DRank: A semi-automated requirements prioritization method based on preferences and dependencies F Shao, R Peng, H Lai, B Wang Journal of Systems and Software 126, 141-156, 2017 | 73 | 2017 |
A survey of RE-specific wikis for distributed requirements engineering H Lai, R Peng, D Sun, F Shao, Y Liu 2012 Eighth International Conference on Semantics, Knowledge and Grids, 47-55, 2012 | 6 | 2012 |
An attribute-driven model for trustworthy requirements elicitation F Shao, R Peng, D Sun, H Lai, YS Liu International Journal of Digital Content Technology and its Applications 6 …, 2012 | 6 | 2012 |
A Computer-assisted Framework for Accountability of Electronic Payment Protocol in Computational Model B Meng, F Shao, W Huang International Journal of Advancements in Computing Technology (IJACT) 3 (4 …, 2011 | 5 | 2011 |
Automatic proofs of deniable authentication protocols with a probabilistic polynomial calculus in computational model B Meng, F Shao, L Li, W Huang, D Wang International Journal of Digital Content Technology and its Applications 5 …, 2011 | 5 | 2011 |
Computationally sound mechanized proofs for deniable authentication protocols with a probabilistic polynomial calculus in computational model B Meng, F Shao Information Technology Journal 10 (3), 611-625, 2011 | 5 | 2011 |
一种基于领域知识的非功能需求建模辅助方法 邵飞, 彭蓉 计算机学报 36 (001), 39-53, 2013 | 4 | 2013 |
A systematic review of Re-specific wikis for distributed requirements engineering H Lai, R Peng, D Sun, F Shao, Y Liu, Y Ni Wuhan University, Wuhan, China, Tech. Rep 2012530, 2012 | 4 | 2012 |
A non-functional requirements modeling aided method based on domain knowledge F Shao, R Peng Jisuanji Xuebao(Chinese Journal of Computers) 36 (1), 39-53, 2013 | 1 | 2013 |
Mechanized Proof of Resistance of Denial of Service Attacks Based on Events with CryptoVerif in Computational Model B Meng, F Shao Advanced Science Letters 11 (1), 664-667, 2012 | 1 | 2012 |
Automatic proof of resistance of denial of service attacks in protocols B Meng, W Huang, DJ Wang, F Shao Journal of China Institute of Communications 33 (3), 112-121, 2012 | 1 | 2012 |
A Non-interactive Deniable Authentication Protocol based on Elliptic Curve Discrete Logarithm Problem F Shao, B Meng Energy Procedia, 1018-1025, 2011 | 1 | 2011 |
Computationally Sound Mechanized Proofs for Electronic Payment Protocol in a Probabilistic Polynomial Calculus with CryptoVerif B Meng, L Li, F Shao International Journal of Digital Content Technology and its Applications …, 2011 | 1 | 2011 |