![]() |
| 2008 | ||
|---|---|---|
| 2 | EE | Wang Juan, Zhou Yajie, Zhang Huanguo: The Simplified Inductive Approach to Verifying Security Protocols. ISECS 2008: 523-526 |
| 1 | EE | Zhou Meng, Zhou Xueguang, Zhang Huanguo: Modeling and Calculation for Network System Survivability. WKDD 2008: 538-541 |
| 1 | Wang Juan | [2] |
| 2 | Zhou Meng | [1] |
| 3 | Zhou Xueguang | [1] |
| 4 | Zhou Yajie | [2] |