Showing 1 - 15 results of 15 for search 'Zakiuddin, I', query time: 0.02s
Refine Results
-
1
Critical systems validation and verification with CSP and FDR by Goldsmith, M, Zakiuddin, I
Published 1999Conference item -
2
Authentication for pervasive computing by Creese, S, Goldsmith, M, Roscoe, B, Zakiuddin, I
Published 2004Conference item -
3
Research directions for trust and security in human−centric computing by Roscoe, A, Creese, S, Goldsmith, M, Zakiuddin, I
Published 2004Conference item -
4
Security properties and mechanisms in human−centric computing by Creese, S, Goldsmith, M, Roscoe, A, Zakiuddin, I
Published 2004Book -
5
Property Based Compression Strategies by Zakiuddin, I, Moffat, N, Goldsmith, M, Whitworth, T
Published 2002Conference item -
6
Rigorous Analysis of Routing Protocols Using Game Search by Zakiuddin, I, Hawkins, T, Moffat, N, Leow, C
Published 2004Conference item -
7
Property−based compression strategies by Zakiuddin, I, Moffat, N, Goldsmith, M, Whitworth, T
Published 2002Conference item -
8
Modelling Ad−hoc Routing Protocols Using Game Search: Extended Abstract by Zakiuddin, I, Hawkins, T, Moffat, N, Creese, S, Leow, C
Published 2003Conference item -
9
A methodology for model−checking ad−hoc networks by Zakiuddin, I, Goldsmith, M, Whittaker, P, Gardiner, P
Published 2003Conference item -
10
Watchdog Transformations for Property−Oriented Model−Checking by Goldsmith, M, Moffat, N, Roscoe, B, Whitworth, T, Zakiuddin, I
Published 2003Conference item -
11
Watchdog transformations for property−oriented model−checking by Goldsmith, M, Moffat, N, Roscoe, B, Whitworth, T, Zakiuddin, I
Published 2003Conference item -
12
Watchdog transformations for property−oriented model checking by Roscoe, A, Goldsmith, M, N.Moffat, Whitworth, T, Zakiuddin, I
Published 2003Conference item -
13
Exploiting empirical engagement in authentication protocol design by Creese, S, Goldsmith, M, Harrison, R, Roscoe, B, Whittaker, P, Zakiuddin, I
Published 2005Conference item -
14
Exploiting Empirical Engagement in Authentication Protocol Design by Creese, S, Goldsmith, M, Harrison, R, Roscoe, B, Whittaker, P, Zakiuddin, I
Published 2005Conference item -
15
Exploiting Empirical Engagement in Authentication Protocol Design by Creese, S, Goldsmith, M, Harrison, R, Roscoe, B, Whittaker, P, Zakiuddin, I
Published 2005Conference item