![]() | ![]() |
2006 | ||
---|---|---|
4 | EE | Siraj A. Shaikh, Vicky J. Bush: Analysing the Woo-Lam Protocol Using CSP and Rank Functions. Journal of Research and Practice in Information Technology 38(1): (2006) |
2005 | ||
3 | EE | Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider: Specifying Authentication Using Signal Events in CSP. CISC 2005: 63-74 |
2 | Siraj A. Shaikh, Vicky J. Bush: Analysing the Woo-Lam Protocol Using CSP and Rank Functions. WOSIS 2005: 3-12 | |
1994 | ||
1 | EE | Kung-Kiu Lau, Vicky J. Bush, Pete J. Jinks: Towards an introductory formal programming course. SIGCSE 1994: 121-125 |
1 | Pete J. Jinks | [1] |
2 | Kung-Kiu Lau | [1] |
3 | Steve A. Schneider (Steve Schneider) | [3] |
4 | Siraj A. Shaikh | [2] [3] [4] |