| Publication | Date of Publication | Type |
|---|
Revealing the trajectories of KLAIM tuples, statically Models, Languages, and Tools for Concurrent and Distributed Programming | 2024-02-23 | Paper |
Process calculi for biological processes Natural Computing | 2023-11-30 | Paper |
On relating some models for concurrency Lecture Notes in Computer Science | 2022-11-02 | Paper |
Security issues in service composition Lecture Notes in Computer Science | 2021-05-25 | Paper |
Natural projection as partial model checking Journal of Automated Reasoning | 2020-11-02 | Paper |
Security metrics at work on the things in IoT systems From Lambda Calculus to Cybersecurity Through Program Analysis | 2020-07-20 | Paper |
| Robust declassification by incremental typing | 2020-03-03 | Paper |
| From orchestration to choreography through contract automata | 2020-02-14 | Paper |
From orchestration to choreography through contract automata (available as arXiv preprint) | 2020-02-14 | Paper |
Proved trees Automata, Languages and Programming | 2019-12-04 | Paper |
| From natural projection to partial model checking and back | 2019-09-16 | Paper |
Causality for mobile processes Automata, Languages and Programming | 2019-01-10 | Paper |
Tracing where IoT data are collected and aggregated (available as arXiv preprint) | 2017-10-12 | Paper |
Regular and context-free nominal traces Acta Informatica | 2017-06-09 | Paper |
Automata for Specifying and Orchestrating Service Contracts Logical Methods in Computer Science | 2017-04-11 | Paper |
Model checking usage policies Mathematical Structures in Computer Science | 2016-07-27 | Paper |
Automata for analysing service contracts Trustworthy Global Computing | 2016-06-09 | Paper |
Relating two automata-based models of orchestration and choreography Journal of Logical and Algebraic Methods in Programming | 2016-04-20 | Paper |
Last mile's resources Semantics, Logics, and Calculi | 2016-03-23 | Paper |
Debits and Credits in Petri Nets and Linear Logic Lecture Notes in Computer Science | 2015-09-14 | Paper |
Linguistic mechanisms for context-aware security Theoretical Aspects of Computing – ICTAC 2014 | 2015-01-13 | Paper |
Hard life with weak binders Electronic Notes in Theoretical Computer Science | 2014-07-23 | Paper |
| A quantitative study of two attacks | 2013-09-20 | Paper |
| Performance evaluation of security protocols specified in LySa | 2013-09-20 | Paper |
Towards nominal context-free model-checking Implementation and Application of Automata | 2013-08-07 | Paper |
Techniques for security checking: non-interference vs control flow analysis Electronic Notes in Theoretical Computer Science | 2013-07-24 | Paper |
Nominal automata for resource usage control Implementation and Application of Automata | 2012-09-20 | Paper |
Security-aware program transformations. Lecture Notes in Computer Science | 2010-02-23 | Paper |
Global Computing. Programming Environments, Languages, Security, and Analysis of Systems Lecture Notes in Computer Science | 2010-02-05 | Paper |
Reflecting mobile ambients into the \(\pi \)-calculus Lecture Notes in Computer Science | 2010-02-05 | Paper |
Causality and replication in concurrent processes Lecture Notes in Computer Science | 2010-01-05 | Paper |
Secure Service Orchestration Foundations of Security Analysis and Design IV | 2009-10-22 | Paper |
ν-Types for Effects and Freshness Analysis Theoretical Aspects of Computing - ICTAC 2009 | 2009-08-20 | Paper |
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols Algebraic Methodology and Software Technology | 2009-01-27 | Paper |
Synapses as stochastic concurrent systems Theoretical Computer Science | 2008-12-12 | Paper |
Ugo Montanari in a Nutshell Concurrency, Graphs and Models | 2008-06-19 | Paper |
Foundations of Software Science and Computation Structures Lecture Notes in Computer Science | 2007-09-28 | Paper |
Types and Effects for Resource Usage Analysis Foundations of Software Science and Computational Structures | 2007-09-07 | Paper |
Foundations of Software Science and Computation Structures Lecture Notes in Computer Science | 2007-05-02 | Paper |
Theoretical Computer Science Lecture Notes in Computer Science | 2006-11-01 | Paper |
Foundations of Software Science and Computational Structures Lecture Notes in Computer Science | 2005-11-10 | Paper |
