Author of the publication

Modeling and Verification of Privacy Enhancing Protocols.

, , , and . ICFEM, volume 5885 of Lecture Notes in Computer Science, page 127-146. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Off-Line Fair Payment Protocols Using Convertible Signatures., and . ASIACRYPT, volume 1514 of Lecture Notes in Computer Science, page 271-285. Springer, (1998)Internet-wide Scanning Taxonomy and Framework., , and . AISC, volume 161 of CRPIT, page 61-65. Australian Computer Society, (2015)Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining., , , and . NSS, volume 9955 of Lecture Notes in Computer Science, page 499-506. Springer, (2016)Encrypted Network Traffic Classification with Higher Order Graph Neural Network., , , , and . ACISP, volume 13915 of Lecture Notes in Computer Science, page 630-650. Springer, (2023)A CNN Based Encrypted Network Traffic Classifier., , , and . ACSW, page 74-83. ACM, (2022)A taxonomy of electronic cash schemes., , , and . SEC, volume 92 of IFIP Conference Proceedings, page 337-348. Chapman & Hall, (1997)A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks., , , , and . ICECCS, page 117-122. IEEE, (2022)Modeling for performance and security balanced trading communication systems in the cloud., , , and . IPCCC, page 1-7. IEEE Computer Society, (2017)QoE Estimation Model for a Secure Real-Time Voice Communication System in the Cloud., , , and . ACSW, page 10:1-10:9. ACM, (2019)Process Discovery for Industrial Control System Cyber Attack Detection., , , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 61-75. Springer, (2017)