Holger Grandy

According to our database1, Holger Grandy authored at least 15 papers between 2005 and 2009.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2009
Specification based testing of automotive human machine interfaces.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

A Systematic Verification Approach for Mondex Electronic Purses Using ASMs.
Proceedings of the Rigorous Methods for Software Construction and Analysis, 2009

Model-Driven Code Generation for Secure Smart Card Applications.
Proceedings of the 20th Australian Software Engineering Conference (ASWEC 2009), 2009

SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Formale Verifikation der Korrektheit sicherheitskritischer Java-Anwendungen.
PhD thesis, 2008

Verification of Mondex electronic purses with KIV: from transactions to a security protocol.
Formal Aspects Comput., 2008

Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code.
Proceedings of the FM 2008: Formal Methods, 2008

Verification of Java Programs with Generics.
Proceedings of the Algebraic Methodology and Software Technology, 2008

2007
ASN1-light: A Verified Message Encoding for Security Protocols.
Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 2007

Verifying Smart Card Applications: An ASM Approach.
Proceedings of the Integrated Formal Methods, 6th International Conference, 2007

A Refinement Method for Java Programs.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2007

2006
The Mondex Challenge: Machine Checked Proofs for an Electronic Purse.
Proceedings of the FM 2006: Formal Methods, 2006

Developing Provable Secure M-Commerce Applications.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Object Oriented Verification Kernels for Secure Java Applications.
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005

Verifying Security Protocols: An ASM Approach.
Proceedings of the 12th International Workshop on Abstract State Machines, 2005


  Loading...