The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David von Oheimb: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David von Oheimb, Thomas F. Gritzner
    RALL: Machine-Supported Proofs for Relation Algebra. [Citation Graph (0, 0)][DBLP]
    CADE, 1997, pp:380-394 [Conf]
  2. Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron
    The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. [Citation Graph (0, 0)][DBLP]
    CAV, 2005, pp:281-285 [Conf]
  3. David von Oheimb
    Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:225-243 [Conf]
  4. David von Oheimb, Volkmar Lotz
    Formal Security Analysis with Interacting State Machines. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:212-228 [Conf]
  5. David von Oheimb, Georg Walter, Volkmar Lotz
    A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:217-234 [Conf]
  6. David von Oheimb
    Interacting State Machines: A Stateful Approach to Proving Security. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:15-32 [Conf]
  7. Thomas A. Kuhn, David von Oheimb
    Interacting State Machines for Mobility. [Citation Graph (0, 0)][DBLP]
    FME, 2003, pp:698-718 [Conf]
  8. David von Oheimb
    Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:592-597 [Conf]
  9. David von Oheimb, Tobias Nipkow
    Hoare Logic for NanoJava: Auxiliary Variables, Side Effects, and Virtual Methods Revisited. [Citation Graph (0, 0)][DBLP]
    FME, 2002, pp:89-105 [Conf]
  10. David von Oheimb
    Hoare Logic for Mutual Recursion and Local Variables. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1999, pp:168-180 [Conf]
  11. David von Oheimb, Volkmar Lotz
    Generic Interacting State Machines and Their Instantiation with Dynamic Features. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2003, pp:144-166 [Conf]
  12. David von Oheimb, Jorge Cuéllar
    Designing and Verifying Core Protocols for Location Privacy. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:502-516 [Conf]
  13. David von Oheimb, Tobias Nipkow
    Machine-Checking the Java Specification: Proving Type-Safety. [Citation Graph (0, 0)][DBLP]
    Formal Syntax and Semantics of Java, 1999, pp:119-156 [Conf]
  14. David von Oheimb, Cornelia Pusch
    Java - formal fundiert. [Citation Graph (0, 0)][DBLP]
    Java-Informations-Tage, 1998, pp:77-86 [Conf]
  15. Tobias Nipkow, David von Oheimb
    Javalight is Type-Safe - Definitely. [Citation Graph (0, 0)][DBLP]
    POPL, 1998, pp:161-170 [Conf]
  16. David von Oheimb
    Hoare logic for Java in Isabelle/HOL. [Citation Graph (0, 0)][DBLP]
    Concurrency and Computation: Practice and Experience, 2001, v:13, n:13, pp:1173-1214 [Journal]
  17. David von Oheimb, Volkmar Lotz, Georg Walter
    Analyzing SLE 88 memory management security using Interacting State Machines. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:155-171 [Journal]
  18. Olaf Müller, Tobias Nipkow, David von Oheimb, Oscar Slotosch
    HOLCF=HOL+LCF. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 1999, v:9, n:2, pp:191-223 [Journal]
  19. Richard Robinson, Mingyan Li, Scott Lintelman, Krishna Sampigethaya, Radha Poovendran, David von Oheimb, Jens-Uwe Bußer, Jorge Cuéllar
    Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2007, pp:28-39 [Conf]

  20. Formal Security Analysis in Industry, at the Example of Electronic Distribution of Aircraft Software (EDS). [Citation Graph (, )][DBLP]


  21. Formal Security Analysis of Electronic Software Distribution Systems. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002