The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kurt Stenzel: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
    A Method for Secure Smartcard Applications. [Citation Graph (0, 0)][DBLP]
    AMAST, 2002, pp:319-333 [Conf]
  2. Kurt Stenzel
    A Formally Verified Calculus for Full Java Card. [Citation Graph (0, 0)][DBLP]
    AMAST, 2004, pp:491-505 [Conf]
  3. Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    Proving System Correctness with KIV 3.0. [Citation Graph (0, 0)][DBLP]
    CADE, 1997, pp:69-72 [Conf]
  4. Holger Grandy, Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
    Developing Provable Secure M-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:115-129 [Conf]
  5. Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Andreas Thums
    Formal System Development with KIV. [Citation Graph (0, 0)][DBLP]
    FASE, 2000, pp:363-366 [Conf]
  6. Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    KIV 3.0 for Provably Correct Systems. [Citation Graph (0, 0)][DBLP]
    FM-Trends, 1998, pp:330-337 [Conf]
  7. Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    VSE: Controlling the Complexity in Formal Software Developments. [Citation Graph (0, 0)][DBLP]
    FM-Trends, 1998, pp:351-358 [Conf]
  8. Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
    A Construction Kit for Modeling the Security of M-commerce Applications. [Citation Graph (0, 0)][DBLP]
    FORTE Workshops, 2004, pp:72-85 [Conf]
  9. Wolfgang Reif, Kurt Stenzel
    Reuse of Proofs in Software Verification. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1993, pp:284-293 [Conf]
  10. Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    Formal Specification and Verification Using KIV. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1994, pp:787-787 [Conf]
  11. Dominik Haneberg, Alexander Kreibich, Wolfgang Reif, Kurt Stenzel
    Design for Trust: Security im M-Commerce. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2003, pp:91-94 [Conf]
  12. Thomas Fuchß, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    Three Selected Case Studies in Verification. [Citation Graph (0, 0)][DBLP]
    KORSO Book, 1995, pp:371-387 [Conf]
  13. Holger Grandy, Kurt Stenzel, Wolfgang Reif
    Object Oriented Verification Kernels for Secure Java Applications. [Citation Graph (0, 0)][DBLP]
    SEFM, 2005, pp:170-179 [Conf]
  14. Rainer Drexler, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Werner Stephan, Andreas Wolpers
    The KIV System: A Tool for Formal Program Development. [Citation Graph (0, 0)][DBLP]
    STACS, 1993, pp:704-705 [Conf]
  15. Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    Proving System Correctness with KIV. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1997, pp:859-862 [Conf]
  16. Dominik Haneberg, Kurt Stenzel, Wolfgang Reif
    Electronic-Onboard-Ticketing: Software Challenges of an State-of-the-Art M-Commerce Application. [Citation Graph (0, 0)][DBLP]
    Workshop Mobile Commerce, 2004, pp:103-113 [Conf]
  17. Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
    Tactics in KIV. [Citation Graph (0, 0)][DBLP]
    Elektronische Informationsverarbeitung und Kybernetik, 1994, v:30, n:5/6, pp:293-310 [Journal]
  18. Holger Grandy, Kurt Stenzel, Wolfgang Reif
    A Refinement Method for Java Programs. [Citation Graph (0, 0)][DBLP]
    FMOODS, 2007, pp:221-235 [Conf]

  19. SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. [Citation Graph (, )][DBLP]


  20. Pitfalls in Formal Reasoning about Security Protocols. [Citation Graph (, )][DBLP]


  21. Verification of Java Programs with Generics. [Citation Graph (, )][DBLP]


  22. Model-Driven Code Generation for Secure Smart Card Applications. [Citation Graph (, )][DBLP]


  23. Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code. [Citation Graph (, )][DBLP]


  24. ASN1-light: A Verified Message Encoding for Security Protocols. [Citation Graph (, )][DBLP]


  25. Formal Verification of Application-Specific Security Properties in a Model-Driven Approach. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002