Author of the publication

State space blow-up in the verification of secure smartcard interoperability.

, , , and . ICCST, page 119-125. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Galinium, Maulahikmah
add a person with the name Galinium, Maulahikmah
 

Other publications of authors with the same name

Understanding and granting android permissions: A user survey., , , , , , and . ICCST, page 1-6. IEEE, (2017)Secure Messaging Implementation in OpenSC., , , and . J. Information Security, 3 (4): 251-258 (2012)State space blow-up in the verification of secure smartcard interoperability., , , and . ICCST, page 119-125. IEEE, (2012)Deep Learning Analysis in Development of Handwritten and Plain Text Classification API., , , , and . ICONETSI, page 30:1-30:8. ACM, (2022)Optimization on Malaria Computer Aided Diagnostic System., , and . ICONETSI, page 35:1-35:6. ACM, (2020)Business Analysis and Design of Online Marketplace for Beauty Care Services., , , and . ICONETSI, page 39:1-39:6. ACM, (2020)An Online Catering Marketplace Business Plan: Kunyahku.id., , and . ICONETSI, page 37:1-37:6. ACM, (2020)Backend Development of Online Marketplace for Male Beauty Care Services., , and . ICONETSI, page 42:1-42:5. ACM, (2020)Simulation based verification of concurrent processing on security devices., , , and . SysCon, page 82-87. IEEE, (2013)Interleaving Command Sequences: a Threat to Secure Smartcard Interoperability, , , and . CoRR, (2012)