| Publication | Date of Publication | Type |
|---|
| Hybrid SAT-based consistency checking algorithms for simple temporal networks with decisions | 2023-02-03 | Paper |
Don't tell me the cybersecurity moon is shining... Cybersecurity show and tell Imagine Math 8 | 2022-11-11 | Paper |
| Typing and compositionality for security protocols: a generalization to the geometric fragment | 2022-08-19 | Paper |
Time-stamped claim logic Logic Journal of the IGPL | 2022-01-05 | Paper |
Time-stamped claim logic Logic Journal of the IGPL | 2022-01-05 | Paper |
Consistency checking of STNs with decisions: managing temporal and access-control constraints in a seamless way Information and Computation | 2021-09-21 | Paper |
Event-based time-stamped claim logic Journal of Logical and Algebraic Methods in Programming | 2021-08-03 | Paper |
Explaining cybersecurity with films and the arts Imagine Math 7 | 2021-01-07 | Paper |
Conditional simple temporal networks with uncertainty and decisions Theoretical Computer Science | 2019-11-07 | Paper |
Conditional Simple Temporal Networks with Uncertainty and Resources Journal of Artificial Intelligence Research | 2019-05-17 | Paper |
Compositional meaning in logic Logica Universalis | 2017-11-29 | Paper |
A branching distributed temporal logic for reasoning about entanglement-free quantum state transformations Information and Computation | 2017-09-04 | Paper |
A history of until Electronic Notes in Theoretical Computer Science | 2016-08-05 | Paper |
Alice and Bob: reconciling formal models and implementation Programming Languages with Applications to Biology and Security | 2016-01-08 | Paper |
Quantum State Transformations and Branching Distributed Temporal Logic Logic, Language, Information, and Computation | 2015-01-13 | Paper |
Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete Theoretical Computer Science | 2014-06-06 | Paper |
Defining privacy is supposed to be easy Logic for Programming, Artificial Intelligence, and Reasoning | 2014-01-17 | Paper |
| Deconstructing Alice and Bob | 2013-09-26 | Paper |
| Metareasoning about security protocols using distributed temporal logic | 2013-09-25 | Paper |
Towards an awareness-based semantics for security protocol analysis Electronic Notes in Theoretical Computer Science | 2013-07-24 | Paper |
On the mosaic method for many-dimensional modal logics: a case study combining tense and modal operators Logica Universalis | 2013-04-08 | Paper |
Back from the future Journal of Applied Non-Classical Logics | 2012-07-17 | Paper |
| Modal deduction systems for quantum state transformations | 2012-04-26 | Paper |
Labelled natural deduction for a bundled branching temporal logic Journal Of Logic And Computation | 2011-12-19 | Paper |
Distributed temporal logic for the analysis of security protocol models Theoretical Computer Science | 2011-07-18 | Paper |
A deduction system for meaning negotiation Declarative Agent Languages and Technologies VIII | 2011-05-11 | Paper |
Optimal periodic output feedback control: a continuous-time approach and a case study International Journal of Control | 2010-10-07 | Paper |
Labelled tableaux for distributed temporal logic Journal Of Logic And Computation | 2010-01-14 | Paper |
Truth-values as labels: a general recipe for labelled deduction Journal of Applied Non-Classical Logics | 2009-11-11 | Paper |
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols Foundations of Security Analysis and Design V | 2009-10-22 | Paper |
Secure Pseudonymous Channels Computer Security – ESORICS 2009 | 2009-10-16 | Paper |
A Labeled Natural Deduction System for a Fragment of CTL * Logical Foundations of Computer Science | 2009-02-24 | Paper |
Algebraic Intruder Deductions Logic for Programming, Artificial Intelligence, and Reasoning | 2008-05-27 | Paper |
Foundations of Software Science and Computation Structures Lecture Notes in Computer Science | 2007-05-02 | Paper |
On the semantics of Alice \& Bob specifications of security protocols Theoretical Computer Science | 2007-01-09 | Paper |
Object-oriented modelling of flexible beams Multibody System Dynamics | 2006-10-27 | Paper |
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis Logic Journal of the IGPL | 2006-03-30 | Paper |
Logic for Programming, Artificial Intelligence, and Reasoning Lecture Notes in Computer Science | 2005-11-10 | Paper |
Modal Sequent Calculi Labelled with Truth Values: Completeness, Duality and Analyticity Logic Journal of the IGPL | 2004-10-28 | Paper |
| scientific article; zbMATH DE number 2086603 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 2080008 (Why is no real title available?) | 2004-08-03 | Paper |
Fibring Labelled Deduction Systems Journal Of Logic And Computation | 2003-05-29 | Paper |
| scientific article; zbMATH DE number 1903364 (Why is no real title available?) | 2003-05-01 | Paper |
| A recipe for the complexity analysis of non-classical logics | 2002-07-14 | Paper |
| scientific article; zbMATH DE number 1749009 (Why is no real title available?) | 2002-06-04 | Paper |
An \(O(n \log n)\)-space decision procedure for the relevance logic \(B^+\) Studia Logica | 2001-02-18 | Paper |
Natural deduction for non-classical logics Studia Logica | 2001-02-14 | Paper |
| scientific article; zbMATH DE number 1523046 (Why is no real title available?) | 2000-10-30 | Paper |
Labelled modal logics: Quantifiers Journal of Logic, Language and Information | 2000-03-29 | Paper |
| scientific article; zbMATH DE number 1140672 (Why is no real title available?) | 1998-04-13 | Paper |
Labelled propositional modal logics: theory and practice Journal Of Logic And Computation | 1998-03-25 | Paper |
| scientific article; zbMATH DE number 1088193 (Why is no real title available?) | 1998-01-07 | Paper |