2005 |
12 | EE | Mikael Buchholtz,
Stephen Gilmore,
Valentin Haenel,
Carlo Montangero:
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform.
FM 2005: 286-301 |
11 | EE | Chiara Bodei,
Mikael Buchholtz,
Michele Curti,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson,
Corrado Priami:
On Evaluating the Performance of Security Protocols.
PaCT 2005: 1-15 |
10 | EE | Mikael Buchholtz:
Automated Analysis of Infinite Scenarios.
TGC 2005: 334-352 |
9 | EE | Chiara Bodei,
Michele Curti,
Pierpaolo Degano,
Mikael Buchholtz,
Flemming Nielson,
Hanne Riis Nielson,
Corrado Priami:
Performance Evaluation of Security Protocols Specified in LySa.
Electr. Notes Theor. Comput. Sci. 112: 167-189 (2005) |
8 | EE | Mikael Buchholtz,
Stephen T. Gilmore,
Jane Hillston,
Flemming Nielson:
Securing Statically-verified Communications Protocols Against Timing Attacks.
Electr. Notes Theor. Comput. Sci. 128(4): 123-143 (2005) |
7 | EE | Chiara Bodei,
Mikael Buchholtz,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Static validation of security protocols.
Journal of Computer Security 13(3): 347-390 (2005) |
2004 |
6 | EE | Mikael Buchholtz,
Carlo Montangero,
Lara Perrone,
Simone Semprini:
For-LySa: UML for Authentication Analysis.
Global Computing 2004: 93-106 |
5 | EE | Flemming Nielson,
Hanne Riis Nielson,
Hongyan Sun,
Mikael Buchholtz,
René Rydhof Hansen,
Henrik Pilegaard,
Helmut Seidl:
The Succinct Solver Suite.
TACAS 2004: 251-265 |
4 | EE | Mikael Buchholtz,
Hanne Riis Nielson,
Flemming Nielson:
A calculus for control flow analysis of security protocols.
Int. J. Inf. Sec. 2(3-4): 145-167 (2004) |
2003 |
3 | EE | Chiara Bodei,
Mikael Buchholtz,
Pierpaolo Degano,
Flemming Nielson,
Hanne Riis Nielson:
Automatic Validation of Protocol Narration.
CSFW 2003: 126-140 |
2002 |
2 | EE | Hanne Riis Nielson,
Flemming Nielson,
Mikael Buchholtz:
Security for Mobility.
FOSAD 2002: 207-265 |
2001 |
1 | EE | Mikael Buchholtz,
Jacob Andersen,
Hans Henrik Løvengreen:
Towards a Process Algebra for Shared Processors.
Electr. Notes Theor. Comput. Sci. 52(3): (2001) |