|
Search the dblp DataBase
Shahabuddin Muhammad:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha
Understanding the intruder through attacks on cryptographic protocols. [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference, 2006, pp:667-672 [Conf]
- Zeeshan Furqan, Ratan K. Guha, Shahabuddin Muhammad
A Heuristic State Space Search Model for Security Protocol Verification. [Citation Graph (0, 0)][DBLP] ICETE (2), 2004, pp:113-118 [Conf]
- Zeeshan Furqan, Shahabuddin Muhammad, Ratan K. Guha
Formal Verification of 802.11i using Strand Space Formalism. [Citation Graph (0, 0)][DBLP] ICN/ICONS/MCL, 2006, pp:140- [Conf]
- Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha
Designing Authentication Protocols: Trends and Issues. [Citation Graph (0, 0)][DBLP] ICN/ICONS/MCL, 2006, pp:76- [Conf]
- Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha
Wireless sensor network security: a secure sink node architecture. [Citation Graph (0, 0)][DBLP] IPCCC, 2005, pp:371-376 [Conf]
Search in 0.002secs, Finished in 0.002secs
|