Meihua Xiao

Orcid: 0000-0003-2717-7060

According to our database1, Meihua Xiao authored at least 19 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A novel formal logic for formal analysis of timeliness in non-repudiation protocols.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

R3D-SWIN: Use Shifted Window Attention for Single-View 3D Reconstruction.
CoRR, 2023

Modeling and Verification of WPA3 Security Protocol Based on SPIN.
Proceedings of the Theoretical Computer Science - 41st National Conference, 2023

2022
Proving authentication property of PUF-based mutual authentication protocol based on logic of events.
Soft Comput., 2022

Effective Key Region-Guided Face Detail Optimization Algorithm for 3D Face Reconstruction.
J. Sensors, 2022

Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality.
Entropy, 2022

An efficient cutting scheme for a section view of the large-scale infrastructure models.
Comput. Aided Civ. Infrastructure Eng., 2022

2021
Proving Mutual Authentication Property of 5G-AKA Protocol Based on PCL.
Proceedings of the Theoretical Computer Science, 2021

2020
Deriving Security Protocols Based on Protocol Derivation System.
Proceedings of the Theoretical Computer Science - 38th National Conference, 2020

2019
LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols.
IEEE Access, 2019

2018
Exploiting abstract change pattern from code changes.
J. Intell. Fuzzy Syst., 2018

Proving Mutual Authentication Property of KerNeeS Protocol Based on Logic of Events.
IEEE Access, 2018

Security Proof of KerNeeS Protocol Based on Logic of Events.
Proceedings of the Theoretical Computer Science - 36th National Conference, 2018

Formal Analysis and Verification for Three-Party Authentication Protocol of RFID.
Proceedings of the Theoretical Computer Science - 36th National Conference, 2018

2017
Formal Analysis and Verification for an Ultralightweight Authentication Protocol RAPP of RFID.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

A Multifaceted Study on Eye Contact based Speaker Identification in Three-party Conversations.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2015
基于SPIN的Andrew Secure RPC协议并行攻击模型检测 (Model Checking of Parallel Attack in Andrew Secure RPC Protocol Based on SPIN).
计算机科学, 2015

2014
The Formal Verification and Improvement of Simplified SET Protocol.
J. Softw., 2014

2006
Formal automatic verification of security protocols.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006


  Loading...