Follow
Erik Poll
Title
Cited by
Cited by
Year
An overview of JML tools and applications
L Burdy, Y Cheon, DR Cok, MD Ernst, JR Kiniry, GT Leavens, KRM Leino, ...
International journal on software tools for technology transfer 7, 212-232, 2005
8802005
An overview of JML tools and applications
L Burdy, Y Cheon, D Cok, MD Ernst, J Kiniry, GT Leavens, K Rustan, ...
Electronic Notes in Theoretical Computer Science 80, 75-91, 2003
3482003
Beyond assertions: Advanced specification and verification with JML and ESC/Java2
P Chalin, JR Kiniry, GT Leavens, E Poll
Formal Methods for Components and Objects: 4th International Symposium, FMCO …, 2006
3352006
JML reference manual
GT Leavens, E Poll, C Clifton, Y Cheon, C Ruby, D Cok, P Müller, J Kiniry, ...
3282008
Protocol State Fuzzing of TLS Implementations
J De Ruiter, E Poll
24th {USENIX} Security Symposium ({USENIX} Security 15), 193-206, 2015
2892015
JML: notations and tools supporting detailed design in Java
GT Leavens, C Ruby, KRM Leino, E Poll, B Jacobs
Addendum to the 2000 proceedings of the conference on Object-oriented …, 2000
2492000
EMV in a nutshell
J van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter
Technical Report, 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet …, 2016
1542016
A logic for the Java Modeling Language JML
B Jacobs, E Poll
International Conference on Fundamental Approaches to Software Engineering …, 2001
1392001
Java program verification at Nijmegen: Developments and perspective
B Jacobs, E Poll
International Symposium on Software Security, 134-153, 2003
1252003
SmartCards and RFID
L Batina, E Poll
Course PowerPoint Presentation for IPA Security Course, Digital Security at …, 2019
1232019
What blockchain alternative do you need?
T Koens, E Poll
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2018
1182018
Formal models of bank cards for free
F Aarts, J De Ruiter, E Poll
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
1172013
Adversarial examples on object recognition: A comprehensive survey
A Serban, E Poll, J Visser
ACM Computing Surveys (CSUR) 53 (3), 1-38, 2020
1102020
Malicious code on Java Card smartcards: Attacks and countermeasures
W Mostowski, E Poll
International Conference on Smart Card Research and Advanced Applications, 1-16, 2008
1082008
Pure type systems with definitions
P Severi, E Poll
Logical Foundations of Computer Science: Third International Symposium, LFCS …, 1994
99*1994
Assessing interoperability solutions for distributed ledgers
T Koens, E Poll
Pervasive and Mobile Computing 59, 101079, 2019
982019
Analysis of secure key storage solutions on Android
T Cooijmans, J de Ruiter, E Poll
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
912014
Model learning and model checking of SSH implementations
P Fiterău-Broştean, T Lenaerts, E Poll, J de Ruiter, F Vaandrager, ...
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model …, 2017
872017
Smart metering in the Netherlands: What, how, and why
P Van Aubel, E Poll
International Journal of Electrical Power & Energy Systems 109, 719-725, 2019
852019
Specification of the Javacard API in JML: Towards formal specification and verification of applets and API implementations
E Poll, J van den Berg, B Jacobs
Smart Card Research and Advanced Applications: IFIP TC8/WG8. 8 Fourth …, 2000
812000
The system can't perform the operation now. Try again later.
Articles 1–20