Author of the publication

Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification.

, , , , , and . CNSA, volume 89 of Communications in Computer and Information Science, page 152-163. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Rajarajan, Muttukrishnan
add a person with the name Rajarajan, Muttukrishnan
 

Other publications of authors with the same name

Stealing bandwidth from BitTorrent seeders., , , and . Computers & Security, (2014)Adaptive Task Scheduling in Service Oriented Crowd Using SLURM., , , and . ICDCIT, volume 7753 of Lecture Notes in Computer Science, page 373-385. Springer, (2013)Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud., , , , and . IEEE Trans. Dependable Sec. Comput., 11 (5): 467-479 (2014)CBDI: Combined Banzhaf & diversity index for finding critical nodes., , , and . GLOBECOM, page 758-763. IEEE, (2014)Trust Model for Optimized Cloud Services., , , and . IFIPTM, volume 374 of IFIP Advances in Information and Communication Technology, page 97-112. Springer, (2012)Timestamp authentication protocol for remote monitoring in eHealth., , , , and . PervasiveHealth, page 73-76. IEEE, (2008)Privacy in Mobile Web Services eHealth., , , , and . PervasiveHealth, page 1-6. IEEE, (2006)Detection of Bitcoin-Based Botnets Using a One-Class Classifier., , and . WISTP, volume 11469 of Lecture Notes in Computer Science, page 174-189. Springer, (2018)Security framework for mobile banking., , and . MoMM, page 421-424. ACM, (2010)Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust., and . TrustCom/BigDataSE/ICESS, page 554-561. IEEE Computer Society, (2017)