Publication | Date of Publication | Type |
---|
Smart Choices and the Selection Monad | 2023-08-26 | Paper |
Reasoning about cryptographic protocols in the spi calculus | 2023-05-17 | Paper |
An imperative object calculus | 2022-08-18 | Paper |
The Applied Pi Calculus | 2018-08-02 | Paper |
Open systems in TLA | 2017-09-29 | Paper |
Timely Dataflow: A Model | 2016-10-19 | Paper |
Analysis and caching of dependencies | 2016-09-01 | Paper |
Layout randomization and nondeterminism | 2016-04-12 | Paper |
Distributed Authorization with Distributed Grammars | 2016-01-08 | Paper |
Foundations of Differential Dataflow | 2015-10-01 | Paper |
Access control in a core calculus of dependency | 2015-08-03 | Paper |
A model of cooperative threads | 2015-07-03 | Paper |
A semantics for a logic of authentication (extended abstract) | 2015-06-19 | Paper |
Authentication primitives and their compilation | 2015-03-17 | Paper |
Mobile values, new names, and secure communication | 2015-03-17 | Paper |
Analyzing security protocols with secrecy types and logic programs | 2015-03-17 | Paper |
Semantics of transactional memory and automatic mutual exclusion | 2014-09-12 | Paper |
Layout Randomization and Nondeterminism | 2014-06-02 | Paper |
Access Control in a Core Calculus of Dependency | 2013-12-06 | Paper |
Message-Locked Encryption for Lock-Dependent Messages | 2013-09-02 | Paper |
On Layout Randomization for Arrays and Functions | 2013-08-06 | Paper |
A Model of Cooperative Threads | 2010-12-20 | Paper |
A model of dynamic separation for transactional memory | 2010-10-07 | Paper |
An abstract account of composition | 2010-06-17 | Paper |
Verification: Theory and Practice | 2010-03-23 | Paper |
Perspectives on Transactional Memory | 2009-10-22 | Paper |
Logic in Access Control (Tutorial Notes) | 2009-10-22 | Paper |
Security Protocols: Principles and Calculi | 2009-10-22 | Paper |
Models and Proofs of Protocol Security: A Progress Report | 2009-06-30 | Paper |
Formal Analysis of Dynamic, Distributed File-System Access Controls | 2009-03-11 | Paper |
Analyzing security protocols with secrecy types and logic programs | 2008-12-21 | Paper |
Security analysis of cryptographically controlled access to XML documents | 2008-12-21 | Paper |
A Model of Dynamic Separation for Transactional Memory | 2008-11-25 | Paper |
Variations in Access Control Logic | 2008-08-28 | Paper |
Automatic Mutual Exclusion and Atomicity Checks | 2008-06-19 | Paper |
Computational Secrecy by Typing for the Pi Calculus | 2008-05-06 | Paper |
A Modal Deconstruction of Access Control Logics | 2008-04-11 | Paper |
Automated verification of selected equivalences for security protocols | 2008-03-05 | Paper |
Foundations of Software Science and Computation Structures | 2007-09-28 | Paper |
Programming Languages and Systems | 2007-09-28 | Paper |
Foundations of Software Science and Computation Structures | 2007-05-02 | Paper |
Deciding knowledge in security protocols under equational theories | 2007-01-09 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q5714435 | 2006-01-02 | Paper |
Logic for Programming, Artificial Intelligence, and Reasoning | 2005-11-10 | Paper |
Computer-assisted verification of a protocol for certified email | 2005-10-10 | Paper |
Automata, Languages and Programming | 2005-08-24 | Paper |
Formal Techniques for Networked and Distributed Systems – FORTE 2004 | 2005-08-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q3024821 | 2005-07-04 | Paper |
Secrecy by typing in security protocols | 2005-01-25 | Paper |
Private authentication | 2004-10-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4813405 | 2004-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4813518 | 2004-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4418586 | 2003-08-11 | Paper |
Secrecy types for asymmetric communication. | 2003-05-25 | Paper |
Secure implementation of channel abstractions | 2003-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536407 | 2002-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536812 | 2002-10-07 | Paper |
Reconciling two views of cryptography (The computational soundness of formal encryption) | 2002-06-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q2769422 | 2002-02-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q2752046 | 2001-10-21 | Paper |
[top [top ]-closed relations and admissibility] | 2000-09-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501667 | 2000-09-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4490733 | 2000-07-20 | Paper |
Explicit substitutions | 2000-02-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4261075 | 1999-09-20 | Paper |
A calculus for cryptographic protocols: The spi calculus | 1999-03-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4230922 | 1999-02-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4222942 | 1999-01-06 | Paper |
A theory of primitive objects: Untyped and first-order systems | 1996-12-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4715213 | 1996-11-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4885875 | 1996-07-28 | Paper |
Baby Modula-3 and a theory of objects | 1995-08-06 | Paper |
Dynamic typing in polymorphic languages | 1995-06-08 | Paper |
A semantics for static type inference in a nondeterministic language | 1995-01-12 | Paper |
Decidability and expressiveness for first-order logics of probability | 1994-07-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4281485 | 1994-06-02 | Paper |
Formal parametric polymorphism | 1994-02-22 | Paper |
A logical view of composition | 1994-01-13 | Paper |
FAITHFUL IDEAL MODELS FOR RECURSIVE POLYMORPHIC TYPES | 1992-06-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3972530 | 1992-06-25 | Paper |
The existence of refinement mappings | 1991-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3361872 | 1991-01-01 | Paper |
Secure circuit evaluation. A protocol based on hiding information from an oracle | 1990-01-01 | Paper |
Corrigendum to: ``The power of temporal proofs | 1990-01-01 | Paper |
Nonclausal deduction in first-order temporal logic | 1990-01-01 | Paper |
Temporal logic programming | 1989-01-01 | Paper |
The power of temporal proofs | 1989-01-01 | Paper |
On hiding information from an oracle | 1989-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3204052 | 1989-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q5203714 | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3030268 | 1986-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3682464 | 1985-01-01 | Paper |