Follow
Fei Shao
Fei Shao
state key lab of software enginerring,computer school,wuhan university
Verified email at whu.edu.cn
Title
Cited by
Cited by
Year
DRank: A semi-automated requirements prioritization method based on preferences and dependencies
F Shao, R Peng, H Lai, B Wang
Journal of Systems and Software 126, 141-156, 2017
732017
A survey of RE-specific wikis for distributed requirements engineering
H Lai, R Peng, D Sun, F Shao, Y Liu
2012 Eighth International Conference on Semantics, Knowledge and Grids, 47-55, 2012
62012
An attribute-driven model for trustworthy requirements elicitation
F Shao, R Peng, D Sun, H Lai, YS Liu
International Journal of Digital Content Technology and its Applications 6 …, 2012
62012
A Computer-assisted Framework for Accountability of Electronic Payment Protocol in Computational Model
B Meng, F Shao, W Huang
International Journal of Advancements in Computing Technology (IJACT) 3 (4 …, 2011
52011
Automatic proofs of deniable authentication protocols with a probabilistic polynomial calculus in computational model
B Meng, F Shao, L Li, W Huang, D Wang
International Journal of Digital Content Technology and its Applications 5 …, 2011
52011
Computationally sound mechanized proofs for deniable authentication protocols with a probabilistic polynomial calculus in computational model
B Meng, F Shao
Information Technology Journal 10 (3), 611-625, 2011
52011
一种基于领域知识的非功能需求建模辅助方法
邵飞, 彭蓉
计算机学报 36 (001), 39-53, 2013
42013
A systematic review of Re-specific wikis for distributed requirements engineering
H Lai, R Peng, D Sun, F Shao, Y Liu, Y Ni
Wuhan University, Wuhan, China, Tech. Rep 2012530, 2012
42012
A non-functional requirements modeling aided method based on domain knowledge
F Shao, R Peng
Jisuanji Xuebao(Chinese Journal of Computers) 36 (1), 39-53, 2013
12013
Mechanized Proof of Resistance of Denial of Service Attacks Based on Events with CryptoVerif in Computational Model
B Meng, F Shao
Advanced Science Letters 11 (1), 664-667, 2012
12012
Automatic proof of resistance of denial of service attacks in protocols
B Meng, W Huang, DJ Wang, F Shao
Journal of China Institute of Communications 33 (3), 112-121, 2012
12012
A Non-interactive Deniable Authentication Protocol based on Elliptic Curve Discrete Logarithm Problem
F Shao, B Meng
Energy Procedia, 1018-1025, 2011
12011
Computationally Sound Mechanized Proofs for Electronic Payment Protocol in a Probabilistic Polynomial Calculus with CryptoVerif
B Meng, L Li, F Shao
International Journal of Digital Content Technology and its Applications …, 2011
12011
The system can't perform the operation now. Try again later.
Articles 1–13