
Carsten Schürmann
Full Professor
- Computer Science
Department
- Center for Information Security and Trust
Research center
IT University of Copenhagen
Rued Langgaards Vej 7
DK-2300 Copenhagen S
Denmark
Building: 4C13
Information Desk: 72185000
- Published
A Bigraph Relational Model
Beauquier, M. & Schürmann, C., 2011, In: Electronic Proceedings in Theoretical Computer Science. 71, p. 14 28 p.Research output: Journal Article or Conference Article in Journal › Conference article › Research › peer-review
- Published
A Declaration of Software Independence
Ryan, P., Jamroga, W., Schneider, S., Schürmann, C. & Stark, P., 2021, Festschrift for Joshua Guttman. SpringerResearch output: Conference Article in Proceeding or Book/Report chapter › Article in proceedings › Research › peer-review
- Published
A Practical Module System for LF
Schürmann, C. & Rabe, F., 2009, Proceedings of the Fourth International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice. Association for Computing Machinery, p. 40 48 p.Research output: Conference Article in Proceeding or Book/Report chapter › Article in proceedings › Research › peer-review
- Published
A Risk-Limiting Audit In Denmark: A Pilot
Schürmann, C., 2017, First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Springer, p. 192-202 (Lecture Notes in Computer Science, Vol. 10141).Research output: Conference Article in Proceeding or Book/Report chapter › Article in proceedings › Research › peer-review
- Published
A Security Analysis of the Danish Deposit Return System
Garbacz, I., Giustolisi, R., Møller Nielsen, K. & Schürmann, C., 1 Nov 2019, Proceedings of the 9th Workshop on Socio-Technical Aspects in Security and Trust. Springer, (Lecture Notes in Computer Science).Research output: Conference Article in Proceeding or Book/Report chapter › Article in proceedings › Research › peer-review
- Published
An Executable Formalization of the HOL/Nuprl Connection in the Metalogical Framework
Schürmann, C. & Stehr, M-O., 2006, In: Lecture Notes in Computer Science. 4246Research output: Journal Article or Conference Article in Journal › Journal article › Research › peer-review
- Published
An Introduction to Voting Rule Verification
Beckert, B., Bormer, T., Gore, R., Kirsten, M. & Schürmann, C., 2017, Trends in Computational Social Choice. AI Access, p. 269-289 20 p.Research output: Conference Article in Proceeding or Book/Report chapter › Book chapter › Research › peer-review
- Published
Analysing Vote Counting Algorithms Via Logic
Schürmann, C., Beckert, B. & Gore, R., 2013, Proceedings of the fourth Conference on E-Voting and Identity (VOTEID'13). Springer, (Lecture Notes in Computer Science, Vol. 7985).Research output: Conference Article in Proceeding or Book/Report chapter › Article in proceedings › Research › peer-review
- Published
Analysing Vote Counting Algorithms Via Logic - And its Application to the CADE Election Scheme
Schürmann, C., Beckert, B. & Gore, R., 2013, Automated Deduction – CADE-24: Proceedings of the 16th International Conference on Automated Deduction (CADE-24). Springer, p. 135-144 (Lecture Notes in Computer Science, Vol. 7898).Research output: Conference Article in Proceeding or Book/Report chapter › Article in proceedings › Research › peer-review
- Published
Automated Analysis of Accountability
Bruni, A., Giustolisi, R. & Schürmann, C., 2017, Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings. Springer, p. 417-434 (Lecture Notes in Computer Science, Vol. 10599).Research output: Conference Article in Proceeding or Book/Report chapter › Article in proceedings › Research › peer-review
ID: 263621