Author:
Alaba Fadele Ayotunde,Hakak Saqib,Khan Fawad Ali,Adewale Sulaimon Hakeem,Rahmawati Sri,Patma Tundung Subali,Ritonga Rajab,Herawan Tutut
Reference30 articles.
1. Agrawal, R., Evfimievski, A. and Srikant, R. (2003). Information sharing across private databases. In Proceedings of the ACM SIGMOD Int’l Conf. on Management of Data, San Diego, CA.
2. Alur, R., Courcoubetis, C. and D. Dill. (1990). Model-checking for real-time systems. Proceedings of Fifth Annual IEEE Symposium on Logic in Computer Science, pg. 414–425.
3. Arkin, K., Thompson K., and Weinel W. (2005). The mobile jigsaw - a collaborative learning strategy for mlearning about the environment. Presented at mlearn; Making the connections.
4. Armando A and Compagna L. (2004). A SAT-based Model Checker for Security Protocols. Lecture Notes in Computer Science, pg. 13–18.
5. Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.C., Kouchnarenko, O., Mantovani, J. and Mödersheim, S., 2005, July. The AVISPA tool for the automated validation of internet security protocols and applications. In Proceedings of International Conference on Computer Aided Verification (pp. 281–285). Springer Berlin Heidelberg.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献