Author of the publication

A Generic Model for Analyzing Security Protocols.

, , , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 119-128. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Buffered π-Calculus: A Model for Concurrent Languages, , , and . CoRR, (2012)Genomic Scaffold Filling Revisited., , , , , and . CPM, volume 54 of LIPIcs, page 15:1-15:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2016)Filling Scaffolds with Gene Repetitions: Maximizing the Number of Adjacencies., , and . CPM, volume 6661 of Lecture Notes in Computer Science, page 55-64. Springer, (2011)The Buffered π-Calculus: A Model for Concurrent Languages., , , and . LATA, volume 7810 of Lecture Notes in Computer Science, page 250-261. Springer, (2013)On the Exact Block Cover Problem., , , , , and . AAIM, volume 8546 of Lecture Notes in Computer Science, page 13-22. Springer, (2014)A Web Services Selection Approach Based on Personalized QoS Prediction., , and . ISPDC, page 199-206. IEEE Computer Society, (2011)A Generic Model for Analyzing Security Protocols., , , and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 119-128. Springer, (2005)A meta-model for large-scale software system., , and . SMC, page 3501-3505. IEEE, (2003)Choosing a heuristic and root node for edge ordering in BDD-based network reliability analysis., , , , and . Reliab. Eng. Syst. Saf., (2014)The Early and Late Congruences for Asymmetric chi!=-Calculus.. CIS, volume 3314 of Lecture Notes in Computer Science, page 371-378. Springer, (2004)