Author of the publication

Software Development by Refinement

, and . Formal Methods at the Crossroads: From Panacea to Foundational Support, volume 2757 of LNCS, page 267--286. (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructions and Predicates.. Category Theory and Computer Science, volume 530 of Lecture Notes in Computer Science, page 173-196. Springer, (1991)From Gödel's Incompleteness Theorem to the Completeness of Bot Beliefs - (Extended Abstract)., and . WoLLIC, volume 13923 of Lecture Notes in Computer Science, page 33-50. Springer, (2023)Privacy Protocols., , and . Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 167-191. Springer, (2019)The continuum as a final coalgebra., and . Theor. Comput. Sci., 280 (1-2): 105-122 (2002)A derivation system and compositional logic for security protocols., , , and . J. Comput. Secur., 13 (3): 423-482 (2005)An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols., , and . CSFW, page 48-61. IEEE Computer Society, (2005)Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks., , , , and . Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, volume 30 of Advances in Information Security, Springer, (2007)The Unreasonable Ineffectiveness of Security Engineering: An Overview.. SEFM, page 12-18. IEEE Computer Society, (2010)Testing Semantics: Connecting Processes and Process Logics., , and . AMAST, volume 4019 of Lecture Notes in Computer Science, page 308-322. Springer, (2006)Guarded Transitions in Evolving Specifications., and . AMAST, volume 2422 of Lecture Notes in Computer Science, page 411-425. Springer, (2002)