Yongyuth Permpoontanalarp

According to our database1, Yongyuth Permpoontanalarp authored at least 13 papers between 1995 and 2014.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
On-the-fly Trace Generation Approach to the Security Analysis of Cryptographic Protocols: Coloured Petri Nets-based Method.
Fundam. Informaticae, 2014

2012
On-the-Fly Trace Generation Approach to the Security Analysis of the TMN Protocol with Homomorphic Property: A Petri Nets-Based Method.
IEICE Trans. Inf. Syst., 2012

2010
On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryptographic Protocols.
Proceedings of the Formal Techniques for Distributed Systems, 2010

2009
Security analysis of Micali's fair contract signing protocol by using Coloured Petri Nets : Multi-session case.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

2008
Security Analysis of Micali's Fair Contract Signing Protocol by Using Coloured Petri Nets.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Dynamic Undeniable Fair Certified Email with DDoS Protection.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2004
A Graph-based Methodology for Analyzing IP Spoofing Attack.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Multi-dimensional Hash Chain For Sealed-Bid Auction.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

2001
A graph theoretic model for hardware-based firewalls.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

Practical Reasoning about Accountability in Electronic Commerce Protocols.
Proceedings of the Information Security and Cryptology, 2001

A Unified Methodology for Verification and Synthesis of Firewall Configurations.
Proceedings of the Information and Communications Security, Third International Conference, 2001

1995
On Multi-Agent Autoepistemic Reasoning.
Proceedings of the Second World Conference on the Fundamentals of Artificial Intelligence, 1995

Generalised Proof-Theory for Multi-Agent Autoepistemic Reasoning.
Proceedings of the First International Conference on Multiagent Systems, 1995


  Loading...