@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'author:"alvim" | author:"andres" | author:"aranda" | author:"aristizabal" | author:"beauxis" | author:"bonchi" | author:"bordenabe" | author:"braun" | author:"chatzikokolakis" | author:"chothia" | author:"deng" | author:"dubreil" | author:"elsalamouny" | author:"giunti" | author:"hamadou" | author:"knight" | author:"kramer" | author:"mio" | author:"olarte" | author:"palamidessi" | author:"pang" | author:"pino" | author:"pradalier" | author:"stronati" | author: "troina" | author:"valencia" | author:"wu" | author:"xu" | author:"ziegler"' -c year=2008 papers.bib}}

@INPROCEEDINGS{Braun:08:FOSSACS,
  AUTHOR = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of FOSSACS},
  DATE-ADDED = {2008-12-30 06:11:27 +0100},
  DATE-MODIFIED = {2008-12-30 06:11:27 +0100},
  DOI = {10.1007/978-3-540-78499-9_31},
  EDITOR = {Roberto Amadio},
  PAGES = {443-457},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Compositional Methods for Information-Hiding},
  URL = {http://hal.inria.fr/inria-00349227/en/},
  VOLUME = {4962},
  YEAR = {2008},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00349227/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-540-78499-9_31},
  BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf}
}

@INPROCEEDINGS{Beauxis:08:BOOK,
  AUTHOR = {Romain Beauxis and Catuscia Palamidessi and Frank D. Valencia},
  BOOKTITLE = {Concurrency, Graphs and Models},
  DATE-ADDED = {2008-12-30 06:11:03 +0100},
  DATE-MODIFIED = {2008-12-30 06:11:03 +0100},
  DOI = {10.1007/978-3-540-68679-8_29},
  EDITOR = {Pierpaolo Degano and Rocco {De Nicola} and Jos\'e Meseguer},
  PAGES = {473-492},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf},
  PUBLISHER = {Springer},
  READ = {Yes},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {On the Asynchronous Nature of the Asynchronous pi-Calculus},
  URL = {http://hal.inria.fr/inria-00349226/en/},
  VOLUME = {5065},
  YEAR = {2008},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00349226/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-540-68679-8_29},
  BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf}
}

@INPROCEEDINGS{Beauxis:08:TGC,
  AUTHOR = {Romain Beauxis and Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
  BOOKTITLE = {Proceedings of the Third Symposium on Trustworthy Global Computing (TGC 2007)},
  DATE-ADDED = {2008-12-30 06:10:45 +0100},
  DATE-MODIFIED = {2008-12-30 06:10:45 +0100},
  DOI = {10.1007/978-3-540-78663-4_23},
  EDITOR = {Gilles Barthe and C{\'e}dric Fournet},
  PAGES = {347-362},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Channels-TGC07/tgc.pdf},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Formal Approaches to Information-Hiding (Tutorial)},
  URL = {http://hal.inria.fr/inria-00261827/en/},
  VOLUME = {4912},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-78663-4_23},
  BDSK-URL-2 = {http://hal.inria.fr/inria-00261827/en/}
}

@ARTICLE{Chatzikokolakis:08:JCS,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
  DATE-ADDED = {2008-12-30 06:07:59 +0100},
  DATE-MODIFIED = {2008-12-30 06:07:59 +0100},
  DOI = {10.3233/JCS-2008-0333},
  JOURNAL = {Journal of Computer Security},
  NUMBER = {5},
  PAGES = {531--571},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf},
  TITLE = {On the Bayes risk in information-hiding protocols},
  URL = {http://hal.inria.fr/inria-00349224/en/},
  VOLUME = {16},
  YEAR = {2008},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00349224/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.3233/JCS-2008-0333},
  BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf}
}

@ARTICLE{Kramer:08:JLAP,
  AUTHOR = {Simon Kramer},
  DATE-ADDED = {2008-12-27 13:06:37 +0100},
  DATE-MODIFIED = {2008-12-27 13:07:13 +0100},
  DOI = {DOI: 10.1016/j.jlap.2008.05.005},
  ISSN = {1567-8326},
  JOURNAL = {Journal of Logic and Algebraic Programming},
  KEYWORDS = {Process algebra},
  NUMBER = {1-2},
  PAGES = {60 - 91},
  TITLE = {Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography},
  URL = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42},
  VOLUME = {77},
  YEAR = {2008},
  BDSK-URL-1 = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42},
  BDSK-URL-2 = {http://dx.doi.org/10.1016/j.jlap.2008.05.005}
}

