|
Search the dblp DataBase
Jan Cederquist:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw
A Certified Email Protocol Using Key Chains. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:525-530 [Conf]
- Gilles Barthe, Jan Cederquist, Sabrina Tarento
A Machine-Checked Formalization of the Generic Model and the Random Oracle Model. [Citation Graph (0, 0)][DBLP] IJCAR, 2004, pp:385-399 [Conf]
- Jan Cederquist, Muhammad Torabi Dashti
An intruder model for verifying liveness in security protocols. [Citation Graph (0, 0)][DBLP] FMSE, 2006, pp:23-32 [Conf]
- Jan Cederquist, Muhammad Torabi Dashti
Formal Analysis of a Fair Payment Protocol. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:41-54 [Conf]
- Jan Cederquist
An Implementation of the Heine-Borel Covering Theorem in Type Theory. [Citation Graph (0, 0)][DBLP] TYPES, 1996, pp:46-65 [Conf]
- Jan Cederquist, Sara Negri
A Constructive Proof of the Heine-Borel Covering Theorem for Formal Reals. [Citation Graph (0, 0)][DBLP] TYPES, 1995, pp:62-75 [Conf]
Search in 0.001secs, Finished in 0.001secs
|