Conference Paper
R. Küsters, Truderung, T., and Vogt, A.,
“Clash Attacks on the Verifiability of E-Voting Systems”, in
Proceedings of the 33rd IEEE Symposium on Security and Privacy (S{&}P 2012), 2012.
R. Küsters, Truderung, T., and Vogt, A.,
“Proving Coercion-Resistance of Scantegrity II”, in
Proceedings of the 12th International Conference on Information and Communications Security (ICICS 2010), 2010.
M. D. Schwarz, Seidl, H., Vojdani, V., Lammich, P., and Müller-Olm, M.,
“Static Analysis of Interrupt-Driven Programs Synchronized via the Priority Ceiling Protocol”, in
Proceedings of the 38th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (POPL 2011), 2011.
H. Blasum, Havle, O., Langenstein, B., Nemouchi, Y., Schmaltz, J., Stephan, W., Tverdyshew, S., Verbeek, F., and Wolf, B.,
“Using Isabelle/HOL to Develop and Maintain Separation Invariants for an Operating System”, in
Isabelle 2014 workshop at FloC 2014, 2014.