Weakening the perfect encryption assumption in Dolev-Yao adversaries Theoretical Computer Science | 2005-06-30 | Paper |
Modelling biochemical pathways through enhanced \(\pi\)-calculus Theoretical Computer Science | 2004-10-27 | Paper |
| scientific article; zbMATH DE number 2102772 (Why is no real title available?) | 2004-09-24 | Paper |
| scientific article; zbMATH DE number 1950568 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950546 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1860683 (Why is no real title available?) | 2003-06-02 | Paper |
Static analysis for the \(\pi\)-calculus with applications to security Information and Computation | 2003-01-14 | Paper |
| scientific article; zbMATH DE number 1834562 (Why is no real title available?) | 2002-11-24 | Paper |
A causal semantics for CCS via rewriting logic Theoretical Computer Science | 2002-07-31 | Paper |
Primitives for authentication in process algebras. Theoretical Computer Science | 2002-07-15 | Paper |
| scientific article; zbMATH DE number 1696438 (Why is no real title available?) | 2002-07-08 | Paper |
| scientific article; zbMATH DE number 1512075 (Why is no real title available?) | 2001-09-04 | Paper |
Names of the \(\pi\)-calculus agents handled locally Theoretical Computer Science | 2000-12-12 | Paper |
LR techniques for handling syntax errors Computer Languages | 2000-01-04 | Paper |
Causality for debugging mobile agents Acta Informatica | 1999-11-01 | Paper |
Non-interleaving semantics for mobile processes Theoretical Computer Science | 1999-04-28 | Paper |
| scientific article; zbMATH DE number 1231669 (Why is no real title available?) | 1999-01-07 | Paper |
Axiomatizing the algebra of net computations and processes Acta Informatica | 1995-11-19 | Paper |
A causal operational semantics of action refinement Information and Computation | 1995-10-30 | Paper |
| scientific article; zbMATH DE number 741350 (Why is no real title available?) | 1995-04-09 | Paper |
| scientific article; zbMATH DE number 517055 (Why is no real title available?) | 1994-03-17 | Paper |
Refinement of actions in event structures and causal trees Theoretical Computer Science | 1993-12-06 | Paper |
Universal axioms for bisimulations Theoretical Computer Science | 1993-10-25 | Paper |
| scientific article; zbMATH DE number 176132 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 4185040 (Why is no real title available?) | 1991-01-01 | Paper |
| scientific article; zbMATH DE number 4213438 (Why is no real title available?) | 1990-01-01 | Paper |
A partial ordering semantics for CCS Theoretical Computer Science | 1990-01-01 | Paper |
| scientific article; zbMATH DE number 4119653 (Why is no real title available?) | 1989-01-01 | Paper |
| scientific article; zbMATH DE number 4191145 (Why is no real title available?) | 1989-01-01 | Paper |
A normal form for restricted exponential functions RAIRO - Theoretical Informatics and Applications | 1989-01-01 | Paper |
A distributed operational semantics of CCS based on condition/event systems Acta Informatica | 1988-01-01 | Paper |
| scientific article; zbMATH DE number 4094831 (Why is no real title available?) | 1988-01-01 | Paper |
Concurrent histories: a basis for observing distributed systems Journal of Computer and System Sciences | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 4035159 (Why is no real title available?) | 1987-01-01 | Paper |
Partial ordering models for concurrency can be defined operationally International Journal of Parallel Programming | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 3898215 (Why is no real title available?) | 1985-01-01 | Paper |
| scientific article; zbMATH DE number 3903950 (Why is no real title available?) | 1985-01-01 | Paper |
An Evaluation Based Theorem Prover IEEE Transactions on Pattern Analysis and Machine Intelligence | 1985-01-01 | Paper |
| scientific article; zbMATH DE number 3911691 (Why is no real title available?) | 1985-01-01 | Paper |
| scientific article; zbMATH DE number 3778724 (Why is no real title available?) | 1982-01-01 | Paper |
| scientific article; zbMATH DE number 3700273 (Why is no real title available?) | 1980-01-01 | Paper |
| scientific article; zbMATH DE number 3704013 (Why is no real title available?) | 1979-01-01 | Paper |