Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Verify Dynamic Properties of Information Systems., , , and . SEFM, page 416-425. IEEE Computer Society, (2004)Formal Verification of Tokeneer Behaviours Modelled in fUML Using CSP., , , and . ICFEM, volume 6447 of Lecture Notes in Computer Science, page 371-387. Springer, (2010)A New Multi-set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes., , and . IWDW, volume 4283 of Lecture Notes in Computer Science, page 96-110. Springer, (2006)Chunks: Component Verification in CSP||B., , and . IFM, volume 3771 of Lecture Notes in Computer Science, page 89-108. Springer, (2005)A CSP Approach to Control in Event-B., , and . IFM, volume 6396 of Lecture Notes in Computer Science, page 260-274. Springer, (2010)Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B., , , , and . Haifa Verification Conference, volume 7857 of Lecture Notes in Computer Science, page 193-208. Springer, (2012)Investigating a file transfer protocol using CSP and B., and . Software and Systems Modeling, 4 (3): 258-276 (2005)Verification of Scheme Plans Using CSP $$||$$ | | B., , , , , , , and . SEFM Workshops, volume 8368 of Lecture Notes in Computer Science, page 189-204. Springer, (2013)A Novel Multi-size Block Benford's Law Scheme for Printer Identification., , , and . PCM (1), volume 6297 of Lecture Notes in Computer Science, page 643-652. Springer, (2010)A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform., , , , , and . IIH-MSP, page 283-286. IEEE Computer Society, (2007)