| Publication | Date of Publication | Type |
|---|
| scientific article; zbMATH DE number 7477999 (Why is no real title available?) | 2022-02-22 | Paper |
A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes Information Sciences | 2021-03-31 | Paper |
| Super root: a new stealthy rooting technique on ARM devices | 2021-02-23 | Paper |
| Program security verification based on abstract invariants | 2017-05-17 | Paper |
Non-malleable extractors with shorter seeds and their applications Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Overcoming weak expectations via the Rényi entropy and the expanded computational entropy Lecture Notes in Computer Science | 2015-09-30 | Paper |
A novel variable precision \((\theta ,\sigma )\)-fuzzy rough set model based on fuzzy granules Fuzzy Sets and Systems | 2015-06-24 | Paper |
Efficient and dynamic key management for multiple identities in identity-based systems Information Sciences | 2014-08-01 | Paper |
Efficient and provably secure generic construction of client-to-client password-based key exchange protocol Electronic Notes in Theoretical Computer Science | 2014-05-13 | Paper |
Modeling and verifying time sensitive security protocols with constraints Electronic Notes in Theoretical Computer Science | 2014-05-13 | Paper |
A novel derivation framework for definite logic program Electronic Notes in Theoretical Computer Science | 2014-05-13 | Paper |
A provably secure authenticated key agreement protocol for wireless communications Computers and Electrical Engineering | 2012-10-19 | Paper |
The construction of fuzzy concept lattices based on \((\theta , \sigma )\)-fuzzy rough approximation operators Fundamenta Informaticae | 2012-05-04 | Paper |
An efficient dynamic authenticated key exchange protocol with selectable identities Computers & Mathematics with Applications | 2011-09-18 | Paper |
An iterative method for generating loop invariants Frontiers in Algorithmics and Algorithmic Aspects in Information and Management | 2011-06-03 | Paper |
Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems Fuzzy Sets and Systems | 2011-05-02 | Paper |
Provably secure identity-based authenticated key agreement protocols with malicious private key generators Information Sciences | 2011-01-28 | Paper |
Server-controlled identity-based authenticated key exchange Provable Security | 2009-12-11 | Paper |
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming Information Security and Cryptology | 2009-04-29 | Paper |
Hamiltonian Property on Binary Recursive Networks Frontiers in Algorithmics | 2009-03-10 | Paper |
Constraints Solution for Time Sensitive Security Protocols Frontiers in Algorithmics | 2009-03-10 | Paper |
Constraint Abstraction in Verification of Security Protocols Frontiers in Algorithmics | 2008-06-19 | Paper |
| SPVT: an efficient verification tool for security protocols | 2006-10-10 | Paper |
| scientific article; zbMATH DE number 2202222 (Why is no real title available?) | 2005-09-05 | Paper |
Symbolic transition graph and its early bisimulation checking algorithms for the \(\pi\)-calculus Science in China. Series E | 2000-06-13 | Paper |
Universal abstract consistency class and universal refutation Journal of Computer Science and Technology | 1999-09-13 | Paper |
| scientific article; zbMATH DE number 1223732 (Why is no real title available?) | 1999-02-14 | Paper |