Christoph Sprenger
Christoph Sprenger
Senior researcher at ETH Zurich
Geverifieerd e-mailadres voor inf.ethz.ch
Titel
Geciteerd door
Geciteerd door
Jaar
Cryptographically sound theorem proving
C Sprenger, D Basin, M Backes, B Pfitzmann, M Waidner
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-166, 2006
912006
On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the μCalculus
C Sprenger, M Dam
International Conference on Foundations of Software Science and Computation …, 2003
742003
A verified model checker for the modal μ-calculus in Coq
C Sprenger
International Conference on Tools and Algorithms for the Construction and …, 1998
581998
Checking absence of illicit applet interactions: a case study
M Huisman, D Gurov, C Sprenger, G Chugunov
International Conference on Fundamental Approaches to Software Engineering …, 2004
372004
Cutoff bounds for consensus algorithms
O Marić, C Sprenger, D Basin
International Conference on Computer Aided Verification, 217-237, 2017
332017
Compositional verification of sequential programs with procedures
D Gurov, M Huisman, C Sprenger
Information and Computation 206 (7), 840-868, 2008
312008
Developing security protocols by refinement
C Sprenger, D Basin
Proceedings of the 17th ACM conference on Computer and communications …, 2010
302010
Refining key establishment
C Sprenger, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 230-246, 2012
212012
Sciddle: A tool for large scale distributed computing
P Arbenz, C Sprenger, HP Luthi, S Vogel
Concurrency: Practice and Experience 7 (2), 121-146, 1995
181995
On global induction mechanisms in a μ-calculus with explicit approximations
C Sprenger, M Dam
RAIRO-Theoretical Informatics and Applications 37 (4), 365-391, 2003
172003
Deductive local model checking -- On the verification of CTL* properties of infinite-state reactive systems
C Sprenger
PhD thesis, EPFL, 2000
17*2000
Simulation logic, applets and compositional verification
C Sprenger, D Gurov, M Huisman
142003
Cryptographically-sound protocol-model abstractions
C Sprenger, D Basin
2008 21st IEEE Computer Security Foundations Symposium, 115-129, 2008
132008
Compositional verification for secure loading of smart card applets
C Sprenger, D Gurov, M Huisman
Proceedings. Second ACM and IEEE International Conference on Formal Methods …, 2004
132004
A monad-based modeling and verification toolbox with application to security protocols
C Sprenger, D Basin
International Conference on Theorem Proving in Higher Order Logics, 302-318, 2007
112007
A parallel implementation of the symmetric tridiagonal QR algorithm
P Arbenz, K Gates, C Sprenger
The Fourth Symposium on the Frontiers of Massively Parallel Computation, 382 …, 1992
111992
Verification of a transactional memory manager under hardware failures and restarts
O Marić, C Sprenger
International Symposium on Formal Methods, 449-464, 2014
102014
Refining security protocols
C Sprenger, D Basin
Journal of Computer Security 26 (1), 71-120, 2018
82018
User's guide to Sciddle version 3.0
C Sprenger
ETH, Eidgenössische Technische Hochschule Zürich, Departement Informatik …, 1993
71993
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust
L Chuat, AR Abdou, R Sasse, C Sprenger, D Basin, A Perrig
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 624-638, 2020
52020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20