Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks. [Citation Graph (, )][DBLP]
Encoding the Program Correctness Proofs as Programs in PCC Technology. [Citation Graph (, )][DBLP]
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. [Citation Graph (, )][DBLP]
The Effect of Behavior Change on Honesty Checking in Peer-to-Peer Systems. [Citation Graph (, )][DBLP]
An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes. [Citation Graph (, )][DBLP]
Investigating Two Different Approaches for Encrypted Traffic Classification. [Citation Graph (, )][DBLP]
CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment. [Citation Graph (, )][DBLP]