From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A method for symbolic analysis of security protocols., и . Theor. Comput. Sci., 338 (1-3): 393-425 (2005)Models for mobility and security in distributed systems.. University of Salerno, Italy, (2003)D-Fusion: A Distinctive Fusion Calculus., , и . APLAS, том 3302 из Lecture Notes in Computer Science, стр. 296-310. Springer, (2004)CC-Pi: A Constraint-Based Language for Specifying Service Level Agreements., и . ESOP, том 4421 из Lecture Notes in Computer Science, стр. 18-32. Springer, (2007)Constraint-Based Policy Negotiation and Enforcement for Telco Services., , , и . TASE, стр. 463-472. IEEE Computer Society, (2007)Adaptive fuzzy-valued service selection., , и . SAC, стр. 2467-2471. ACM, (2010)Experimenting with STA, a tool for automatic analysis of security protocols., и . SAC, стр. 281-285. ACM, (2002)Toward a Game-Theoretic Model of Grid Systems., , и . TGC, том 6084 из Lecture Notes in Computer Science, стр. 57-72. Springer, (2010)Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation., и . MFCS, том 2747 из Lecture Notes in Computer Science, стр. 269-278. Springer, (2003)A Game-Theoretic Analysis of Grid Job Scheduling., , и . J. Grid Comput., 10 (3): 501-519 (2012)