The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dieter Hutter: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Serge Autexier, Dieter Hutter, Till Mossakowski, Axel Schairer
    The Development Graph Manager MAYA. [Citation Graph (0, 0)][DBLP]
    AMAST, 2002, pp:495-501 [Conf]
  2. Axel Schairer, Dieter Hutter
    Proof Transformations for Evolutionary Formal Software Development. [Citation Graph (0, 0)][DBLP]
    AMAST, 2002, pp:441-456 [Conf]
  3. Fernando Godínez, Dieter Hutter, Raul Monroy
    Attribute Reduction for Effective Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AWIC, 2004, pp:74-83 [Conf]
  4. Dieter Hutter, Serge Autexier
    Formal Software Development in MAYA. [Citation Graph (0, 0)][DBLP]
    Mechanizing Mathematical Reasoning, 2005, pp:407-432 [Conf]
  5. Dieter Hutter, Werner Stephan
    A Portrait of a Scientist: Logic, AI and Politics. [Citation Graph (0, 0)][DBLP]
    Mechanizing Mathematical Reasoning, 2005, pp:1-13 [Conf]
  6. Susanne Biundo, B. Hummel, Dieter Hutter, Christoph Walther
    The Karlsruhe Induction Theorem Proving System. [Citation Graph (0, 0)][DBLP]
    CADE, 1986, pp:672-674 [Conf]
  7. Serge Autexier, Dieter Hutter, Heiko Mantel, Axel Schairer
    System Description: inka 5.0 - A Logic Voyager. [Citation Graph (0, 0)][DBLP]
    CADE, 1999, pp:207-211 [Conf]
  8. Dieter Hutter
    Guiding Induction Proofs. [Citation Graph (0, 0)][DBLP]
    CADE, 1990, pp:147-161 [Conf]
  9. Dieter Hutter
    Synthesis of Induction Orderings for Existence Proofs. [Citation Graph (0, 0)][DBLP]
    CADE, 1994, pp:29-41 [Conf]
  10. Dieter Hutter, Alan Bundy
    The Design of the CADE-16 Inductive Theorem Prover Contest. [Citation Graph (0, 0)][DBLP]
    CADE, 1999, pp:374-377 [Conf]
  11. Dieter Hutter, Michael Kohlhase
    A Colored Version of the Lambda-Calculus. [Citation Graph (0, 0)][DBLP]
    CADE, 1997, pp:291-305 [Conf]
  12. Dieter Hutter, Claus Sengler
    INKA: The Next Generation. [Citation Graph (0, 0)][DBLP]
    CADE, 1996, pp:288-292 [Conf]
  13. Dieter Hutter
    Adapting a Resolution Calculus for Inductive Proofs. [Citation Graph (0, 0)][DBLP]
    ECAI, 1992, pp:65-69 [Conf]
  14. Dieter Hutter, Axel Schairer
    Possibilistic Information Flow Control in the Presence of Encrypted Communication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:209-224 [Conf]
  15. Fernando Godínez, Dieter Hutter, Raul Monroy
    On the Use of Word Networks to Mimicry Attack Detection. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:423-435 [Conf]
  16. Dieter Hutter
    Possibilistic Information Flow Control in MAKS and Action Refinement. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:268-281 [Conf]
  17. Melanie Volkamer, Dieter Hutter
    From Legal Principles to an Internet Voting System. [Citation Graph (0, 0)][DBLP]
    Electronic Voting in Europe, 2004, pp:111-120 [Conf]
  18. Till Mossakowski, Serge Autexier, Dieter Hutter
    Extending Development Graphs with Hiding. [Citation Graph (0, 0)][DBLP]
    FASE, 2001, pp:269-283 [Conf]
  19. Fernando Godínez, Dieter Hutter, Raul Monroy
    Audit File Reduction Using N-Gram Models. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:336-340 [Conf]
  20. Dieter Hutter, Georg Rock, Jörg H. Siekmann, Werner Stephan, Roland Vogt
    Formal Software Development in the Verification Support Environment (VSE). [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2000, pp:367-376 [Conf]
  21. Dieter Hutter, Bruno Langenstein, Claus Sengler, Jörg H. Siekmann, Werner Stephan, Andreas Wolpers
    Deduction in the Verification Support Environment (VSE). [Citation Graph (0, 0)][DBLP]
    FME, 1996, pp:268-286 [Conf]
  22. Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    VSE: Controlling the Complexity in Formal Software Developments. [Citation Graph (0, 0)][DBLP]
    FM-Trends, 1998, pp:351-358 [Conf]
  23. Jürgen Cleve, Dieter Hutter
    A Methodology for Equational Reasoning. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1994, pp:569-579 [Conf]
  24. Fernando Godínez, Dieter Hutter, Raul Monroy
    On the Role of Information Compaction to Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ISSADS, 2005, pp:83-97 [Conf]
  25. Ewen Denney, Bernd Fischer, Dieter Hutter, Mark Jones
    Software certificate management (SoftCeMent'05). [Citation Graph (0, 0)][DBLP]
    ASE, 2005, pp:463- [Conf]
  26. Dieter Hutter
    Management of Change in Structured Verification. [Citation Graph (0, 0)][DBLP]
    ASE, 2000, pp:23-0 [Conf]
  27. Dieter Hutter, Axel Schairer
    Towards an Evolutionary Formal Software Development. [Citation Graph (0, 0)][DBLP]
    ASE, 2001, pp:417-420 [Conf]
  28. Dieter Hutter
    Using Resolution and Paramodulation for Induction Proofs. [Citation Graph (0, 0)][DBLP]
    GWAI, 1986, pp:265-276 [Conf]
  29. Dieter Hutter
    Using Rippling for Equational Reasoning. [Citation Graph (0, 0)][DBLP]
