From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and verification of a mobile robot based on the integrated model of cyber-Physical systems., , , и . Simul. Model. Pract. Theory, (2020)Automatic Composition of Services with Security Policies., , и . SERVICES I, стр. 529-537. IEEE Computer Society, (2008)ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection., , , , и . IDC, том 868 из Studies in Computational Intelligence, стр. 495-504. Springer, (2019)Self-Correcting Unsound Reasoning Agents.. DARe@LPNMR, том 1872 из CEUR Workshop Proceedings, стр. 16-28. CEUR-WS.org, (2017)An intruder model for trust negotiation., , и . CRiSIS, стр. 1-8. IEEE Computer Society, (2010)Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems., , , и . NTMS, стр. 1-5. IEEE, (2019)Hierarchical Combination of Intruder Theories., и . RTA, том 4098 из Lecture Notes in Computer Science, стр. 108-122. Springer, (2006)Key Substitution in the Symbolic Analysis of Cryptographic Protocols., и . FSTTCS, том 4855 из Lecture Notes in Computer Science, стр. 121-132. Springer, (2007)A Symbolic Intruder Model for Hash-Collision Attacks., и . ASIAN, том 4435 из Lecture Notes in Computer Science, стр. 13-27. Springer, (2006)Decidability of Deterministic Process Equivalence for Finitary Deduction Systems., и . PDP, стр. 441-444. IEEE, (2020)