Author of the publication

Towards a Verified Model of the Algorand Consensus Protocol in Coq.

, , , , , , and . FM Workshops (1), volume 12232 of Lecture Notes in Computer Science, page 362-367. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Verified Model of the Algorand Consensus Protocol in Coq., , , , , , and . FM Workshops (1), volume 12232 of Lecture Notes in Computer Science, page 362-367. Springer, (2019)Executable rewriting logic semantics of Orc and formal analysis of Orc programs., and . J. Log. Algebraic Methods Program., 84 (4): 505-533 (2015)Resource and timing aspects of security protocols., , , , , , and . J. Comput. Secur., 29 (3): 299-340 (2021)A Symbolic Rewriting Semantics of the COMPASS Modeling Language.. IRI, page 283-290. IEEE Computer Society, (2017)On the Security and Complexity of Periodic Systems., , , , , and . SN Comput. Sci., 3 (5): 356 (2022)Statistical Model Checking of Distance Fraud Attacks on the Hancke-Kuhn Family of Protocols., , , , , and . CPS-SPC@CCS, page 60-71. ACM, (2018)On the Formalization and Computational Complexity of Resilience Problems for Cyber-Physical Systems., , , , , and . ICTAC, volume 13572 of Lecture Notes in Computer Science, page 96-113. Springer, (2022)Towards Formal Verification of Orchestration Computations Using the 핂 Framework., and . FM, volume 9109 of Lecture Notes in Computer Science, page 40-56. Springer, (2015)Resource-Bounded Intruders in Denial of Service Attacks., , , , , , and . CSF, page 382-396. IEEE, (2019)Program comprehension through reverse-engineered sequence diagrams: A systematic review., , and . Journal of Software: Evolution and Process, (2018)