Author of the publication

A Methodology for Protocol Verification Applied to EMV® 1.

, , and . SBMF, volume 11254 of Lecture Notes in Computer Science, page 180-197. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mechanising Mondex with Z/Eves, and . Formal Aspects of Computing, 20 (1): 117--139 (January 2008)FDR Explorer, and . Electron. Notes Theor. Comput. Sci., (2007)Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN., , , , and . ACM Conference on Computer and Communications Security, page 716-726. ACM, (2014)International System of Quantities library in VDM.. CoRR, (2023)VDM at Large: Modelling the EMV® 2^nd 2 nd Generation Kernel.. SBMF, volume 11254 of Lecture Notes in Computer Science, page 109-125. Springer, (2018)A Chain Datatype in Z., and . Int. J. Softw. Informatics, 3 (2-3): 357-374 (2009)Safety Analysis of Software Components of a Dialysis Machine Using Model Checking., , , , , , and . FACS, volume 10487 of Lecture Notes in Computer Science, page 137-154. Springer, (2017)Using formal methods for security in the Xenon project., and . CSIIRW, page 67. ACM, (2010)Z/Eves and the Mondex Electronic Purse., and . ICTAC, volume 4281 of Lecture Notes in Computer Science, page 15-34. Springer, (2006)Digital Twins for Organ Preservation Devices., , , and . ISoLA (4), volume 13704 of Lecture Notes in Computer Science, page 22-36. Springer, (2022)