Zeeshan Furqan

According to our database1, Zeeshan Furqan authored at least 7 papers between 2004 and 2006.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2006
Logic-Based Formal Analysis of Cryptographic Protocols.
Proceedings of the 14th IEEE International Conference on Networks, 2006

A Parameterized Analysis of Public-Key Protocols: Needham-Schroeder and Kerberos-5.
Proceedings of the 14th IEEE International Conference on Networks, 2006

Designing Authentication Protocols: Trends and Issues.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Formal Verification of 802.11i using Strand Space Formalism.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Understanding the intruder through attacks on cryptographic protocols.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2005
Wireless sensor network security: a secure sink node architecture.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

2004
A Heuristic State Space Search Model for Security Protocol Verification.
Proceedings of the ICETE 2004, 2004


  Loading...