Author of the publication

Model-Based Testing of Cryptographic Protocols.

, , and . TGC, volume 3705 of Lecture Notes in Computer Science, page 33-60. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Runje, Davor
add a person with the name Runje, Davor
 

Other publications of authors with the same name

Verification of Causality Requirements in Java Memory Model Is Undecidable., , and . PPAM (2), volume 6068 of Lecture Notes in Computer Science, page 62-67. Springer, (2009)Privacy, Abstract Encryption and Protocols: An ASM Model - Part I., , and . Abstract State Machines, volume 2589 of Lecture Notes in Computer Science, page 372-390. Springer, (2003)Universal Strong Encryption FPGA Core Implementation., and . DATE, page 923-924. IEEE Computer Society, (1998)An enhancement of futures runtime in presence of cache memory hierarchy., and . ITI, page 925-930. IEEE, (2008)Model-Based Testing of Cryptographic Protocols., , and . TGC, volume 3705 of Lecture Notes in Computer Science, page 33-60. Springer, (2005)Attention Augmented Convolutional Transformer for Tabular Time-series., and . ICDM (Workshops), page 537-541. IEEE, (2021)The Cryptographic Abstract Machine., and . Abstract State Machines, volume 3052 of Lecture Notes in Computer Science, page 202-217. Springer, (2004)ALIME: Autoencoder Based Approach for Local Interpretability., and . IDEAL (1), volume 11871 of Lecture Notes in Computer Science, page 454-463. Springer, (2019)