Mikael Buchholtz

According to our database1, Mikael Buchholtz authored at least 12 papers between 2001 and 2005.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2005
Static validation of security protocols.
J. Comput. Secur., 2005

Automated Analysis of Infinite Scenarios.
Proceedings of the Trustworthy Global Computing, International Symposium, 2005

On Evaluating the Performance of Security Protocols.
Proceedings of the Parallel Computing Technologies, 2005

End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform.
Proceedings of the FM 2005: Formal Methods, 2005

2004
A calculus for control flow analysis of security protocols.
Int. J. Inf. Sec., 2004

Securing Statically-verified Communications Protocols Against Timing Attacks.
Proceedings of the First International Workshop on Practical Applications of Stochastic Modelling, 2004

Performance Evaluation of Security Protocols Specified in LySa.
Proceedings of the Second Workshop on Quantitative Aspects of Programming Languages, 2004

The Succinct Solver Suite.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2004

For-LySa: UML for Authentication Analysis.
Proceedings of the Global Computing, IST/FET International Workshop, 2004

2003
Automatic Validation of Protocol Narration.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2002
Security for Mobility.
Proceedings of the Foundations of Security Analysis and Design II, 2002

2001
Towards a Process Algebra for Shared Processors.
Proceedings of the International Workshop on Models for Time-Critical Systems, 2001


  Loading...