Mads Dam
Geciteerd door
Geciteerd door
CTL∗ and ECTL∗ as fragments of the modal μ-calculus
M Dam
Theoretical Computer Science 126 (1), 77-96, 1994
Model checking mobile processes
M Dam
Information and Computation 129 (1), 35-51, 1996
Constrained delegation
O Bandmann, M Dam, BS Firozabadi
Proceedings 2002 IEEE Symposium on Security and Privacy, 131-140, 2002
A generic protocol for network state aggregation
M Dam, R Stadler
Proc. Radiovetenskap och Kommunikation (RVK), 14-16, 2005
Robust monitoring of network-wide aggregates through gossiping
F Wuhib, M Dam, R Stadler, A Clem
IEEE Transactions on Network and Service Management 6 (2), 95-109, 2009
Formal verification of information flow security for a simple ARM-based separation kernel
M Dam, R Guanciale, N Khakpour, H Nemati, O Schwarz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the μCalculus
C Sprenger, M Dam
International Conference on Foundations of Software Science and Computation …, 2003
Model checking mobile processes
M Dam
International Conference on Concurrency Theory, 22-36, 1993
Cache storage channels: Alias-driven attacks and verified countermeasures
R Guanciale, H Nemati, C Baumann, M Dam
2016 IEEE Symposium on Security and Privacy (SP), 38-55, 2016
On the decidability of process equivalences for the π-calculus
M Dam
Theoretical Computer Science 183 (2), 215-228, 1997
Toward parametric verification of open distributed systems
M Dam, L Fredlund, D Gurov
International Symposium on Compositionality, 150-185, 1997
Abstraction in model checking multi-agent systems.
M Cohen, M Dam, A Lomuscio, F Russo
AAMAS (2), 945-952, 2009
Epistemic temporal logic for information flow security
M Balliu, M Dam, G Le Guernic
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and …, 2011
Provably correct runtime monitoring
I Aktug, M Dam, D Gurov
International Symposium on Formal Methods, 262-277, 2008
A verification tool for Erlang
LÅ Fredlund, D Gurov, T Noll, M Dam, T Arts, G Chugunov
International Journal on Software Tools for Technology Transfer 4 (4), 405-420, 2003
Confidentiality for mobile code: The case of a simple payment protocol
M Dam, P Giambiagi
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 233-244, 2000
Relevance logic and concurrent composition
M Dam
LICS 88, 178-185, 1988
Proof systems for π-calculus logics
M Dam
Logic for concurrency and synchronisation, 145-212, 2003
A symmetry reduction technique for model checking temporal-epistemic logic
M Cohen, M Dam, A Lomuscio, H Qu
Twenty-First International Joint Conference on Artificial Intelligence, 2009
Verifying a distributed database lookup manager written in Erlang
T Arts, M Dam
International Symposium on Formal Methods, 682-700, 1999
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20