Author of the publication

Modeling and Verifying Distributed Systems Using Priorities: A Case Study.

, , , and . Softw. Concepts Tools, 17 (2): 50-62 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of StegoBot: a covert social network botnet., , and . SECURIT, page 36-41. ACM, (2012)Android based malware detection using a multifeature collaborative decision fusion approach., , and . Neurocomputing, (2015)An Algebraic Theory of Process Efficiency., and . LICS, page 63-72. IEEE Computer Society, (1996)Predictability of real-time systems: a process-algebraic approach., and . RTSS, page 82-91. IEEE Computer Society, (1996)An FPGA Implementation of Improved AODV Routing Protocol for Route Repair Scheme., , , , and . ICETET, page 971-974. IEEE Computer Society, (2008)Priority and Abstraction in Process Algebra., , , and . FSTTCS, volume 880 of Lecture Notes in Computer Science, page 217-230. Springer, (1994)Encrypted separable reversible watermarking with authentication and error correction., , , , , and . Multim. Tools Appl., 78 (6): 7005-7027 (2019)Efficient big data security analysis on HDFS based on combination of clustering and data perturbation algorithm using health care database., and . J. Intell. Fuzzy Syst., 43 (3): 3355-3372 (2022)Efficient and Secure Implementation of Elliptic Curve Scalar Multiplication Against Power Analysis Attacks., , and . ICIA, page 70:1-70:5. ACM, (2016)Lightweight key agreement protocol for IoT based on IKEv2., and . Comput. Electr. Eng., (2017)