| Publication | Date of Publication | Type |
|---|
Stateful applied pi calculus: observational equivalence and labelled bisimilarity Journal of Logical and Algebraic Methods in Programming | 2017-05-29 | Paper |
Dynamic measurement and protected execution: model and analysis Trustworthy Global Computing | 2016-11-09 | Paper |
Composition of password-based protocols Formal Methods in System Design | 2014-06-30 | Paper |
Synthesising features by games | 2013-12-04 | Paper |
Model-checking the preservation of temporal properties upon feature integration | 2013-09-26 | Paper |
Practical Everlasting Privacy Lecture Notes in Computer Science | 2013-08-06 | Paper |
Model checking agent knowledge in dynamic access control policies Tools and Algorithms for the Construction and Analysis of Systems | 2013-08-05 | Paper |
Requirements, specifications, and minimal refinement Electronic Notes in Theoretical Computer Science | 2013-04-19 | Paper |
Reduction of equational theories for verification of trace equivalence: re-encryption, associativity and commutativity Lecture Notes in Computer Science | 2012-06-29 | Paper |
Experimental study of three-scalar mixing in a turbulent coaxial jet Journal of Fluid Mechanics | 2012-06-26 | Paper |
Verifying privacy-type properties of electronic voting protocols: a taster Towards Trustworthy Elections | 2010-06-17 | Paper |
Symbolic Bisimulation for the Applied Pi Calculus FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science | 2008-04-24 | Paper |
Fair multi-party contract signing using private contract signatures Information and Computation | 2008-04-16 | Paper |
Improved Multi-party Contract Signing Financial Cryptography and Data Security | 2008-03-07 | Paper |
Minimal refinements of specifications in modal and temporal logics Formal Aspects of Computing | 2007-11-28 | Paper |
Minimal refinements of specifications in modal and temporal logics Formal Aspects of Computing | 2007-04-19 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Objects, Agents, and Features Lecture Notes in Computer Science | 2005-12-27 | Paper |
Tools and Algorithms for the Construction and Analysis of Systems Lecture Notes in Computer Science | 2005-11-10 | Paper |
Programming Languages and Systems Lecture Notes in Computer Science | 2005-09-13 | Paper |
scientific article; zbMATH DE number 2100580 (Why is no real title available?) | 2004-09-14 | Paper |
scientific article; zbMATH DE number 2100584 (Why is no real title available?) | 2004-09-14 | Paper |
scientific article; zbMATH DE number 2088152 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2086522 (Why is no real title available?) | 2004-08-11 | Paper |
Implementation of belief change operators using BDDs Studia Logica | 2002-06-24 | Paper |
Operators and Laws for Combining Preference Relations Journal Of Logic And Computation | 2002-01-01 | Paper |
Feature integration using a feature construct Science of Computer Programming | 2001-10-14 | Paper |
scientific article; zbMATH DE number 1241664 (Why is no real title available?) | 1999-10-11 | Paper |
Counterfactuals and updates as inverse modalities Journal of Logic, Language and Information | 1999-09-29 | Paper |
Belief revision and verisimilitude Notre Dame Journal of Formal Logic | 1996-01-29 | Paper |