Items where Subject is "Computing > Network Computing"

Up a level
Export as [feed] RSS
Group by: Creators | Item Type
Jump to: A | B | H | I | K | M | W
Number of items at this level: 20.

A

Almousa, Omar, Mödersheim, Sebastian, Modesti, Paolo and Viganò, Luca (2015) Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, 21-25 Sep 2015, Vienna, Austria.

B

Bhagat, Kiran, Wermter, Stefan and Burn, Kevin (2009) Hybrid Learning Architecture for Unobtrusive Infrared Tracking Support. In: IEEE International Joint Conference on Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE, 2703- 2709. ISBN 9781424418206

Bowerman, Chris and Karamitsos, Ioannis (2013) A Resource Reservation Protocol with Linear Traffic Prediction for OBS Networks. Advances in Optical Technologies, 2013 (425372). ISSN 1687-6393

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2016) Security Protocol Specification and Verification with AnBx. Journal of Information Security and Applications, 30. pp. 46-63. ISSN 2214-2126

Bugliesi, Michele, Calzavara, Stefano, Mödersheim, Sebastian and Modesti, Paolo (2015) Security Protocol Specification and Verification with AnBx. Technical Report. School of Computing Science, Newcastle University.

Bugliesi, Michele and Modesti, Paolo (2010) AnBx - Security Protocols Design and Verification. In: Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, March 27-28, 2010, Paphos, Cyprus,.

Bugliesi, Michele and Modesti, Paolo (2010) Design and Analysis of Distributed Protocols with AnBx. Technical Report. DSI, Università Ca' Foscari Venezia.

H

Hussain, S, Erwin, Harry and Dunne, Peter (2011) Threat modelling using formal methods: A new approach to develop secure web applications. In: 7th International conference on emerging technologies IEEE, 5 - 6 Sep 2011, Islamabad, Pakistan.

Hussain, Shafiq, Erwin, Harry and Dunne, Peter (2011) Threat modeling using Formal Methods: A New Approach to Develop Secure Web Applications. In: ICET 2011: 7th IEEE International Conference on Emerging Technologies, 5-6 Sep 2011, Islamabad, Pakistan.

I

Irving, Philip and Ochang, Pascal A (2016) Evolutionary Analysis of GSM, UMTS and LTE Mobile Network Architectures. World Scientific News, 54. pp. 27-39. ISSN 2392-2192

K

Kaghazchi, Hassan (2015) A Diagnostics Model for Industrial Communications Networks. Doctoral thesis, University of Sunderland.

Kok, Dirk, Knowles, Michael and Morris, Adrian (2012) Building a Driving Simulator as an Electric Vehicle Hardware Development Tool. In: Driving Simulation Conference 2012, 6-7 September 2012, Paris.

M

Modesti, Paolo (2016) AnBx: Automatic Generation and Verification of Security Protocols Implementations. In: 8th International Symposium, FPS 2015, 26-28 Oct 2015, Clermont-Ferrand, France.

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management - 10th International Workshop, STM 2014, 10-11 Sep 2014, Wroclaw, Poland.

Modesti, Paolo (2014) Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. In: Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science . Springer, pp. 204-208. ISBN 978-3-319-11850-5

Modesti, Paolo (2016) Security Programming with High-Level Abstractions: a Tutorial (Extended Abstract). In: HEA National Conference on Learning and Teaching in Cybersecurity, 15 Jun 2016, Maple House, Birmingham. (Unpublished)

Modesti, Paolo (2012) Verified Security Protocol Modeling and Implementation with AnBx. Doctoral thesis, Università Ca' Foscari Venezia.

Modesti, Paolo, Groß, Thomas, Mödersheim, Sebastian, Almousa, Omar and Houdeau, Deflef (2015) Security Evaluation of FutureID. Project Report. FutureID Consortium.

Mödersheim, Sebastian and Modesti, Paolo (2011) Verifying SeVeCom using set-based abstraction. In: 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, 4-8 Jul 2011, Bahcesehir University, Istanbul, Turkey.

W

Warrender, Robert, Tindle, John and Nelson, David (2013) Evaluating the Use of Virtual Machines in High Performance Clusters. International Journal of Advanced Computer Technology, 2 (5). pp. 25-30. ISSN 2319-7900

This list was generated on Sat Sep 23 04:59:57 2017 BST.