Eyad Alkassar , Artem Starostin , Alexandra Tsyban , Wolfgang J. Paul
verified software theories tools experiments 71 -85
Artem Starostin , Matthias Perner , Alexander Lux , Heiko Mantel
Artem Starostin , Steffen Lortz , Heiko Mantel , Timo Bähr
Eyad Alkassar , Norbert Schirmer , Artem Starostin
tools and algorithms for construction and analysis of systems 109 -123
Alexander Lux , Artem Starostin
Journal of Cryptographic Engineering 1 ( 4) 303 -313
Christopher Mann , Artem Starostin
acm symposium on applied computing 1457 -1462
Artem Starostin , Alexandra Tsyban
Verified Software: Theories, Tools, Experiments 240 -254
Eyad Alkassar , Mark A. Hillebrand , Dirk Leinenbach , Norbert W. Schirmer
Verified Software: Theories, Tools, Experiments 209 -224
Artem Starostin , Alexandra Tsyban
Electronic Notes in Theoretical Computer Science 217 169 -185
Heiko Mantel , Artem Starostin
Computer Security -- ESORICS 2015 447 -467
Steffen Lortz , Heiko Mantel , Artem Starostin , Timo Bähr
security and privacy in smartphones and mobile devices 93 -104
Eyad Alkassar , Mark A Hillebrand , Dirk C Leinenbach , Norbert W Schirmer
Journal of Automated Reasoning 42 ( 2) 389 -454
Eyad Alkassar , Mark A Hillebrand , Dirk C Leinenbach , Norbert W Schirmer
Journal of Automated Reasoning,()
Steven Arzt , Alexandre Bartel , Richard Gay , Steffen Lortz
Proc. of the 36th IEEE Symp. on Security and Privacy. Piscataway: IEEE 1 -2
Steffen Lortz , Heiko Mantel , Artem Starostin , A Weber
TU Darmstadt, Tech. Rep.
Dominik Bollmann , Steffen Lortz , Heiko Mantel , Artem Starostin
Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings 11 395 -415
Steffen Lortz , Heiko Mantel , David Schneider , Artem Starostin
Artem Starostin
Saarland University, Computer Science Department
Artem Starostin
Saarland University, Computer Science Department
Heiko Mantel , Artem Starostin