2008 |
10 | EE | Ti Zhou,
Zhoujun Li,
Mengjun Li,
Huowang Chen:
Constraint Abstraction in Verification of Security Protocols.
FAW 2008: 252-263 |
9 | EE | Ti Zhou,
Mengjun Li,
Zhoujun Li:
Local abstract verification and refinement of security protocols.
FMSE 2008: 21-30 |
8 | EE | Mengjun Li,
Ti Zhou,
Zhoujun Li:
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.
Inscrypt 2008: 125-140 |
7 | | Feng Liu,
Zhoujun Li,
Ti Zhou,
Mengjun Li:
Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic.
SEKE 2008: 795-801 |
6 | EE | Ti Zhou,
Mengjun Li,
Zhoujun Li,
Huowang Chen:
Modeling and Verifying Time Sensitive Security Protocols with Constraints.
Electr. Notes Theor. Comput. Sci. 212: 103-118 (2008) |
5 | EE | Mengjun Li,
Zhoujun Li,
Huowang Chen,
Ti Zhou:
A Novel Derivation Framework For Definite Logic Program.
Electr. Notes Theor. Comput. Sci. 212: 71-85 (2008) |
2007 |
4 | EE | Mengjun Li,
Ti Zhou,
Zhoujun Li,
Huowang Chen:
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.
ASIAN 2007: 166-180 |
3 | EE | Zhoujun Li,
Ti Zhou,
Mengjun Li,
Huowang Chen:
Constraints Solution for Time Sensitive Security Protocols.
FAW 2007: 191-203 |
2006 |
2 | | Ling Zhang,
Jianping Yin,
Mengjun Li,
Jieren Cheng:
A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization.
SEKE 2006: 410-415 |
1 | EE | Mengluo Ji,
Huaimin Wang,
Mengjun Li,
Wei Dong,
Zhichang Qi:
An Value Range Analysis Based on Abstract Interpretation and Generalized Monotone Data Flow Framework.
Journal of Computer Research and Development 43(11): 2020-2026 (2006) |