Items where Author is "Cheng, X"

Up a level
Export as [feed] RSS
Group by: Item Type | No Grouping
Number of items: 23.

Journal article

WANG, P., CHENG, X., JIANG, D., ADDICOAT, M., HUANG, N., DALAPATI, S., HEINE, T., HUO, F. and JIANG, Q., 2019. High‐precision size recognition and separation in synthetic 1D nanochannels. Angewandte Chemie. ISSN 0044-8249

ZHANG, H., PARRY, R. and CHENG, X., 2016. An exploration of the independent director system in China: problems and solutions. International Company and Commercial Law Review, 27 (8), pp. 253-262. ISSN 0958-5214

SHI, Y., CHEN, Z., CHENG, X., PAN, Y., ZHANG, H., ZHANG, Z., LI, C.-W. and YI, C., 2014. A novel dual-emission ratiometric fluorescent nanoprobe for sensing and intracellular imaging of Zn2+. Biosensors and Bioelectronics, 61, pp. 397-403. ISSN 0956-5663

CHAN, F.K.S., WRIGHT, N., CHENG, X. and GRIFFITHS, J., 2014. After Sandy: rethinking flood risk management in Asian coastal megacities. Natural Hazards Review, 15 (2), pp. 101-103. ISSN 1527-6988

MA, X. and CHENG, X., 2008. Verifying security protocols by knowledge analysis. International Journal of Security and Networks, 3 (3), pp. 183-192.

MA, X. and CHENG, X., 2005. Formal verification of merchant registration phase of SETProtocol. International Journal of Automation and Computing, 2005 (2), pp. 155-162.

MA, X. and CHENG, X., 2005. Verifying cryptographic protocols. IEEE Journal of Intelligent Cybernetic Systems, 2005 (1).

CHENG, X., HE, X., MA, X., ZHOU, D., DUAN, P. and ZHONG, S., 2005. An agent based education resource purvey system. Lecture Notes in Computer Science, 3801, pp. 381-386. ISSN 0302-9743

CHENG, X., MA, X., WANG, L. and ZHONG, S., 2005. A mobile agent based spam filter system. Lecture Notes in Computer Science, 3801, pp. 422-427. ISSN 0302-9743

Chapter in book

MA, X., CHENG, X., HUANG, S. and CHENG, M., 2008. Mechanical verification of cryptographic protocols. In: S. HUANG, D. MACCALLUM and D.Z. DU, eds., Network security. Springer.

Conference contribution

MA, X. and CHENG, X., 2006. Syntax, semantics and type theory of a security protocol verification framework. In: IEEE SMC UK-RI Conference on Advances in Cybernetic Systems 2006, Sheffield, September 2006, Sheffield.

MA, X., MCCRINDLE, R. and CHENG, X., 2006. Verifying and fixing password authenticationprotocol. In: Proceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Network, and Parallel/Distributed Computing (SNPD 2006) and the 2nd ACIS International Workshop on Self-Assembling Wireless Networks (SAWN 2006), Las Vegas.

MA, X. and CHENG, X., 2005. Formal verification of merchant registration phase of SET protocol. In: Proceedings of the 11th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2005), Sheffield.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Knowledge based approach for mechanical lyverifying security protocols. In: The Nineteenth International Joint Conference on Artificial Intelligence (IJCAI 2005), Edinburgh, Scotland, 30 July - 5 August 2005, Edinburgh.

CHENG, X., MA, X., CHENG, M. and HUANG, S.C.H., 2005. Proving secure properties of cryptographic protocols. In: 24th IEEE International Performance Computing and Communications Conference (IPCCC 2005), Phoenix, Arizona, 7-9 April 2005, Phoenix, Arizona.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Secrecy proofs of SET purchase request phase. In: Proceedings of the 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Verifying cardholder registration phase in SET protocol. In: Proceedings of the 2005 IEEE SMC UK-RI Conference on Applied Cybernetics (AC2005), London.

CHENG, X., HE, X., MA, X., ZHOU, D., DUAN, P. and ZHONG, S., 2005. An agent based education resource purvey system. In: The 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China, 15-19 December 2005, Xi'an, China.

CHENG, X., MA, X., WANG, L. and ZHONG, S., 2005. A mobile agent based spam filter system. In: The 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China, 15-19 December 2005, Xi'an, China.

HE, R., ZHONG, S., CHENG, X. and MA, X., 2005. A personalised search engine for Chinese educational resources. In: Proceedings of the 2005 IEEE SMC UK-RI Conference on Applied Cybernetics (AC2005), London.

SUN, P., MA, X., CHENG, X., YU, X. and ZHONG, S., 2004. Knowledge management for e-learning system. In: Proceedings of the 10th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2004), Liverpool.

MA, X. and CHENG, X., 2004. Verifying cryptographic protocols. In: Proceedings of the IEEESMC UK-RI 3rd Conference on Intelligent Cybernetic Systems (ICS'04), Londonderry.

HE, X., MA, X., CHENG, X., YU, X. and ZHONG, S., 2004. A mobile agent based intrusion detection system. In: Proceedings of the 10th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2004), Liverpool.

This list was generated on Mon Apr 15 22:23:49 2024 UTC.