Author of the publication

A Simple Process Calculus for the analysis of Security Protocols.

, , and . PDCAT, page 110-114. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mobile App Authentication Approach by Fusing the Scores from Multi-Modal Data., and . FUSION, page 2091-2097. IEEE, (2018)Control of discrete chaotic systems based on echo state network modeling with an adaptive noise canceler., , , and . Knowl. Based Syst., (2012)Prior parameter transformation for unsupervised speaker adaptation., , and . INTERSPEECH, page 698-701. ISCA, (2000)A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds., , , and . Future Gener. Comput. Syst., (2017)An outstanding adaptive multi-feature fusion YOLOv3 algorithm for the small target detection in remote sensing images., , , and . Pattern Anal. Appl., 25 (4): 951-962 (2022)Enhanced shuffled frog-leaping algorithm for solving numerical function optimization problems., , , , , and . J. Intell. Manuf., 29 (5): 1133-1153 (2018)Statistically managing cloud operations for latency-tail-tolerance in IoT-enabled smart cities., , , , and . J. Parallel Distributed Comput., (2019)A Wake Detection Method for Kelvin Wave Based on Improved Radon Transform., , , and . ICDIP, page 39:1-39:6. ACM, (2023)Verifying cooperative software: A SMT-based bounded model checking approach for deterministic scheduler., , , , and . J. Syst. Archit., (2017)Repo4QA: Answering Coding Questions via Dense Retrieval on GitHub Repositories., , , , and . COLING, page 1580-1592. International Committee on Computational Linguistics, (2022)