Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by Lukman Bin

A Review on the Verification Approaches and Tools Used to Verify the Correctness of Security Algorithms and Protocols

International Journal of Advanced Computer Science and Applications
Computer Science
2019English

Related publications

Verification of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Verification of Security Protocols

English

AnBx - Security Protocols Design and Verification

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

VANET: Routing Protocols, Security Issues and Simulation Tools

IOSR Journal of Computer Engineering
2012English

The Quest for Correctness-Beyond a Posteriori Verification

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Improving Automatic Verification of Security Protocols With XOR

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Tools Used to Assess the Quality of Peer Review Reports: A Methodological Systematic Review

BMC Medical Research Methodology
EpidemiologyHealth Informatics
2019English

A Refinement Approach to Design and Verification of On-Chip Communication Protocols

2008English

Data Mining - Techniques, Methods and Algorithms: A Review on Tools and Their Validity

International Journal of Computer Applications
2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy