Mads Dam
Titel
Geciteerd door
Geciteerd door
Jaar
CTL∗ and ECTL∗ as fragments of the modal μ-calculus
M Dam
Theoretical Computer Science 126 (1), 77-96, 1994
2501994
Model checking mobile processes
M Dam
Information and Computation 129 (1), 35-51, 1996
1271996
Constrained delegation
O Bandmann, M Dam, BS Firozabadi
Proceedings 2002 IEEE Symposium on Security and Privacy, 131-140, 2002
1222002
A generic protocol for network state aggregation
M Dam, R Stadler
Proc. Radiovetenskap och Kommunikation (RVK), 14-16, 2005
1082005
Robust monitoring of network-wide aggregates through gossiping
F Wuhib, M Dam, R Stadler, A Clem
IEEE Transactions on Network and Service Management 6 (2), 95-109, 2009
852009
Model checking mobile processes
M Dam
International Conference on Concurrency Theory, 22-36, 1993
781993
Formal verification of information flow security for a simple ARM-based separation kernel
M Dam, R Guanciale, N Khakpour, H Nemati, O Schwarz
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
722013
On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the μCalculus
C Sprenger, M Dam
International Conference on Foundations of Software Science and Computation …, 2003
722003
On the decidability of process equivalences for the π-calculus
M Dam
Theoretical Computer Science 183 (2), 215-228, 1997
611997
Toward parametric verification of open distributed systems
M Dam, L Fredlund, D Gurov
International Symposium on Compositionality, 150-185, 1997
611997
Proof systems for π-calculus logics
M Dam
Logic for concurrency and synchronisation, 145-212, 2003
58*2003
Abstraction in model checking multi-agent systems.
M Cohen, M Dam, A Lomuscio, F Russo
AAMAS (2), 945-952, 2009
542009
Epistemic temporal logic for information flow security
M Balliu, M Dam, G Le Guernic
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and …, 2011
532011
A verification tool for Erlang
LÅ Fredlund, D Gurov, T Noll, M Dam, T Arts, G Chugunov
International Journal on Software Tools for Technology Transfer 4 (4), 405-420, 2003
48*2003
Provably correct runtime monitoring
I Aktug, M Dam, D Gurov
International Symposium on Formal Methods, 262-277, 2008
472008
Relevance logic and concurrent composition
M Dam
LICS 88, 178-185, 1988
471988
Cache storage channels: Alias-driven attacks and verified countermeasures
R Guanciale, H Nemati, C Baumann, M Dam
2016 IEEE Symposium on Security and Privacy (SP), 38-55, 2016
462016
Confidentiality for mobile code: The case of a simple payment protocol
M Dam, P Giambiagi
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 233-244, 2000
442000
Verifying a distributed database lookup manager written in Erlang
T Arts, M Dam
International Symposium on Formal Methods, 682-700, 1999
441999
A symmetry reduction technique for model checking temporal-epistemic logic
M Cohen, M Dam, A Lomuscio, H Qu
Twenty-First International Joint Conference on Artificial Intelligence, 2009
422009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20