| Publication | Date of Publication | Type |
|---|
Operations on records Lecture Notes in Computer Science | 2023-04-12 | Paper |
A delegation-based object calculus with subtyping Fundamentals of Computation Theory | 2022-12-09 | Paper |
An extension of system \(F\) with subtyping Lecture Notes in Computer Science | 2022-08-16 | Paper |
Operations on records (extended abstract) Category Theory and Computer Science | 2022-08-16 | Paper |
On abstraction and the expressive power of programming languages Lecture Notes in Computer Science | 2022-08-16 | Paper |
Automated analysis of cryptographic assumptions in generic group models Journal of Cryptology | 2019-06-20 | Paper |
Connecting formal semantics to constructive intuitions Lecture Notes in Computer Science | 2017-11-17 | Paper |
Flexible dynamic information flow control in the presence of exceptions Journal of Functional Programming | 2017-10-23 | Paper |
Data-oblivious data structures | 2017-03-03 | Paper |
Secure protocol composition | 2016-05-03 | Paper |
Automated analysis of cryptographic assumptions in generic group models Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Addressing covert termination and timing channels in concurrent information flow systems Proceedings of the 17th ACM SIGPLAN international conference on Functional programming | 2014-07-21 | Paper |
Protocol composition logic (PCL) Electronic Notes in Theoretical Computer Science | 2013-12-06 | Paper |
A probabilistic polynomial-time calculus for analysis of cryptographic protocols (preliminary report) Electronic Notes in Theoretical Computer Science | 2013-04-26 | Paper |
A domain-specific language for computing on encrypted data. (Invited talk) | 2012-08-31 | Paper |
Using strategy objectives for network security analysis Information Security and Cryptology | 2010-11-23 | Paper |
Contract signing, optimism, and advantage. Lecture Notes in Computer Science | 2010-03-30 | Paper |
On the relationships between notions of simulation-based security Journal of Cryptology | 2009-06-08 | Paper |
Beyond proof-of-compliance: security analysis in trust management Journal of the ACM | 2008-12-21 | Paper |
Inductive Proofs of Computational Secrecy Computer Security – ESORICS 2007 | 2008-08-21 | Paper |
Foundations of Software Science and Computation Structures Lecture Notes in Computer Science | 2007-09-28 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2007-02-12 | Paper |
Compositional analysis of contract-signing protocols Theoretical Computer Science | 2007-01-09 | Paper |
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols Theoretical Computer Science | 2006-04-28 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
Contract signing, optimism, and advantage The Journal of Logic and Algebraic Programming | 2005-08-01 | Paper |
scientific article; zbMATH DE number 2102746 (Why is no real title available?) | 2004-09-24 | Paper |
scientific article; zbMATH DE number 2090061 (Why is no real title available?) | 2004-08-12 | Paper |
A type system for the Java bytecode language and verifier Journal of Automated Reasoning | 2003-09-09 | Paper |
scientific article; zbMATH DE number 1962758 (Why is no real title available?) | 2003-08-11 | Paper |
scientific article; zbMATH DE number 1962741 (Why is no real title available?) | 2003-08-11 | Paper |
scientific article; zbMATH DE number 1954103 (Why is no real title available?) | 2003-07-28 | Paper |
Concepts in Programming Languages | 2003-06-25 | Paper |
scientific article; zbMATH DE number 1759355 (Why is no real title available?) | 2002-11-28 | Paper |
Parametricity and variants of Girard's \(J\) operator Information Processing Letters | 2002-07-25 | Paper |
Finite-state analysis of two contract signing protocols Theoretical Computer Science | 2002-07-15 | Paper |
scientific article; zbMATH DE number 1754629 (Why is no real title available?) | 2002-06-12 | Paper |
scientific article; zbMATH DE number 1692932 (Why is no real title available?) | 2002-01-21 | Paper |
Labelling techniques and typed fixed-point operators | 2001-10-03 | Paper |
scientific article; zbMATH DE number 1390339 (Why is no real title available?) | 2000-10-03 | Paper |
Optimization complexity of linear logic proof games Theoretical Computer Science | 2000-08-23 | Paper |
scientific article; zbMATH DE number 1479647 (Why is no real title available?) | 2000-07-20 | Paper |
Type inference with simple subtypes Journal of Functional Programming | 2000-02-09 | Paper |
scientific article; zbMATH DE number 1330431 (Why is no real title available?) | 1999-09-20 | Paper |
scientific article; zbMATH DE number 1231622 (Why is no real title available?) | 1999-01-06 | Paper |
scientific article; zbMATH DE number 1231522 (Why is no real title available?) | 1998-12-13 | Paper |
scientific article; zbMATH DE number 1142318 (Why is no real title available?) | 1998-05-14 | Paper |
scientific article; zbMATH DE number 1088218 (Why is no real title available?) | 1997-11-17 | Paper |
Linear Logic Proof Games and Optimization The Bulletin of Symbolic Logic | 1997-05-25 | Paper |
Standard ML-NJ weak polymorphism and imperative constructs Information and Computation | 1997-02-03 | Paper |
scientific article; zbMATH DE number 720178 (Why is no real title available?) | 1996-06-25 | Paper |
scientific article; zbMATH DE number 814802 (Why is no real title available?) | 1996-04-11 | Paper |
scientific article; zbMATH DE number 786491 (Why is no real title available?) | 1996-01-21 | Paper |
scientific article; zbMATH DE number 814796 (Why is no real title available?) | 1995-11-09 | Paper |
On abstraction and the expressive power of programming languages Science of Computer Programming | 1994-07-21 | Paper |
An extension of system \(F\) with subtyping Information and Computation | 1994-06-09 | Paper |
scientific article; zbMATH DE number 515743 (Why is no real title available?) | 1994-03-10 | Paper |
scientific article; zbMATH DE number 445158 (Why is no real title available?) | 1993-12-05 | Paper |
scientific article; zbMATH DE number 88999 (Why is no real title available?) | 1993-01-16 | Paper |
Decision problems for propositional linear logic Annals of Pure and Applied Logic | 1992-09-27 | Paper |
Operations on records Mathematical Structures in Computer Science | 1991-01-01 | Paper |
Kripke-style models for typed lambda calculus Annals of Pure and Applied Logic | 1991-01-01 | Paper |
The semantics of second-order lambda calculus Information and Computation | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4103048 (Why is no real title available?) | 1989-01-01 | Paper |
Polymorphic type inference and containment Information and Computation | 1988-01-01 | Paper |
scientific article; zbMATH DE number 3902022 (Why is no real title available?) | 1985-01-01 | Paper |
On the sequential nature of unification The Journal of Logic Programming | 1984-01-01 | Paper |
The implication problem for functional and inclusion dependencies Information and Control | 1983-01-01 | Paper |
Termination assertions for recursive programs: Completeness and axiomatic definability Information and Control | 1983-01-01 | Paper |