWriter Module Using CSP., , , , and . SEKE, page 147-198. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)Formalization and Verification of REST on HTTP Using CSP., , , , , , and . TTSS, volume 309 of Electronic Notes in Theoretical Computer Science, page 75-93. Elsevier, (2013)