From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A method to build symbolic representations of LOTOS specifications.. PSTV, том 38 из IFIP Conference Proceedings, стр. 331-346. Chapman & Hall, (1995)Mapping Petri Nets with Inhibitor Arcs onto Basic LOTOS Behavior Expressions., и . IEEE Trans. Computers, 44 (12): 1361-1370 (1995)Detecting Injection Attacks on Cooperative Adaptive Cruise Control., , , , и . VNC, стр. 1-8. IEEE, (2019)Exploiting Symmetries for Testing Equivalence in the Spi Calculus., , , и . ATVA, том 3299 из Lecture Notes in Computer Science, стр. 135-149. Springer, (2004)Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis., , , и . FORTE, том 2767 из Lecture Notes in Computer Science, стр. 224-239. Springer, (2003)Using SPIN to Verify Security Properties of Cryptographic Protocols., и . SPIN, том 2318 из Lecture Notes in Computer Science, стр. 187-204. Springer, (2002)Formal Verification of the FDO Protocol., , и . CSCN, стр. 290-295. IEEE, (2023)Wireless for the factory: The Wi-Fact analysis., , , , , , , , и . RTSI, стр. 403-410. IEEE, (2015)Static Analysis of Java Multithreaded and Distributed Applications., и . PDSE, стр. 215-222. IEEE Computer Society, (1998)Using Data Flow Analysis to Infer Type Information in Java Bytecode., и . SCAM, стр. 213-. IEEE Computer Society, (2001)