Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deriving protocol specifications from service specifications written as Predicate/Transition-nets., , , and . Comput. Networks, 51 (1): 258-284 (2007)An experimental prototype for scalable server selection., , , and . IPCCC, page 505-512. IEEE, (2003)Realizability of Collaboration-based Service Specifications., , and . APSEC, page 73-80. IEEE Computer Society, (2007)Formal specifications design, evolution and reuse., and . CASCON, page 184-193. IBM, (1993)Testing k-Safe Petri Nets., and . TestCom/FATES, volume 5826 of Lecture Notes in Computer Science, page 33-48. Springer, (2009)Decomposing Service Definition in Predicate/Transition-Nets for Designing Distributed Systems., , and . FORTE, volume 2767 of Lecture Notes in Computer Science, page 399-414. Springer, (2003)Phishing Attacks Modifications and Evolutions., , , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 243-262. Springer, (2018)Associativity between Weak and Strict Sequencing.. SAM, volume 8769 of Lecture Notes in Computer Science, page 96-109. Springer, (2014)Using First-Order Logic to Reason about Submodule Construction.. FMOODS/FORTE, volume 5522 of Lecture Notes in Computer Science, page 213-218. Springer, (2009)Using URL shorteners to compare phishing and malware attacks., , , , and . eCrime, page 1-13. IEEE, (2018)