Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VDM at Large: Modelling the EMV® 2^nd 2 nd Generation Kernel.. SBMF, volume 11254 of Lecture Notes in Computer Science, page 109-125. Springer, (2018)Using formal methods for security in the Xenon project., and . CSIIRW, page 67. ACM, (2010)VDM recursive functions in Isabelle/HOL., and . CoRR, (2023)A Chain Datatype in Z., and . Int. J. Softw. Informatics, 3 (2-3): 357-374 (2009)POSIX file store in Z/Eves: An experiment in the verified software repository., , and . Sci. Comput. Program., 74 (4): 238-257 (2009)Formal techniques in the safety analysis of software components of a new dialysis machine., , , , , , and . Sci. Comput. Program., (2019)Safety Analysis of Software Components of a Dialysis Machine Using Model Checking., , , , , , and . FACS, volume 10487 of Lecture Notes in Computer Science, page 137-154. Springer, (2017)Formalizing workflows partitioning over federated clouds: multi-level security and costs., and . Int. J. Comput. Math., 91 (5): 881-906 (2014)Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN., , , , and . ACM Conference on Computer and Communications Security, page 716-726. ACM, (2014)FDR Explorer, and . Electron. Notes Theor. Comput. Sci., (2007)