Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Metric Spaces as Models for Real-Time Concurrency., and . MFPS, volume 298 of Lecture Notes in Computer Science, page 331-343. Springer, (1987)The Missing Link: Human Interactive Security Protocols in Mobile Payment., , , and . IWSEC (Short Papers), page 94-109. Information Processing Society of Japan (IPSJ), (2010)Formal Verification of Arbitrary Network Topologies., and . PDPTA, page 1033-1039. CSREA Press, (1999)Hierarchical Compression for Model-Checking CSP or How to Check 1020 Dining Philosophers for Deadlock., , , , , and . TACAS, volume 1019 of Lecture Notes in Computer Science, page 133-152. Springer, (1995)Tutorial on FDR and Its Applications., and . SPIN, volume 1885 of Lecture Notes in Computer Science, page 322. Springer, (2000)The laws of OCCAM programming, and . Theoretical Computer Science, 60 (2): 177--229 (September 1988)On the expressive power of CSP refinement.. Formal Aspects Comput., 17 (2): 93-112 (2005)On model checking data-independent systems with arrays without reset., , and . Theory Pract. Log. Program., 4 (5-6): 659-693 (2004)Machine-Verifiable Responsiveness., , and . AVoCS, volume 145 of Electronic Notes in Theoretical Computer Science, page 185-200. Elsevier, (2005)Modelling and verifying key-exchange protocols using CSP and FDR.. CSFW, page 98-107. IEEE Computer Society, (1995)