|
Search the dblp DataBase
Guoqiang Li:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yonggen Gu, Guoqiang Li, Yuxi Fu
Analyzing iKP Security in Applied Pi Calculus. [Citation Graph (0, 0)][DBLP] CIS, 2004, pp:879-887 [Conf]
- Min Zhang, Guoqiang Li, Yuxi Fu, Zhizhou Zhang, Lin He
Representation of the Signal Transduction with Aberrance Using Ipi Calculus. [Citation Graph (0, 0)][DBLP] CIS, 2004, pp:477-485 [Conf]
- Min Zhang, Guoqiang Li, Yuxi Fu
Secrecy of Signals by Typing in Signal Transduction. [Citation Graph (0, 0)][DBLP] ICNC (2), 2006, pp:384-393 [Conf]
- Min Zhang, Guoqiang Li, Yuxi Fu, Zhizhou Zhang, Lin He
Typing Aberrance in Signal Transduction. [Citation Graph (0, 0)][DBLP] ICNC (3), 2005, pp:668-677 [Conf]
- Yonggen Gu, Yuxi Fu, Guoqiang Li
A Simple Process Calculus for the analysis of Security Protocols. [Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:110-114 [Conf]
- Guoqiang Li, Mizuhito Ogawa
On-the-Fly Model Checking of Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP] ATVA, 2007, pp:511-522 [Conf]
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol. [Citation Graph (, )][DBLP]
Environmental Simulation of Real-Time Systems with Nested Interrupts. [Citation Graph (, )][DBLP]
Impact on the distribution of medicinal plant habitat by Wenchuan earthquake. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|