From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formal Implementation of Network Security Policies., , и . PST, стр. 161-166. (2004)LyeeBuilder., , , и . SoMeT, том 129 из Frontiers in Artificial Intelligence and Applications, стр. 83-99. IOS Press, (2005)Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method., и . J. Comput. Networks Commun., (2012)Performance Evaluation of Data Scheduling in IEEE802.16e in VANET Traffic Context., , и . DeSE, стр. 58-63. IEEE, (2018)$K$-Smali: An Executable Semantics for Program Verification of Reversed Android Applications., , и . FPS, том 13291 из Lecture Notes in Computer Science, стр. 321-337. Springer, (2021)Enforcing Security Policies Using Algebraic Approach., и . SoMeT, том 182 из Frontiers in Artificial Intelligence and Applications, стр. 84-98. IOS Press, (2008)Towards the Correctness of Security Protocols., и . MFPS, том 83 из Electronic Notes in Theoretical Computer Science, стр. 55-98. Elsevier, (2003)Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic., , и . ARES, стр. 206-212. IEEE Computer Society, (2007)From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm., , , и . WETICE, стр. 256-262. IEEE Computer Society, (1997)Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm., , , и . FPS, том 10128 из Lecture Notes in Computer Science, стр. 161-178. Springer, (2016)