    KI, 1996, pp:121-133 [Conf]
  30. Dieter Hutter
    Deductive Verification of Invariants of State-Transition Systems. [Citation Graph (0, 0)][DBLP]
    KI, 1998, pp:153-164 [Conf]
  31. Serge Autexier, Dieter Hutter
    Maintenance of Formal Software Developments by Stratified Verification. [Citation Graph (0, 0)][DBLP]
    LPAR, 2002, pp:36-52 [Conf]
  32. Dieter Hutter, Werner Stephan, Markus Ullmann
    Security and Privacy in Pervasive Computing State of the Art and Future Directions. [Citation Graph (0, 0)][DBLP]
    SPC, 2003, pp:285-289 [Conf]
  33. Dieter Hutter, Melanie Volkamer
    Information Flow Control to Secure Dynamic Web Service Composition. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:196-210 [Conf]
  34. Markus Ullmann, H. Hauff, D. Loevenich, P. Kejwal, R. Förster, P. Baur, Wolfgang Reif, Werner Stephan, Andreas Wolpers, Jürgen Cleve, Dieter Hutter, Claus Sengler, E. Canver
    VSE Verification Support Environment: Ein Werkzeug zur Entwicklung vertrauenswürdiger und zuverlässiger Systeme in Anlehnung an gültige Sicherheitskriterien. [Citation Graph (0, 0)][DBLP]
    VIS, 1993, pp:175-190 [Conf]
  35. Serge Autexier, Dieter Hutter, Heiko Mantel, Axel Schairer
    Towards an Evolutionary Formal Software-Development Using CASL. [Citation Graph (0, 0)][DBLP]
    WADT, 1999, pp:73-88 [Conf]
  36. Bernd Krieg-Brückner, Dieter Hutter, Arne Lindow, Christoph Lüth, Achim Mahnke, Erica Melis, Philipp Meier, Arnd Poetzsch-Heffter, Markus Roggenbach, George Russell, Jan-Georg Smaus, Martin Wirsing
    MultiMedia Instruction in Safe and Secure Systems. [Citation Graph (0, 0)][DBLP]
    WADT, 2002, pp:82-117 [Conf]
  37. Fernando Godínez, Dieter Hutter, Raul Monroy
    Service Discrimination and Audit File Reduction for Effective Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:99-113 [Conf]
  38. Dieter Hutter
    Annotated reasoning. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2000, v:29, n:1-4, pp:183-222 [Journal]
  39. Klaus Fischer, Dieter Hutter
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:63, n:, pp:- [Journal]
  40. Klaus Fischer, Dieter Hutter, Matthias Klusch, Werner Stephan
    Towards Secure Mobile Multiagent Based Electronic Marketplace Systems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:63, n:, pp:- [Journal]
  41. Dieter Hutter
    Deduction as an Engineering Science. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2003, v:86, n:1, pp:- [Journal]
  42. Juan Carlos López Pimentel, Raul Monroy, Dieter Hutter
    A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:174, n:4, pp:117-130 [Journal]
  43. Dieter Hutter, Heiko Mantel, Ina Schaefer, Axel Schairer
    Security of multi-agent systems: A case study on comparison shopping. [Citation Graph (0, 0)][DBLP]
    J. Applied Logic, 2007, v:5, n:2, pp:303-332 [Journal]
  44. Dieter Hutter
    Coloring Terms to Control Equational Reasoning. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 1997, v:18, n:3, pp:399-442 [Journal]
  45. Dieter Hutter, Michael Kohlhase
    Managing Structural Information by Higher-Order Colored Unification. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2000, v:25, n:2, pp:123-164 [Journal]
  46. Dieter Hutter, Bruno Langenstein, Georg Rock, Jörg H. Siekmann, Werner Stephan, Roland Vogt
    Formal software development in the Verification Support Environment (VSE). [Citation Graph (0, 0)][DBLP]
    J. Exp. Theor. Artif. Intell., 2000, v:12, n:4, pp:383-406 [Journal]
  47. Till Mossakowski, Serge Autexier, Dieter Hutter
    Development graphs - Proof management for structured specifications. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2006, v:67, n:1-2, pp:114-145 [Journal]
  48. Serge Autexier, Dieter Hutter, Bruno Langenstein, Heiko Mantel, Georg Rock, Axel Schairer, Werner Stephan, Roland Vogt, Andreas Wolpers
    VSE: formal methods meet industrial needs. [Citation Graph (0, 0)][DBLP]
    STTT, 2000, v:3, n:1, pp:66-77 [Journal]
  49. Axel Schairer, Serge Autexier, Dieter Hutter
    A Pragmatic Approach to Reuse in Tactical Theorem Proving. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:58, n:2, pp:- [Journal]
  50. Juan Carlos López Pimentel, Raul Monroy, Dieter Hutter
    On the Automated Correction of Security Protocols Susceptible to a Replay Attack. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:594-609 [Conf]

  51. Information Flow in Disaster Management Systems. [Citation Graph (, )][DBLP]


  52. On the Automated Correction of Protocols with Improper Message Encoding. [Citation Graph (, )][DBLP]


  53. Semantic Management of Heterogeneous Documents. [Citation Graph (, )][DBLP]


  54. Information Flow Analysis Based Security Checking of Health Service Composition Plans. [Citation Graph (, )][DBLP]


Search in 0.167secs, Finished in 0.169secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002