![]() | ![]() |
2008 | ||
---|---|---|
2 | EE | Wang Juan, Zhou Yajie, Zhang Huanguo: The Simplified Inductive Approach to Verifying Security Protocols. ISECS 2008: 523-526 |
1 | EE | Zhou Meng, Zhou Xueguang, Zhang Huanguo: Modeling and Calculation for Network System Survivability. WKDD 2008: 538-541 |
1 | Wang Juan | [2] |
2 | Zhou Meng | [1] |
3 | Zhou Xueguang | [1] |
4 | Zhou Yajie | [2] |