Author of the publication

Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus.

, and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 605-620. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardness Results for Coverability Problem of Well-Structured Pushdown Systems., and . LATA, volume 10168 of Lecture Notes in Computer Science, page 435-446. (2017)Measuring Anonymity., and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 183-194. Springer, (2009)Well-Structured Pushdown Systems., and . CONCUR, volume 8052 of Lecture Notes in Computer Science, page 121-136. Springer, (2013)A Collaborative Filtering Algorithm based on Entropy and Trust Optimized Neighbor Selection., , , and . CSCWD, page 1293-1298. IEEE, (2022)Modeling and analysis of real -time systems with mutex components., , and . IPDPS Workshops, page 1-8. IEEE, (2010)Knowledge Aware Bisimulation and Anonymity., , and . ICCS (1), volume 5544 of Lecture Notes in Computer Science, page 53-62. Springer, (2009)Digital Rights Management Platform Based on Blockchain Technology., , and . HCC, volume 12634 of Lecture Notes in Computer Science, page 173-183. Springer, (2020)Using Entropy for Trust Measure in Collaborative Filtering., , , and . HCC, volume 13795 of Lecture Notes in Computer Science, page 107-118. Springer, (2021)On Vulnerability Testing of VoIP Software - The MEGACO/H.248 System as an Example., , , and . ICETE (2), page 216-222. INSTICC Press, (2004)Minimum-Energy Computation Offloading in Mobile Edge Computing with Hybrid PSO-DE Algorithm., , , , , and . ChineseCSCW (1), volume 1491 of Communications in Computer and Information Science, page 424-436. Springer, (2021)