Heiko Mantel
Orcid: 0000-0002-6586-5529Affiliations:
- Darmstadt University of Technology, Germany
According to our database1,
Heiko Mantel
authored at least 85 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Towards a More Sustainable Re-engineering of Heterogeneous Distributed Systems Using Cooperating Run-Time Monitors.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies, 2024
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering Methodologies, 2024
2022
Improving Loop Parallelization by a Combination of Static and Dynamic Analyses in HLS.
ACM Trans. Reconfigurable Technol. Syst., 2022
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering, 2022
2021
Parallel Comput., 2021
Tool-Supported Mini-App Extraction to Facilitate Program Analysis and Parallelization.
Proceedings of the ICPP 2021: 50th International Conference on Parallel Processing, Lemont, IL, USA, August 9, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles, 2020
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
Proceedings of the IEEE/ACM International Workshop on Programming and Performance Visualization Tools, 2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Arch. Formal Proofs, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroid.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Computer Security, 2018
2017
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Secure IT Systems, 2017
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Taming Message-Passing Communication in Compositional Reasoning About Confidentiality.
Proceedings of the Programming Languages and Systems - 15th Asian Symposium, 2017
2016
Formal Methods Syst. Des., 2016
2015
Int. J. Secur. Softw. Eng., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Logic-Based Program Synthesis and Transformation, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
Arch. Formal Proofs, 2014
Arch. Formal Proofs, 2014
Proceedings of the Runtime Verification - 5th International Conference, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014
2012
Proceedings of the Mathematics of Program Construction - 11th International Conference, 2012
Proceedings of the Logic-Based Program Synthesis and Transformation, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
2010
2009
Proceedings of the Computer Security, 2009
2008
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008
2007
J. Appl. Log., 2007
Transformational typing and unification for automatically correcting insecure programs.
Int. J. Inf. Sec., 2007
Proceedings of the Programming Languages and Systems, 2007
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
2006
Proceedings of the Logic-Based Program Synthesis and Transformation, 2006
2005
Int. J. Inf. Sec., 2005
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005
Proceedings of the Mechanizing Mathematical Reasoning, 2005
2004
J. Autom. Reason., 2004
Proceedings of the Programming Languages and Systems: Second Asian Symposium, 2004
2003
A uniform framework for the formal specification and verification of information flow security.
PhD thesis, 2003
Informationsflusskontrolle als Grundlage für die Sicherheit von Multi-Agenten-Systemen.
Prax. Inf.verarb. Kommun., 2003
J. Comput. Secur., 2003
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003
Proceedings of the Language-Based Security, 5.-10. October 2003, 2003
2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the Static Analysis, 9th International Symposium, 2002
2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the FME 2001: Formal Methods for Increasing Software Productivity, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
Int. J. Softw. Tools Technol. Transf., 2000
J. Exp. Theor. Artif. Intell., 2000
Proceedings of the Computer Security, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1999
Proceedings of the Recent Trends in Algebraic Development Techniques, 1999
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 1999
Proceedings of the Automated Deduction, 1999
1998
Proceedings of the KI-98: Advances in Artificial Intelligence, 1998
Proceedings of the Logics in Artificial Intelligence, European Workshop, 1998
Proceedings of the Applied Formal Methods, 1998
1997
Proceedings of the Automated Deduction, 1997