|
Search the dblp DataBase
Kurt Stenzel:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
A Method for Secure Smartcard Applications. [Citation Graph (0, 0)][DBLP] AMAST, 2002, pp:319-333 [Conf]
- Kurt Stenzel
A Formally Verified Calculus for Full Java Card. [Citation Graph (0, 0)][DBLP] AMAST, 2004, pp:491-505 [Conf]
- Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
Proving System Correctness with KIV 3.0. [Citation Graph (0, 0)][DBLP] CADE, 1997, pp:69-72 [Conf]
- Holger Grandy, Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
Developing Provable Secure M-Commerce Applications. [Citation Graph (0, 0)][DBLP] ETRICS, 2006, pp:115-129 [Conf]
- Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Andreas Thums
Formal System Development with KIV. [Citation Graph (0, 0)][DBLP] FASE, 2000, pp:363-366 [Conf]
- Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
KIV 3.0 for Provably Correct Systems. [Citation Graph (0, 0)][DBLP] FM-Trends, 1998, pp:330-337 [Conf]
- Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
VSE: Controlling the Complexity in Formal Software Developments. [Citation Graph (0, 0)][DBLP] FM-Trends, 1998, pp:351-358 [Conf]
- Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
A Construction Kit for Modeling the Security of M-commerce Applications. [Citation Graph (0, 0)][DBLP] FORTE Workshops, 2004, pp:72-85 [Conf]
- Wolfgang Reif, Kurt Stenzel
Reuse of Proofs in Software Verification. [Citation Graph (0, 0)][DBLP] FSTTCS, 1993, pp:284-293 [Conf]
- Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
Formal Specification and Verification Using KIV. [Citation Graph (0, 0)][DBLP] FTRTFT, 1994, pp:787-787 [Conf]
- Dominik Haneberg, Alexander Kreibich, Wolfgang Reif, Kurt Stenzel
Design for Trust: Security im M-Commerce. [Citation Graph (0, 0)][DBLP] GI Jahrestagung (1), 2003, pp:91-94 [Conf]
- Thomas Fuchß, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
Three Selected Case Studies in Verification. [Citation Graph (0, 0)][DBLP] KORSO Book, 1995, pp:371-387 [Conf]
- Holger Grandy, Kurt Stenzel, Wolfgang Reif
Object Oriented Verification Kernels for Secure Java Applications. [Citation Graph (0, 0)][DBLP] SEFM, 2005, pp:170-179 [Conf]
- Rainer Drexler, Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel, Werner Stephan, Andreas Wolpers
The KIV System: A Tool for Formal Program Development. [Citation Graph (0, 0)][DBLP] STACS, 1993, pp:704-705 [Conf]
- Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
Proving System Correctness with KIV. [Citation Graph (0, 0)][DBLP] TAPSOFT, 1997, pp:859-862 [Conf]
- Dominik Haneberg, Kurt Stenzel, Wolfgang Reif
Electronic-Onboard-Ticketing: Software Challenges of an State-of-the-Art M-Commerce Application. [Citation Graph (0, 0)][DBLP] Workshop Mobile Commerce, 2004, pp:103-113 [Conf]
- Wolfgang Reif, Gerhard Schellhorn, Kurt Stenzel
Tactics in KIV. [Citation Graph (0, 0)][DBLP] Elektronische Informationsverarbeitung und Kybernetik, 1994, v:30, n:5/6, pp:293-310 [Journal]
- Holger Grandy, Kurt Stenzel, Wolfgang Reif
A Refinement Method for Java Programs. [Citation Graph (0, 0)][DBLP] FMOODS, 2007, pp:221-235 [Conf]
SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. [Citation Graph (, )][DBLP]
Pitfalls in Formal Reasoning about Security Protocols. [Citation Graph (, )][DBLP]
Verification of Java Programs with Generics. [Citation Graph (, )][DBLP]
Model-Driven Code Generation for Secure Smart Card Applications. [Citation Graph (, )][DBLP]
Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code. [Citation Graph (, )][DBLP]
ASN1-light: A Verified Message Encoding for Security Protocols. [Citation Graph (, )][DBLP]
Formal Verification of Application-Specific Security Properties in a Model-Driven Approach. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|