The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Peter van Rossum: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marco Bozzano, Roberto Bruttomesso, Alessandro Cimatti, Tommi A. Junttila, Peter van Rossum, Stephan Schulz, Roberto Sebastiani
    The MathSAT 3 System. [Citation Graph (0, 0)][DBLP]
    CADE, 2005, pp:315-321 [Conf]
  2. Marco Bozzano, Roberto Bruttomesso, Alessandro Cimatti, Tommi A. Junttila, Silvio Ranise, Peter van Rossum, Roberto Sebastiani
    Efficient Satisfiability Modulo Theories via Delayed Theory Combination. [Citation Graph (0, 0)][DBLP]
    CAV, 2005, pp:335-349 [Conf]
  3. Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Peter van Rossum
    Provable anonymity. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:63-72 [Conf]
  4. Flavio D. Garcia, Peter van Rossum
    Sound Computational Interpretation of Symbolic Hashes in the Standard Model. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:33-47 [Conf]
  5. Marco Bozzano, Roberto Bruttomesso, Alessandro Cimatti, Tommi A. Junttila, Peter van Rossum, Stephan Schulz, Roberto Sebastiani
    An Incremental and Layered Procedure for the Satisfiability of Linear Arithmetic Logic. [Citation Graph (0, 0)][DBLP]
    TACAS, 2005, pp:317-333 [Conf]
  6. Marco Bozzano, Roberto Bruttomesso, Alessandro Cimatti, Tommi A. Junttila, Silvio Ranise, Peter van Rossum, Roberto Sebastiani
    Efficient theory combination via boolean search. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2006, v:204, n:10, pp:1493-1525 [Journal]
  7. Marco Bozzano, Roberto Bruttomesso, Alessandro Cimatti, Tommi A. Junttila, Peter van Rossum, Stephan Schulz, Roberto Sebastiani
    MathSAT: Tight Integration of SAT and Mathematical Decision Procedures. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2005, v:35, n:1-3, pp:265-293 [Journal]
  8. Flavio D. Garcia, Peter van Rossum, Ana Sokolova
    Probabilistic Anonymity and Admissible Schedulers [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  9. Modeling Privacy for Off-Line RFID Systems. [Citation Graph (, )][DBLP]


  10. Dismantling MIFARE Classic. [Citation Graph (, )][DBLP]


  11. Significant Diagnostic Counterexamples in Probabilistic Model Checking. [Citation Graph (, )][DBLP]


  12. Computational Soundness of Non-Malleable Commitments. [Citation Graph (, )][DBLP]


  13. Client-Server Password Recovery. [Citation Graph (, )][DBLP]


  14. Wirelessly Pickpocketing a Mifare Classic Card. [Citation Graph (, )][DBLP]


  15. Computing the Leakage of Information-Hiding Systems. [Citation Graph (, )][DBLP]


  16. Conditional Probabilities over Probabilistic and Nondeterministic Systems. [Citation Graph (, )][DBLP]


  17. Significant Diagnostic Counterexamples in Probabilistic Model Checking [Citation Graph (, )][DBLP]


  18. Client-Server Password Recovery (Extended Abstract) [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002