|
Search the dblp DataBase
Yongyuth Permpoontanalarp:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Voravud Santiraveewan, Yongyuth Permpoontanalarp
A Graph-based Methodology for Analyzing IP Spoofing Attack. [Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:227-231 [Conf]
- Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas
A Unified Methodology for Verification and Synthesis of Firewall Configurations. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:328-339 [Conf]
- Supakorn Kungpisdan, Yongyuth Permpoontanalarp
Practical Reasoning about Accountability in Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:268-284 [Conf]
- Yongyuth Permpoontanalarp, John Yuejun Jiang
Generalised Proof-Theory for Multi-Agent Autoepistemic Reasoning. [Citation Graph (0, 0)][DBLP] ICMAS, 1995, pp:304-311 [Conf]
- Navapot Prakobpol, Yongyuth Permpoontanalarp
Multi-dimensional Hash Chain For Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:257-271 [Conf]
- Yongyuth Permpoontanalarp, John Yuejun Jiang
On Multi-Agent Autoepistemic Reasoning. [Citation Graph (0, 0)][DBLP] WOCFAI, 1995, pp:307-318 [Conf]
Dynamic Undeniable Fair Certified Email with DDoS Protection. [Citation Graph (, )][DBLP]
On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryptographic Protocols. [Citation Graph (, )][DBLP]
Security analysis of Micali's fair contract signing protocol by using Coloured Petri Nets : Multi-session case. [Citation Graph (, )][DBLP]
Security Analysis of Micali's Fair Contract Signing Protocol by Using Coloured Petri Nets. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|