![]() Liu, Zhiyuan ![]() ![]() ![]() in Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software (2011), ENTCS 274 Detailed reference viewed: 110 (4 UL)![]() Lenzini, Gabriele ![]() ![]() ![]() in Proc. 19th International Workshop on Security Protocols (2011) Detailed reference viewed: 173 (7 UL)![]() Jonker, Hugo ![]() ![]() in Proc. 6th International Conference on Availability, Reliability and Security (2011) Detailed reference viewed: 135 (1 UL)![]() ; Pang, Jun ![]() in Proc. 6th International Conference on Availability, Reliability and Security (2011) Detailed reference viewed: 111 (1 UL)![]() ; Pang, Jun ![]() in Proceedings of 6th IEEE/IFIP Symposium on Trusted Computing and Communications (2010) Detailed reference viewed: 133 (1 UL)![]() ; Pang, Jun ![]() in Proceedings of 15th IEEE International Conference on Engineering of Complex Computer Systems (2010) Detailed reference viewed: 99 (1 UL)![]() ; ; et al in Proceedings of 29th Annual ACM Symposium on Principles of Distributed Computing (2010) Detailed reference viewed: 49 (1 UL)![]() ; Pang, Jun ![]() in Journal of Information Security (2010), 1(2), 56-67 Detailed reference viewed: 119 (0 UL)![]() ; Pang, Jun ![]() in Journal of Information Security (2010), 1(2), 45-55 Detailed reference viewed: 62 (0 UL)![]() Zhang, Ying ![]() ![]() ![]() in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010) Detailed reference viewed: 125 (3 UL)![]() ; Pang, Jun ![]() in Proc. 6th IFIP Conference on Theoretical Computer Science (2010) Detailed reference viewed: 158 (3 UL)![]() ; ; et al in Proc. 21th International Conference on Computer Aided Verification (2009) Detailed reference viewed: 206 (1 UL)![]() Pang, Jun ![]() in Proc. 3rd IEEE Conference on Secure Software Integration and Reliability Improvement (2009) This is an editorial. Detailed reference viewed: 92 (1 UL)![]() ; Pang, Jun ![]() in Proceedings of 3rd IEEE Symposium on Theoretical Aspects of Software Engineering (2009) Detailed reference viewed: 127 (2 UL)![]() Pang, Jun ![]() in Proc. 7th International Workshop on Security Issues in Concurrency (2009) Detailed reference viewed: 132 (1 UL)![]() Chen, Xihui ![]() ![]() ![]() in Proc. 11th International Conference on Formal Engineering Methods (2009) Detailed reference viewed: 130 (2 UL)![]() Jonker, Hugo ![]() ![]() ![]() in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009) Detailed reference viewed: 114 (2 UL)![]() Jonker, Hugo ![]() ![]() ![]() in Journal of Algorithms in Cognition, Informatics and Logic (2009) Detailed reference viewed: 115 (7 UL)![]() ; ; Pang, Jun ![]() in Proc. 5th IFIP Conference on Theoretical Computer Science (2008) Detailed reference viewed: 106 (2 UL)![]() ; Pang, Jun ![]() in Fundamenta Informaticae (2008), 87(3-4), 287311 Detailed reference viewed: 50 (1 UL) |
||