|
Search the dblp DataBase
Mikael Buchholtz:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Automatic Validation of Protocol Narration. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:126-140 [Conf]
- Mikael Buchholtz, Stephen Gilmore, Valentin Haenel, Carlo Montangero
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform. [Citation Graph (0, 0)][DBLP] FM, 2005, pp:286-301 [Conf]
- Hanne Riis Nielson, Flemming Nielson, Mikael Buchholtz
Security for Mobility. [Citation Graph (0, 0)][DBLP] FOSAD, 2002, pp:207-265 [Conf]
- Mikael Buchholtz, Carlo Montangero, Lara Perrone, Simone Semprini
For-LySa: UML for Authentication Analysis. [Citation Graph (0, 0)][DBLP] Global Computing, 2004, pp:93-106 [Conf]
- Chiara Bodei, Mikael Buchholtz, Michele Curti, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson, Corrado Priami
On Evaluating the Performance of Security Protocols. [Citation Graph (0, 0)][DBLP] PaCT, 2005, pp:1-15 [Conf]
- Flemming Nielson, Hanne Riis Nielson, Hongyan Sun, Mikael Buchholtz, René Rydhof Hansen, Henrik Pilegaard, Helmut Seidl
The Succinct Solver Suite. [Citation Graph (0, 0)][DBLP] TACAS, 2004, pp:251-265 [Conf]
- Mikael Buchholtz
Automated Analysis of Infinite Scenarios. [Citation Graph (0, 0)][DBLP] TGC, 2005, pp:334-352 [Conf]
- Chiara Bodei, Michele Curti, Pierpaolo Degano, Mikael Buchholtz, Flemming Nielson, Hanne Riis Nielson, Corrado Priami
Performance Evaluation of Security Protocols Specified in LySa. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:112, n:, pp:167-189 [Journal]
- Mikael Buchholtz, Jacob Andersen, Hans Henrik Løvengreen
Towards a Process Algebra for Shared Processors. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2001, v:52, n:3, pp:- [Journal]
- Mikael Buchholtz, Stephen T. Gilmore, Jane Hillston, Flemming Nielson
Securing Statically-verified Communications Protocols Against Timing Attacks. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:128, n:4, pp:123-143 [Journal]
- Mikael Buchholtz, Hanne Riis Nielson, Flemming Nielson
A calculus for control flow analysis of security protocols. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:145-167 [Journal]
- Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Static validation of security protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:347-390 [Journal]
Search in 0.002secs, Finished in 0.002secs
|