Xidian Meeting Xidian Guide About Help Search Home Login Control Panel AddBookMark Fu Yulong's MessageBoard
Papers

[1]Yulong Fu(*),Ousmane Koné,Security and Robustness by Protocol Testing,IEEE System Journal,2014,8(3):699-707。SCI 
[2]Yulong Fu(*),Ousmane Koné,Validation of security protocol implementations from security objectives,Computer & Security,2013,36(1):27-39。1,SCI 
[3] Yulong Fu(*),Xiaolong Xin,A Model based Security Testing Method for Protocol Implementation,The Scientific World Journal,2014,2014(632154)。SCI 
[4]Xiaolong Xin(*),Yulong Fu,Some results of convex fuzzy sublattices,Journal of Intelligent and Fuzzy Systems,2014,27(1):287-298。SCI 
[5] Yulong Fu(*),Ousmane Kone,Network Securing Against Threatening Requests,Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop,Leuven,2011.9.15-2011.9.16。EI 
[6]Yulong Fu(*),Ousmane Kone,Model based security verification of protocol implementation,Journal of Information Security and Applications。EI
[7] Yulong Fu(*),Ousmane Koné,Using transition systems to model and verify the implementation of security protocol,The 6th International Conference on Security of Information and Networks,Aksaray,2013.11.26-2013.11.28。EI 
[8]Yulong Fu(*),Ousmane Kone,A Robustness Testing for Network Security,7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011,Thessaloniki,2011.8.24-2011.8.26。EI 
[9]Yulong Fu(*),Ousmane Koné,A finite transition model for security protocol verification,The 6th International Conference on Security of Information and Networks,Aksaray,2013.11.26-2013.11.28。EI