Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deriving Coordinated Testers for Interoperability., and . Protocol Test Systems, volume C-19 of IFIP Transactions, page 331-346. North-Holland, (1993)Network Securing against Threatening Requests., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 280-294. Springer, (2011)Modelling location operations in UMTS networks., , and . MSWiM, page 69-73. ACM, (2002)Formal analysis of usage control policies., and . SIN, page 231-234. ACM, (2011)An Inoteroperability Testing Approach to Wireless Applications Protocols.. J. Univers. Comput. Sci., 9 (10): 1220-1243 (2003)Validation of security protocol implementations from security objectives., and . Comput. Secur., (2013)On the Fly Test Generation for Real Time Protocols., , and . ICCCN, page 378-387. IEEE Computer Society, (1998)An Automata Based Intrusion Detection Method for Internet of Things., , , , and . Mob. Inf. Syst., (2017)Compliance of Wireless Application Protocols.. TestCom, volume 210 of IFIP Conference Proceedings, page 129-138. Kluwer, (2002)A finite transition model for security protocol verification., and . SIN, page 368-371. ACM, (2013)