Author of the publication

A Generic Model for Analyzing Security Protocols.

, , , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 119-128. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Numerical Approach of Computing American Option., , and . Int. J. Found. Comput. Sci., 13 (5): 685-693 (2002)An Effective Data-Driven Cloud Resource Procurement Scheme With Personalized Reserve Prices., , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 51 (8): 4693-4705 (2021)A Simple Process Calculus for the analysis of Security Protocols., , and . PDCAT, page 110-114. IEEE Computer Society, (2005)Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus., and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 605-620. Springer, (2009)Decentralized Transaction Mechanism Based on Smart Contract in Distributed Data Storage., , , , and . Information, 9 (11): 286 (2018)A Faster without Scarifying Accuracy Online Decomposition Approach for Higher-Order Tensors., , , , and . CyberC, page 159-166. IEEE, (2017)A Cloud Storage Resource Transaction Mechanism Based on Smart Contract., , and . ICCNS, page 134-138. ACM, (2018)Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting., , , , and . DSA, page 15-24. IEEE, (2018)A Generic Model for Analyzing Security Protocols., , , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 119-128. Springer, (2005)Game Theoretic Analysis of Workload Factoring in Federation of Clouds., and . GreenCom/iThings/CPScom, page 1098-1102. IEEE, (2013)