The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mikael Buchholtz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Automatic Validation of Protocol Narration. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:126-140 [Conf]
  2. Mikael Buchholtz, Stephen Gilmore, Valentin Haenel, Carlo Montangero
    End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform. [Citation Graph (0, 0)][DBLP]
    FM, 2005, pp:286-301 [Conf]
  3. Hanne Riis Nielson, Flemming Nielson, Mikael Buchholtz
    Security for Mobility. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2002, pp:207-265 [Conf]
  4. Mikael Buchholtz, Carlo Montangero, Lara Perrone, Simone Semprini
    For-LySa: UML for Authentication Analysis. [Citation Graph (0, 0)][DBLP]
    Global Computing, 2004, pp:93-106 [Conf]
  5. Chiara Bodei, Mikael Buchholtz, Michele Curti, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson, Corrado Priami
    On Evaluating the Performance of Security Protocols. [Citation Graph (0, 0)][DBLP]
    PaCT, 2005, pp:1-15 [Conf]
  6. Flemming Nielson, Hanne Riis Nielson, Hongyan Sun, Mikael Buchholtz, René Rydhof Hansen, Henrik Pilegaard, Helmut Seidl
    The Succinct Solver Suite. [Citation Graph (0, 0)][DBLP]
    TACAS, 2004, pp:251-265 [Conf]
  7. Mikael Buchholtz
    Automated Analysis of Infinite Scenarios. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:334-352 [Conf]
  8. Chiara Bodei, Michele Curti, Pierpaolo Degano, Mikael Buchholtz, Flemming Nielson, Hanne Riis Nielson, Corrado Priami
    Performance Evaluation of Security Protocols Specified in LySa. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:112, n:, pp:167-189 [Journal]
  9. Mikael Buchholtz, Jacob Andersen, Hans Henrik Løvengreen
    Towards a Process Algebra for Shared Processors. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:52, n:3, pp:- [Journal]
  10. Mikael Buchholtz, Stephen T. Gilmore, Jane Hillston, Flemming Nielson
    Securing Statically-verified Communications Protocols Against Timing Attacks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:128, n:4, pp:123-143 [Journal]
  11. Mikael Buchholtz, Hanne Riis Nielson, Flemming Nielson
    A calculus for control flow analysis of security protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:145-167 [Journal]
  12. Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
    Static validation of security protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:3, pp:347-390 [Journal]

Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002