@TECHREPORT{Troina:08:TechRep,
  AUTHOR = {Angelo Troina and Jean Goubault-Larrecq and Catuscia Palamidessi},
  DATE-ADDED = {2008-12-25 01:55:14 +0100},
  DATE-MODIFIED = {2008-12-25 01:58:13 +0100},
  INSTITUTION = {{LIX}, {E}cole {P}olytechnique},
  TITLE = {A Probabilistic Applied Pi-Calculus},
  YEAR = {2008}
}

@INPROCEEDINGS{Krivine:08:MFPS,
  AUTHOR = {Jean Krivine and Robin Milner and Angelo Troina},
  BOOKTITLE = {Proceedings of the 24th Conference on the Mathematical Foundations of Programming Semantics (MFPS XXIV)},
  DATE-ADDED = {2008-12-25 01:48:07 +0100},
  DATE-MODIFIED = {2008-12-25 01:52:54 +0100},
  DOI = {10.1016/j.entcs.2008.10.006},
  EDITOR = {Andrej Bauer and Michael Mislove},
  PAGES = {73-96},
  PUBLISHER = {Elsevier B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Stochastic Bigraphs},
  VOLUME = {218},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1016/j.entcs.2008.10.006%20%20%20%20}
}

@INPROCEEDINGS{Kramer:08:TCV,
  AUTHOR = {Simon Kramer and Julian C. Bradfield},
  BOOKTITLE = {Proceedings of the Workshop on the Theory of Computer Viruses},
  DATE-ADDED = {2008-12-25 01:38:08 +0100},
  DATE-MODIFIED = {2008-12-27 22:04:05 +0100},
  NOTE = {Extended version submitted to the Journal of Computer Virology},
  TITLE = {A General Definition of Malware},
  URL = {\url{http://tcv.loria.fr/}},
  YEAR = {2008},
  BDSK-URL-1 = {http://tcv.loria.fr/}
}

@INPROCEEDINGS{Kramer:08:IMLA,
  AUTHOR = {Simon Kramer},
  BOOKTITLE = {Proceedings of the {LiCS}-affiliated Intuitionistic Modal Logics and Applications Workshop},
  DATE-ADDED = {2008-12-25 01:33:00 +0100},
  DATE-MODIFIED = {2008-12-30 03:48:47 +0100},
  NOTE = {To appear. Extended version submitted to Information and Computation},
  PUBLISHER = {Elsevier B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Reducing Provability to Knowledge in Multi-Agent Systems},
  YEAR = {2008},
  BDSK-URL-1 = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-90.pdf}
}

@ARTICLE{Credi:08:TCS,
  AUTHOR = {Alberto Credi and Marco Garavelli and Cosimo Laneve and Sylvain Pradalier and Serena Silvi and Gianluigi Zavattaro},
  DATE-ADDED = {2008-12-24 18:08:11 +0100},
  DATE-MODIFIED = {2008-12-24 18:09:22 +0100},
  DOI = {10.1016/j.tcs.2008.07.006},
  JOURNAL = {Theoretical Computer Science},
  NUMBER = {1},
  PAGES = {17-30},
  TITLE = {nanoK: A calculus for the modeling and simulation of nano devices},
  VOLUME = {408},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1016/j.tcs.2008.07.006}
}

@INPROCEEDINGS{Beauxis:08:ICLP,
  AUTHOR = {Romain Beauxis},
  BOOKTITLE = {24th International Conference on Logic Programming},
  DATE-ADDED = {2008-12-24 16:47:59 +0100},
  DATE-MODIFIED = {2008-12-24 16:50:26 +0100},
  DOI = {10.1007/978-3-540-89982-2_80},
  EDITOR = {Maria Garcia de la Banda and Enrico Pontelli},
  PAGES = {801-802},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Probabilistic and Concurrent Models for Security},
  VOLUME = {5366},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-89982-2_80}
}

@INPROCEEDINGS{Aranda:08:ICLP,
  AUTHOR = {Jes{\'u}s Aranda and Jorge A. P{\'e}rez and Camilo Rueda and Frank D. Valencia},
  BOOKTITLE = {24th International Conference on Logic Programming},
  DATE-ADDED = {2008-12-24 16:40:08 +0100},
  DATE-MODIFIED = {2008-12-24 16:42:59 +0100},
  DOI = {10.1007/978-3-540-89982-2},
  EDITOR = {Maria Garcia de la Banda and Enrico Pontelli},
  PAGES = {682-686},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Stochastic Behavior and Explicit Discrete Time in Concurrent Constraint Programming},
  VOLUME = {5366},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-89982-2}
}

