Language-Based Technology

  1. Research › Journal article
  2. Published

    A Framework for Security Analysis of Mobile Wireless Networks. / Nanz, Sebastian; Hankin, Chris.

    In: Theoretical Computer Science, Vol. 367, No. 1-2, 2006, p. 203-227.

    Publication: Research - peer-reviewJournal article – Annual report year: 2006

  3. Published

    A new way of estimating compute-boundedness and its application to dynamic voltage scaling. / Venkatachalam, Vasanth; Franz, Michael; Probst, Christian W.

    In: International Journal of Embedded Systems, Vol. 3, No. 1-2, 2007, p. 17-30.

    Publication: Research - peer-reviewJournal article – Annual report year: 2007

  4. Published

    An extensible analysable system model. / Probst, Christian W.; Hansen, Rene Rydhof.

    In: Information Security Technical Report, Vol. 13, No. 4, 2008, p. 235-246.

    Publication: Research - peer-reviewJournal article – Annual report year: 2008

  5. Published

    A portable virtual machine target for proof-carrying code. / Franz, Michael; Chandra, Deepak; Gal, Andreas; Haldar, Vivek; Probst, Christian W.; Reig, Fermin; Wang, Ning.

    In: Science of Computer Programming, Vol. 57, No. 3, 2005, p. 275-294.

    Publication: Research - peer-reviewJournal article – Annual report year: 2005

  6. E-pub ahead of print

    A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks. / Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming.

    In: Computer Journal, Vol. 54, No. 4, 04.2010, p. 589-601.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  7. Published

    CaPiTo: protocol stacks for services. / Gao, Han; Nielson, Flemming; Nielson, Hanne Riis.

    In: Formal Aspects of Computing, Vol. 23, No. 4, 2011, p. 541-565.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  8. Published

    Constraint Differentiation : Search-Space Reduction for the Constraint-Based Analysis of Security Protocols. / Mödersheim, Sebastian Alexander; Basin, David; Viganò, Luca.

    In: Journal of Computer Security, Vol. 18, No. 4, 2010, p. 575-618.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  9. Published

    Cryptographic Analysis in Cubic Time. / Nielson, Flemming; Nielson, Hanne Riis; Seidl, H.

    In: Electronic Notes in Theoretical Computer Science, Vol. 62, No. 17, 2004, p. 1.

    Publication: Research - peer-reviewJournal article – Annual report year: 2004

  10. Published
  11. Published

    Efficient CSL Model Checking Using Stratification. / Zhang, Lijun; Jansen, David N.; Nielson, Flemming; Hermanns, Holger.

    In: Logical Methods in Computer Science, Vol. 8, No. 2, 2012, p. Paper 17.

    Publication: Research - peer-reviewJournal article – Annual report year: 2012

Previous 1 2 3 4 5 6 7 8 ...17 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word