Akhtar, Javed, Bailey, John, Weatherby, David, Shaikh, Siraj Ahmed ORCID: https://orcid.org/0000-0002-0726-3319, Ireland, David, Payne, Daniel, Antins, Luke and Barker, Dave
(2012)
Efficient and Reliable Transportation of Consignments (ERTOC).
International Journal of Applied Logistics, 3 (2 SRC).
pp. 40-52.
doi:10.4018/jal.2012040104
Shaikh, Siraj A ORCID: https://orcid.org/0000-0002-0726-3319
(2011)
Educational Attainment and Career Progression for British Muslim Women: Some Challenges and Opportunities.
Journal of Muslim Minority Affairs, 31 (1).
pp. 49-57.
doi:10.1080/13602004.2010.533458
Barbosa, Luis S., Petrenko, Alexander K., Cerone, Antonio and Shaikh, Siraj A ORCID: https://orcid.org/0000-0002-0726-3319
(2010)
Certification of opensource software A role for formal methods?
International Journal of Computer Systems Science Engineering, 25 (4 SRC).
pp. 273-281.
Shaikh, Siraj A ORCID: https://orcid.org/0000-0002-0726-3319 and Rabaiotti, Joseph R
(2010)
Characteristic trade-offs in designing large-scale biometric-based identity management systems.
Journal of Network and Computer Applications, 33 (3).
pp. 342-351.
doi:10.1016/j.jnca.2009.12.015
Shaikh, Siraj Ahmed ORCID: https://orcid.org/0000-0002-0726-3319
(2008)
Participation of Female Students in Computer Science Education: Case Study.
Learning and Teaching in Higher Education (3).
pp. 93-96.
Shaikh, SA ORCID: https://orcid.org/0000-0002-0726-3319 and Dimitriadis, C.K.
(2007)
A biometric authentication protocol for 3G mobile systems, modelled and validated using CSP and rank functions.
International Journal of Network Security, 5 (1).
pp. 99-111.
Shaikh, SA ORCID: https://orcid.org/0000-0002-0726-3319 and Bush, Vicky J
ORCID: https://orcid.org/0000-0002-8733-4358
(2006)
Analysing the Woo-Lam protocol using CSP and rank functions.
Journal of Research and Practice in Information Technology, 38 (1).
pp. 19-29.
Shaikh, SA ORCID: https://orcid.org/0000-0002-0726-3319 and Dimitriadis, C.
(2006)
Analysing a biometric authentication protocol for 3G mobile systems using CSP and rank functions.
In: Security in Pervasive Computing, Third International Conference, SPC 2006 York, UK Volume 3934 of Lecture Notes in Computer Science (LNCS).
ISBN 3-540-33376-2
Shaikh, SA ORCID: https://orcid.org/0000-0002-0726-3319, Bush, Vicky J
ORCID: https://orcid.org/0000-0002-8733-4358 and Schneider, S.A.
(2005)
Specifying authentication using signals events in CSP.
In: Conference on Information Security and Cryptology (CISC'2005), volume 3822 of Lecture Notes in Computer Science, Beijing, China..
ISBN 3-540-30855-5
Shaikh, Siraj A ORCID: https://orcid.org/0000-0002-0726-3319
(2006)
Analysing authentication protocols using CSP and rank functions.
PhD thesis, University of Gloucestershire.