| Publication | Date of Publication | Type |
|---|
| Key-schedule security for the TLS 1.3 standard | 2023-08-25 | Paper |
| A calculus of mobile agents | 2023-06-28 | Paper |
| Implicit typing à la ML for the join-calculus | 2023-05-17 | Paper |
| State separation for code-based game-playing proofs | 2019-01-23 | Paper |
| The Applied Pi Calculus | 2018-08-02 | Paper |
| Dependent types and multi-monadic effects in \(\mathrm{F}^*\) | 2016-10-24 | Paper |
| Safe \& efficient gradual typing for TypeScript | 2016-09-29 | Paper |
| A semantics for web services authentication | 2015-11-11 | Paper |
| Self-certification | 2015-09-11 | Paper |
| Modular verification of security protocol code by typing | 2015-06-11 | Paper |
| Mobile values, new names, and secure communication | 2015-03-17 | Paper |
| Authentication primitives and their compilation | 2015-03-17 | Paper |
| Stack inspection | 2015-03-17 | Paper |
| Secure distributed programming with value-dependent types | 2015-03-05 | Paper |
| Square Span Programs with Applications to Succinct NIZK Arguments | 2015-01-16 | Paper |
| Fully abstract compilation to JavaScript | 2014-11-27 | Paper |
| Cryptographically sound implementations for typed information-flow security | 2014-09-12 | Paper |
| Proving the TLS Handshake Secure (As It Is) | 2014-08-07 | Paper |
| Gradual typing embedded securely in JavaScript | 2014-04-10 | Paper |
| Probabilistic relational verification for cryptographic implementations | 2014-04-10 | Paper |
| Secure distributed programming with value-dependent types | 2014-02-27 | Paper |
| Cryptographic Verification by Typing for a Sample Protocol Implementation | 2011-09-16 | Paper |
| Compiling Information-Flow Security to Minimal Trusted Computing Bases | 2011-05-19 | Paper |
| Principles and Applications of Refinement Types | 2010-12-13 | Paper |
| Secure Enforcement for Global Process Specifications | 2009-10-22 | Paper |
| Computational Secrecy by Typing for the Pi Calculus | 2008-05-06 | Paper |
| A Formal Implementation of Value Commitment | 2008-04-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5447364 | 2008-03-06 | Paper |
| Automated verification of selected equivalences for security protocols | 2008-03-05 | Paper |
| Programming Languages and Systems | 2007-09-28 | Paper |
| Cryptographically Sound Implementations for Communicating Processes | 2007-09-11 | Paper |
| Programming Languages and Systems | 2005-09-13 | Paper |
| Computer Aided Verification | 2005-08-25 | Paper |
| Formal Methods for Components and Objects | 2005-08-22 | Paper |
| A semantics for web services authentication | 2005-06-30 | Paper |
| A hierarchy of equivalences for asynchronous calculi | 2005-04-18 | Paper |
| Private authentication | 2004-10-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4813226 | 2004-08-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046754 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472462 | 2004-08-04 | Paper |
| Inheritance in the join calculus. | 2004-03-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418586 | 2003-08-11 | Paper |
| Secure implementation of channel abstractions | 2003-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536436 | 2002-06-25 | Paper |
| Bisimulations in the join-calculus | 2002-03-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4501667 | 2000-09-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4219054 | 1999-02-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4222942 | 1999-01-06 | Paper |