Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Lukman Bin
A Review on the Verification Approaches and Tools Used to Verify the Correctness of Security Algorithms and Protocols
International Journal of Advanced Computer Science and Applications
Computer Science
Related publications
Verification of Security Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Verification of Security Protocols
AnBx - Security Protocols Design and Verification
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
VANET: Routing Protocols, Security Issues and Simulation Tools
IOSR Journal of Computer Engineering
The Quest for Correctness-Beyond a Posteriori Verification
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Improving Automatic Verification of Security Protocols With XOR
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Tools Used to Assess the Quality of Peer Review Reports: A Methodological Systematic Review
BMC Medical Research Methodology
Epidemiology
Health Informatics
A Refinement Approach to Design and Verification of On-Chip Communication Protocols
Data Mining - Techniques, Methods and Algorithms: A Review on Tools and Their Validity
International Journal of Computer Applications