Sjouke Mauw

From MaRDI portal
(Redirected from Person:395656)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A graphical proof theory of logical time2024-05-27Paper
A proof assistant for PSF2024-04-29Paper
Refinement in Interworkings
CONCUR '96: Concurrency Theory
2023-06-28Paper
When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus
Theoretical Computer Science
2023-05-12Paper
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs
1511.94073
2022-12-22Paper
Automated identification of desynchronisation attacks on shared secrets2022-08-25Paper
Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity2022-03-31Paper
A formalization of anonymity and onion routing
Computer Security – ESORICS 2004
2022-03-07Paper
scientific article; zbMATH DE number 7379295 (Why is no real title available?)
(available as arXiv preprint)
2021-08-05Paper
An algorithm for the asynchronous \textit{Write-All} problem based on process collision
Distributed Computing
2020-12-03Paper
Design and analysis of dynamic leader election protocols in broadcast networks
Distributed Computing
2020-11-30Paper
Semantics for specialising attack trees based on linear logic
Fundamenta Informaticae
2018-01-05Paper
Attack-defense trees
Journal Of Logic And Computation
2014-04-01Paper
Privacy and verifiability in voting systems: methods, developments and trends
Computer Science Review
2014-01-29Paper
Analysing the BKE-security protocol with \(\mu\)CRL2013-10-02Paper
A syntactic criterion for injectivity of authentication protocols2013-09-26Paper
Quantitative questions on attack-defense trees
Lecture Notes in Computer Science
2013-06-04Paper
Probabilistic model checking of the PDGF signaling pathway
Lecture Notes in Computer Science
2013-04-03Paper
Operational semantics and verification of security protocols.
Information Security and Cryptography
2010-12-08Paper
Attack-defense trees and two-player binary zero-sum extensive form games are equivalent
Lecture Notes in Computer Science
2010-11-23Paper
A formal framework for quantifying voter-controlled privacy
Journal of Algorithms
2009-07-24Paper
Formal Approaches to Software Testing
Lecture Notes in Computer Science
2009-06-04Paper
A framework for compositional verification of security protocols
Information and Computation
2008-04-16Paper
Task allocation in a multi-server system
Journal of Scheduling
2007-12-20Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Injective synchronisation: An extension of the authentication hierarchy
Theoretical Computer Science
2007-01-09Paper
A hierarchy of communication models for message sequence charts
Science of Computer Programming
2002-10-16Paper
Impossible futures and determinism
Information Processing Letters
2002-07-25Paper
scientific article; zbMATH DE number 1728523 (Why is no real title available?)2002-04-15Paper
A process algebra for interworkings.2001-01-01Paper
UNIFORM ALGEBRAIC SPECIFICATIONS OF FINITE SETS WITH EQUALITY
International Journal of Foundations of Computer Science
1992-06-28Paper
scientific article; zbMATH DE number 4157900 (Why is no real title available?)1990-01-01Paper


Research outcomes over time


This page was built for person: Sjouke Mauw