| Publication | Date of Publication | Type |
|---|
Synthesizing different development paradigms: combining top-down with bottom-up reasoning about distributed systems Lecture Notes in Computer Science | 2017-01-19 | Paper |
Automated proofs of block cipher modes of operation Journal of Automated Reasoning | 2016-05-26 | Paper |
On the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculus Theoretical Computer Science | 2015-12-15 | Paper |
Mind the gap: modular machine-checked proofs of one-round key exchange protocols Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Verifying untimed and timed aspects of the experimental batch plant European Journal of Control | 2014-08-07 | Paper |
Computational soundness of symbolic analysis for protocols using hash functions Electronic Notes in Theoretical Computer Science | 2013-12-13 | Paper |
CIL security proof for a password-based key exchange Provable Security | 2013-10-23 | Paper |
Formal verification of e-auction protocols Lecture Notes in Computer Science | 2013-08-06 | Paper |
Networks of processes with parameterized state space Electronic Notes in Theoretical Computer Science | 2013-05-10 | Paper |
On unique decomposition of processes in the applied \(\pi\)-calculus Lecture Notes in Computer Science | 2013-03-18 | Paper |
Automated verification of block cipher modes of operation, an improved method Foundations and Practice of Security | 2012-06-08 | Paper |
Vote-independence: a powerful privacy notion for voting protocols Foundations and Practice of Security | 2012-06-08 | Paper |
A computational indistinguishability logic for the bounded storage model Foundations and Practice of Security | 2012-06-08 | Paper |
Certified security proofs of cryptographic protocols in the computational model: an application to intrusion resilience Certified Programs and Proofs | 2011-11-22 | Paper |
Automated proofs for asymmetric encryption Journal of Automated Reasoning | 2011-06-03 | Paper |
| scientific article; zbMATH DE number 5898709 (Why is no real title available?) | 2011-05-20 | Paper |
Beyond provable security verifiable IND-CCA security of OAEP Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
On the equality of probabilistic terms Logic for Programming, Artificial Intelligence, and Reasoning | 2011-01-07 | Paper |
Abstraction as the key for invariant verification Lecture Notes in Computer Science | 2010-03-23 | Paper |
Automated proofs for asymmetric encryption Concurrency, Compositionality, and Correctness | 2010-03-09 | Paper |
Automated security proof for symmetric encryption modes Advances in Computer Science - ASIAN 2009. Information Security and Privacy | 2010-01-14 | Paper |
Formal Indistinguishability Extended to the Random Oracle Model Computer Security – ESORICS 2009 | 2009-10-16 | Paper |
Flat Parametric Counter Automata Fundamenta Informaticae | 2009-06-23 | Paper |
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science | 2008-04-24 | Paper |
Foundations of Software Science and Computation Structures Lecture Notes in Computer Science | 2007-09-28 | Paper |
Flat Parametric Counter Automata Automata, Languages and Programming | 2007-09-11 | Paper |
A symbolic decision procedure for cryptographic protocols with time stamps The Journal of Logic and Algebraic Programming | 2005-10-07 | Paper |
Programming Languages and Systems Lecture Notes in Computer Science | 2005-09-13 | Paper |
Static Analysis Lecture Notes in Computer Science | 2005-08-24 | Paper |
CONCUR 2004 - Concurrency Theory Lecture Notes in Computer Science | 2005-08-23 | Paper |
| scientific article; zbMATH DE number 2102702 (Why is no real title available?) | 2004-09-24 | Paper |
| scientific article; zbMATH DE number 2086524 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 1956589 (Why is no real title available?) | 2003-07-30 | Paper |
| scientific article; zbMATH DE number 1836375 (Why is no real title available?) | 2003-04-24 | Paper |
| scientific article; zbMATH DE number 1834575 (Why is no real title available?) | 2003-02-25 | Paper |
Iterating transducers The Journal of Logic and Algebraic Programming | 2003-02-13 | Paper |
| scientific article; zbMATH DE number 1796140 (Why is no real title available?) | 2002-09-04 | Paper |
| scientific article; zbMATH DE number 1696515 (Why is no real title available?) | 2002-06-13 | Paper |
| scientific article; zbMATH DE number 1701753 (Why is no real title available?) | 2002-02-05 | Paper |
Concurrency verification. Introduction to compositional and noncompositional methods Cambridge Tracts in Theoretical Computer Science | 2002-02-03 | Paper |
Verification of parameterized protocols Journal of Universal Computer Science | 2001-08-13 | Paper |
| scientific article; zbMATH DE number 1617317 (Why is no real title available?) | 2001-07-11 | Paper |
| scientific article; zbMATH DE number 1538040 (Why is no real title available?) | 2001-02-05 | Paper |
| scientific article; zbMATH DE number 1444725 (Why is no real title available?) | 2000-05-09 | Paper |
| scientific article; zbMATH DE number 1023673 (Why is no real title available?) | 1997-06-17 | Paper |
Metric temporal logic with durations Theoretical Computer Science | 1997-02-28 | Paper |