Παρακολούθηση
Erik Poll
Erik Poll
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cs.ru.nl - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
An overview of JML tools and applications
L Burdy, Y Cheon, DR Cok, MD Ernst, JR Kiniry, GT Leavens, KRM Leino, ...
International journal on software tools for technology transfer 7, 212-232, 2005
8712005
An overview of JML tools and applications
L Burdy, Y Cheon, D Cok, MD Ernst, J Kiniry, GT Leavens, K Rustan, ...
Electronic Notes in Theoretical Computer Science 80, 75-91, 2003
3452003
Beyond assertions: Advanced specification and verification with JML and ESC/Java2
P Chalin, JR Kiniry, GT Leavens, E Poll
Formal Methods for Components and Objects: 4th International Symposium, FMCO …, 2006
3322006
Protocol State Fuzzing of TLS Implementations
J De Ruiter, E Poll
24th {USENIX} Security Symposium ({USENIX} Security 15), 193-206, 2015
2702015
JML: notations and tools supporting detailed design in Java
GT Leavens, C Ruby, KRM Leino, E Poll, B Jacobs
Addendum to the 2000 proceedings of the conference on Object-oriented …, 2000
2442000
JML reference manual
GT Leavens, E Poll, C Clifton, Y Cheon, C Ruby, D Cok, P Müller, J Kiniry, ...
Draft revision 1, 71, 2007
1832007
EMV in a nutshell
J van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter
Technical Report, 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet …, 2016
1482016
A logic for the Java Modeling Language JML
B Jacobs, E Poll
Fundamental Approaches to Software Engineering: 4th International Conference …, 2001
1372001
JML reference manual
GT Leavens, E Poll, C Clifton, Y Cheon, C Ruby, D Cok, P Müller, J Kiniry, ...
1252008
Java program verification at Nijmegen: Developments and perspective
B Jacobs, E Poll
Lecture notes in computer science, 134-153, 2004
1232004
SmartCards and RFID
L Batina, E Poll
Course PowerPoint Presentation for IPA Security Course, Digital Security at …, 2019
1172019
Formal models of bank cards for free
F Aarts, J De Ruiter, E Poll
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
1102013
What blockchain alternative do you need?
T Koens, E Poll
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2018
1092018
Malicious code on Java Card smartcards: Attacks and countermeasures
W Mostowski, E Poll
Smart Card Research and Advanced Applications: 8th IFIP WG 8.8/11.2 …, 2008
1082008
Pure type systems with definitions
P Severi, E Poll
Logical Foundations of Computer Science: Third International Symposium, LFCS …, 1994
98*1994
Adversarial examples on object recognition: A comprehensive survey
A Serban, E Poll, J Visser
ACM Computing Surveys (CSUR) 53 (3), 1-38, 2020
902020
Analysis of secure key storage solutions on Android
T Cooijmans, J de Ruiter, E Poll
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
892014
Specification of the Javacard API in JML: Towards formal specification and verification of applets and API implementations
E Poll, J van den Berg, B Jacobs
Smart Card Research and Advanced Applications: IFIP TC8/WG8. 8 Fourth …, 2000
842000
Assessing interoperability solutions for distributed ledgers
T Koens, E Poll
Pervasive and Mobile Computing 59, 101079, 2019
822019
A type-theoretic memory model for verification of sequential Java programs
J van den Berg, M Huisman, B Jacobs, E Poll
Recent Trends in Algebraic Development Techniques: 14th International …, 2000
802000
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20