Search the dblp DataBase
Siraj A. Shaikh :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Siraj A. Shaikh , Vicky J. Bush , Steve A. Schneider Specifying Authentication Using Signal Events in CSP. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:63-74 [Conf ] Samir Al-Khayatt , Siraj A. Shaikh , Babak Akhgar , Jawed I. A. Siddiqi Performance of Multimedia Applications with IPSec Tunneling. [Citation Graph (0, 0)][DBLP ] ITCC, 2002, pp:134-138 [Conf ] Samir Al-Khayatt , Siraj A. Shaikh , Babak Akhgar , Jawed I. A. Siddiqi A Study of Encrypted, Tunneling Models in Virtual Private Networks. [Citation Graph (0, 0)][DBLP ] ITCC, 2002, pp:139-143 [Conf ] Siraj A. Shaikh , Samir Al-Khayatt Analysis and implementation of virtual private network support in corporate networks. [Citation Graph (0, 0)][DBLP ] Parallel and Distributed Computing and Networks, 2004, pp:251-256 [Conf ] Siraj A. Shaikh , Vicky J. Bush Analysing the Woo-Lam Protocol Using CSP and Rank Functions. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:3-12 [Conf ] Siraj A. Shaikh , Christos K. Dimitriadis Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions. [Citation Graph (0, 0)][DBLP ] SPC, 2006, pp:211-226 [Conf ] Samir Al-Khayatt , Mark Charlesworth , Siraj A. Shaikh Virtual Private Network Support in a Corporate Network. [Citation Graph (0, 0)][DBLP ] WebNet, 2001, pp:12-14 [Conf ] Siraj A. Shaikh , Vicky J. Bush Analysing the Woo-Lam Protocol Using CSP and Rank Functions. [Citation Graph (0, 0)][DBLP ] Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal ] Optimising IDS Sensor Placement. [Citation Graph (, )][DBLP ] A Deployment Value Model for Intrusion Detection Sensors. [Citation Graph (, )][DBLP ] Specifying authentication using signal events in CSP. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs