The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Martijn Oostdijk: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Olga Caprotti, Martijn Oostdijk
    On Communicating Proofs in Interactive Mathematical Documents. [Citation Graph (0, 0)][DBLP]
    AISC, 2000, pp:53-64 [Conf]
  2. Sjouke Mauw, Martijn Oostdijk
    Foundations of Attack Trees. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:186-198 [Conf]
  3. Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur
    Crossing Borders: Security and Privacy Issues of the European e-Passport. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:152-167 [Conf]
  4. Engelbert Hubbers, Martijn Oostdijk, Erik Poll
    From Finite State Machines to Provably Correct Java Card Applets. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:465-470 [Conf]
  5. Arjen van Weelden, Martijn Oostdijk, Lars Frantzen, Pieter W. M. Koopman, Jan Tretmans
    On-the-Fly Formal Testing of a Smart Card Applet. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:565-576 [Conf]
  6. Engelbert Hubbers, Martijn Oostdijk, Erik Poll
    Implementing a Formally Verifiable Security Protocol in Java Card. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:213-226 [Conf]
  7. Bart Jacobs, Martijn Oostdijk, Martijn Warnier
    Source code verification of a secure payment applet. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2004, v:58, n:1-2, pp:107-120 [Journal]
  8. Olga Caprotti, Martijn Oostdijk
    Formal and Efficient Primality Proofs by Use of Computer Algebra Oracles. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 2001, v:32, n:1/2, pp:55-70 [Journal]
  9. Martijn Oostdijk, Herman Geuvers
    Proof by computation in the Coq system. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:272, n:1-2, pp:293-314 [Journal]
  10. Martijn Oostdijk, Vlad Rusu, Jan Tretmans, René G. de Vries, Tim A. C. Willemse
    Integrating Verification, Testing, and Learning for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    IFM, 2007, pp:538-557 [Conf]

  11. The KOA Remote Voting System: A Summary of Work to Date. [Citation Graph (, )][DBLP]


  12. Generating JML Specifications from UML State Diagrams. [Citation Graph (, )][DBLP]


  13. Crossing Borders: Security and Privacy Issues of the European e-Passport [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002