| Publication | Date of Publication | Type |
|---|
| Dynamic Security Analysis of JavaScript: Are We There Yet?: Dataset | 2025-01-30 | Dataset |
| Secure key management policies in strand spaces | 2022-07-13 | Paper |
| Gathering of robots in a ring with mobile faults | 2019-03-13 | Paper |
| Formal methods for web security | 2017-02-22 | Paper |
| Feedback vertex set in hypercubes | 2016-06-16 | Paper |
| Static Evidences for Attack Reconstruction | 2016-01-08 | Paper |
| Security Abstractions and Intruder Models (Extended Abstract) | 2014-07-23 | Paper |
| Information leakage detection in boundary ambients | 2013-08-27 | Paper |
| Techniques for security checking: non-interference vs control flow analysis | 2013-07-24 | Paper |
| Formal models of timing attacks on web privacy | 2013-07-24 | Paper |
| Guessing bank PINs by winning a mastermind game | 2012-12-06 | Paper |
| Efficient Padding Oracle Attacks on Cryptographic Hardware | 2012-09-25 | Paper |
| Type-Based Analysis of PKCS#11 Key Management | 2012-06-29 | Paper |
| An Introduction to Security API Analysis | 2011-09-16 | Paper |
| Transforming Processes to Check and Ensure Information Flow Security* | 2011-05-06 | Paper |
| A Proof System for Information Flow Security | 2011-03-04 | Paper |
| Channel abstractions for network security | 2010-04-01 | Paper |
| Perspectives of System Informatics | 2010-01-05 | Paper |
| Foundations of Security Analysis and Design II | 2009-05-14 | Paper |
| Foundations of Security Analysis and Design II | 2009-05-14 | Paper |
| Information flow security in boundary ambients | 2008-04-16 | Paper |
| Programming Languages and Systems | 2007-09-28 | Paper |
| Foundations of Security Analysis and Design III | 2006-11-01 | Paper |
| Secure shared data-space coordination languages: a process algebraic survey | 2006-10-25 | Paper |
| Foundations of Software Science and Computational Structures | 2005-11-10 | Paper |
| A modular approach to Sprouts | 2005-02-23 | Paper |
| Verifying persistent security properties | 2004-11-18 | Paper |
| Nesting analysis of mobile ambients | 2004-11-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4736985 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4417947 | 2003-07-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414391 | 2003-07-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414382 | 2003-07-25 | Paper |
| Security boundaries in mobile ambients | 2003-05-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4798029 | 2003-03-18 | Paper |
| A comparison of three authentication properties. | 2003-01-22 | Paper |
| Primitives for authentication in process algebras. | 2002-07-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4330563 | 2002-05-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2767180 | 2002-01-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4790353 | 2002-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2754157 | 2001-12-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4493894 | 2001-11-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4499293 | 2001-03-05 | Paper |