Author of the publication

Design and formal verification of a cloud compliant secure logging mechanism.

, , and . IET Inf. Secur., 10 (4): 203-214 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An overview of model checking practices on verification of PLC software., , , and . Softw. Syst. Model., 15 (4): 937-960 (2016)Design and formal verification of a cloud compliant secure logging mechanism., , and . IET Inf. Secur., 10 (4): 203-214 (2016)Distributed Application Checkpointing for Replicated State Machines., and . Scalable Comput. Pract. Exp., 22 (1): 67-79 (2021)Early Conflict Checking in Two-Phase Commit Protocol for Replicated State Machines., and . Int. J. Distributed Syst. Technol., 12 (4): 1-20 (2021)Exploring implicit parallelism in class diagrams., , and . J. Syst. Softw., 84 (5): 821-834 (2011)Gateway Placement in LoRaWAN Enabled Sensor Networks., , and . SENSORNETS, page 93-100. SCITEPRESS, (2023)An investigation of the transmission success in Lorawan enabled IoT-HAPS communication., and . Internet Things, (2022)A Decentralized Replica Placement Algorithm for Edge Computing., and . IEEE Trans. Network and Service Management, 15 (2): 516-529 (2018)A Distributed Checkpoint Mechanism for Replicated State Machines., and . CLOSER, page 515-520. SCITEPRESS, (2020)Cost Analysis for Embedded Systems: Experiments with Priced Timed Automata., , and . FESCA@ETAPS, volume 238 of Electronic Notes in Theoretical Computer Science, page 81-95. Elsevier, (2008)