2006 |
8 | EE | Siraj A. Shaikh,
Christos K. Dimitriadis:
Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.
SPC 2006: 211-226 |
7 | EE | Siraj A. Shaikh,
Vicky J. Bush:
Analysing the Woo-Lam Protocol Using CSP and Rank Functions.
Journal of Research and Practice in Information Technology 38(1): (2006) |
2005 |
6 | EE | Siraj A. Shaikh,
Vicky J. Bush,
Steve A. Schneider:
Specifying Authentication Using Signal Events in CSP.
CISC 2005: 63-74 |
5 | | Siraj A. Shaikh,
Vicky J. Bush:
Analysing the Woo-Lam Protocol Using CSP and Rank Functions.
WOSIS 2005: 3-12 |
2004 |
4 | | Siraj A. Shaikh,
Samir Al-Khayatt:
Analysis and implementation of virtual private network support in corporate networks.
Parallel and Distributed Computing and Networks 2004: 251-256 |
2002 |
3 | EE | Samir Al-Khayatt,
Siraj A. Shaikh,
Babak Akhgar,
Jawed I. A. Siddiqi:
Performance of Multimedia Applications with IPSec Tunneling.
ITCC 2002: 134-138 |
2 | EE | Samir Al-Khayatt,
Siraj A. Shaikh,
Babak Akhgar,
Jawed I. A. Siddiqi:
A Study of Encrypted, Tunneling Models in Virtual Private Networks.
ITCC 2002: 139-143 |
2001 |
1 | | Samir Al-Khayatt,
Mark Charlesworth,
Siraj A. Shaikh:
Virtual Private Network Support in a Corporate Network.
WebNet 2001: 12-14 |