Sjouke Mauw

From MaRDI portal
Person:395656

Available identifiers

zbMath Open mauw.sjoukeDBLPm/SjoukeMauwWikidataQ99849330 ScholiaQ99849330MaRDI QIDQ395656

List of research outcomes





PublicationDate of PublicationType
A graphical proof theory of logical time2024-05-27Paper
A proof assistant for PSF2024-04-29Paper
Refinement in Interworkings2023-06-28Paper
When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus2023-05-12Paper
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs2022-12-22Paper
Automated identification of desynchronisation attacks on shared secrets2022-08-25Paper
Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity2022-03-31Paper
A Formalization of Anonymity and Onion Routing2022-03-07Paper
https://portal.mardi4nfdi.de/entity/Q50097102021-08-05Paper
An algorithm for the asynchronous Write-All problem based on process collision2020-12-03Paper
Design and analysis of dynamic leader election protocols in broadcast networks2020-11-30Paper
Semantics for Specialising Attack Trees based on Linear Logic2018-01-05Paper
Attack-defense trees2014-04-01Paper
Privacy and verifiability in voting systems: methods, developments and trends2014-01-29Paper
Analysing the BKE-security protocol with \(\mu\)CRL2013-10-02Paper
A syntactic criterion for injectivity of authentication protocols2013-09-26Paper
Quantitative Questions on Attack–Defense Trees2013-06-04Paper
Probabilistic Model Checking of the PDGF Signaling Pathway2013-04-03Paper
Operational semantics and verification of security protocols.2010-12-08Paper
Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent2010-11-23Paper
A formal framework for quantifying voter-controlled privacy2009-07-24Paper
Formal Approaches to Software Testing2009-06-04Paper
A framework for compositional verification of security protocols2008-04-16Paper
Task allocation in a multi-server system2007-12-20Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Injective synchronisation: An extension of the authentication hierarchy2007-01-09Paper
A hierarchy of communication models for message sequence charts2002-10-16Paper
Impossible futures and determinism2002-07-25Paper
https://portal.mardi4nfdi.de/entity/Q27797892002-04-15Paper
A process algebra for interworkings.2001-01-01Paper
UNIFORM ALGEBRAIC SPECIFICATIONS OF FINITE SETS WITH EQUALITY1992-06-28Paper
https://portal.mardi4nfdi.de/entity/Q34858791990-01-01Paper

Research outcomes over time

This page was built for person: Sjouke Mauw