Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Mark G. Reith
Apply Model Checking to Security Analysis in Trust Management
Related publications
Model Checking Indistinguishability of Randomized Security Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Social Security and Trust Fund Management
Apply Cross Spectral Analysis to Transfer Function Model Identification
Software Analysis and Model Checking
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Introduction to Reliability, Security and Trust Minitrack
Applying Model Checking to Destructive Testing and Analysis of Software System
Journal of Software
Mutual Trust to Provide Data Security in Cloud Environment
IOSR Journal of Computer Engineering
Verification of Security Policy Filtering Rules With Temporal Parameters by Model Checking
SPIIRAS Proceedings
Control
Systems Engineering
Information Systems
Computer Networks
Applied Mathematics
Mathematics
Communications
Computer Science Applications
Computational Theory
Computational Mathematics
Artificial Intelligence
Bringing LTL Model Checking to Biologists
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science