From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and verification of a mobile robot based on the integrated model of cyber-Physical systems., , , и . Simul. Model. Pract. Theory, (2020)ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection., , , , и . IDC, том 868 из Studies in Computational Intelligence, стр. 495-504. Springer, (2019)Automatic Composition of Services with Security Policies., , и . SERVICES I, стр. 529-537. IEEE Computer Society, (2008)Decidability of Deterministic Process Equivalence for Finitary Deduction Systems., и . PDP, стр. 441-444. IEEE, (2020)Hierarchical Combination of Intruder Theories., и . RTA, том 4098 из Lecture Notes in Computer Science, стр. 108-122. Springer, (2006)Key Substitution in the Symbolic Analysis of Cryptographic Protocols., и . FSTTCS, том 4855 из Lecture Notes in Computer Science, стр. 121-132. Springer, (2007)A Symbolic Intruder Model for Hash-Collision Attacks., и . ASIAN, том 4435 из Lecture Notes in Computer Science, стр. 13-27. Springer, (2006)A logical framework for reasoning about policies with trust negotiations and workflows in a distributed environment., , и . CRiSIS, стр. 3-11. IEEE, (2009)Combining Intruder Theories., и . ICALP, том 3580 из Lecture Notes in Computer Science, стр. 639-651. Springer, (2005)Résolution de problèmes d'accessiblité pour la compilation et la validation de protocoles cryptographiques.. Henri Poincaré University, Nancy, France, (2003)