2008 |
7 | EE | Guoqiang Li,
Mizuhito Ogawa:
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol.
ATVA 2008: 374-385 |
2007 |
6 | EE | Guoqiang Li,
Mizuhito Ogawa:
On-the-Fly Model Checking of Fair Non-repudiation Protocols.
ATVA 2007: 511-522 |
2006 |
5 | EE | Min Zhang,
Guoqiang Li,
Yuxi Fu:
Secrecy of Signals by Typing in Signal Transduction.
ICNC (2) 2006: 384-393 |
2005 |
4 | EE | Min Zhang,
Guoqiang Li,
Yuxi Fu,
Zhizhou Zhang,
Lin He:
Typing Aberrance in Signal Transduction.
ICNC (3) 2005: 668-677 |
3 | EE | Yonggen Gu,
Yuxi Fu,
Guoqiang Li:
A Simple Process Calculus for the analysis of Security Protocols.
PDCAT 2005: 110-114 |
2004 |
2 | EE | Min Zhang,
Guoqiang Li,
Yuxi Fu,
Zhizhou Zhang,
Lin He:
Representation of the Signal Transduction with Aberrance Using Ipi Calculus.
CIS 2004: 477-485 |
1 | EE | Yonggen Gu,
Guoqiang Li,
Yuxi Fu:
Analyzing iKP Security in Applied Pi Calculus.
CIS 2004: 879-887 |