Author of the publication

New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR.

, and . VVEIS, page 75-77. INSTICC Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static Verification of Access Control Model for AXML Documents.. APWeb/WAIM, volume 4505 of Lecture Notes in Computer Science, page 687-696. Springer, (2007)Application of Model Checking to AXML System's Security: A Case Study., and . WS-FM, volume 4184 of Lecture Notes in Computer Science, page 242-256. Springer, (2006)New S/Key System against Dictionary Attack: A Case Study in Casper and CSP/FDR., and . VVEIS, page 75-77. INSTICC Press, (2004)Model-Based Analysis of Money Accountability in Electronic Purses., , , , , and . WINE, volume 3828 of Lecture Notes in Computer Science, page 346-355. Springer, (2005)Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking., and . AINA (2), page 264-269. IEEE Computer Society, (2004)Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System., , and . ICDCS Workshops, page 217-223. IEEE Computer Society, (2005)Atomicity for P2P based XML Repositories., and . ICDE Workshops, page 363-370. IEEE Computer Society, (2007)Secrecy Analysis of Purchase Transaction in Electronic Purses., , , , and . AINA (1), page 979-984. IEEE Computer Society, (2006)Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR., , and . AINA, page 507-510. IEEE Computer Society, (2005)Using a Process Algebraic Approach of Verifying Access Control in XML-based Healthcare Systems., , , and . J. Res. Pract. Inf. Technol., (2014)