The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jan Cederquist: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw
    A Certified Email Protocol Using Key Chains. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:525-530 [Conf]
  2. Gilles Barthe, Jan Cederquist, Sabrina Tarento
    A Machine-Checked Formalization of the Generic Model and the Random Oracle Model. [Citation Graph (0, 0)][DBLP]
    IJCAR, 2004, pp:385-399 [Conf]
  3. Jan Cederquist, Muhammad Torabi Dashti
    An intruder model for verifying liveness in security protocols. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:23-32 [Conf]
  4. Jan Cederquist, Muhammad Torabi Dashti
    Formal Analysis of a Fair Payment Protocol. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:41-54 [Conf]
  5. Jan Cederquist
    An Implementation of the Heine-Borel Covering Theorem in Type Theory. [Citation Graph (0, 0)][DBLP]
    TYPES, 1996, pp:46-65 [Conf]
  6. Jan Cederquist, Sara Negri
    A Constructive Proof of the Heine-Borel Covering Theorem for Formal Reals. [Citation Graph (0, 0)][DBLP]
    TYPES, 1995, pp:62-75 [Conf]

Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002