@INPROCEEDINGS{Olarte:08:PPDP,
  AUTHOR = {Carlos Olarte and Frank D. Valencia},
  BOOKTITLE = {Proceedings of the 10th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming},
  DATE-ADDED = {2008-12-24 16:32:28 +0100},
  DATE-MODIFIED = {2008-12-30 05:38:27 +0100},
  DOI = {10.1145/1389449.1389452},
  EDITOR = {Sergio Antoy and Elvira Albert},
  PAGES = {8-19},
  TITLE = {The expressivity of universal timed CCP: undecidability of Monadic FLTL and closure operators for security},
  URL = {http://hal.inria.fr/inria-00349353/en/},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1145/1389449.1389452}
}

@INPROCEEDINGS{Chatzikokolakis:08:MFPS,
  AUTHOR = {Konstantinos Chatzikokolakis and Keye Martin},
  BOOKTITLE = {Proceedings of the Twenty-fourth Conference on the Mathematical Foundations of Programming Semantics},
  DATE-ADDED = {2008-07-22 05:54:40 +0200},
  DATE-MODIFIED = {2008-12-24 16:25:39 +0100},
  DOI = {10.1016/j.entcs.2008.10.008},
  EDITOR = {Andrej Bauer and Michael Mislove},
  PAGES = {111-129},
  PUBLISHER = {Elsevier B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {A Monotonicity Principle for Information Theory.},
  VOLUME = {218},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1016/j.entcs.2008.10.008}
}

@INPROCEEDINGS{Olarte:08:SAC,
  AUTHOR = {Carlos Olarte and Frank D. Valencia},
  BOOKTITLE = {Proceedings of the 23rd ACM Symposium on Applied Computing (SAC)},
  DATE-ADDED = {2007-12-09 23:59:15 +0100},
  DATE-MODIFIED = {2008-12-30 06:06:40 +0100},
  DOI = {10.1145/1363686.1363726},
  NOTE = {\url{http://www.lix.polytechnique.fr/~colarte/colarte/Publications_files/sac08.pdf}},
  PAGES = {145-150},
  PDF = {http://www.lix.polytechnique.fr/~colarte/colarte/Publications_files/sac08.pdf},
  PUBLISHER = {ACM},
  TITLE = {Universal Concurrent Constraint Programing: Symbolic Semantics and Applications to Security},
  URL = {http://hal.inria.fr/inria-00201497/en/},
  YEAR = 2008,
  BDSK-URL-1 = {http://dx.doi.org/10.1145/1363686.1363726},
  BDSK-URL-2 = {http://hal.inria.fr/inria-00201497/en/},
  BDSK-URL-3 = {http://www.lix.polytechnique.fr/~colarte/colarte/Publications_files/sac08.pdf}
}

@INPROCEEDINGS{Cacciagrano:07:EXPRESS,
  AUTHOR = {Diletta Cacciagrano and Flavio Corradini and Jes\'us Aranda and Frank D. Valencia},
  BOOKTITLE = {Proc. of 14th International Workshop on Expressiveness of Concurrency, ({EXPRESS}'07)},
  DATE-MODIFIED = {2008-12-28 17:52:46 +0100},
  DOI = {10.1016/j.entcs.2007.11.006},
  EDITOR = {Roberto Amadio and Thomas Hildenbrandt},
  NOTE = {\url{http://www.brics.dk/~fvalenci/papers/pers-test.pdf}},
  PAGES = {59-84},
  PUBLISHER = {Elsevier},
  SERIES = {ENTCS},
  TITLE = {Linearity, Persistence and Testing Semantics in the Asynchronous Pi-Calculus},
  VOLUME = {194},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1016/j.entcs.2007.11.006}
}

@ARTICLE{Chatzikokolakis:08:IC,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
  DATE-MODIFIED = {2010-01-04 10:41:19 +0100},
  DOI = {10.1016/j.ic.2007.07.003},
  JOURNAL = {Inf. and Comp.},
  NUMBER = {2--4},
  PAGES = {378--401},
  TITLE = {Anonymity Protocols as Noisy Channels},
  URL = {http://hal.inria.fr/inria-00349225/en/},
  VOLUME = {206},
  YEAR = {2008},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00349225/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1016/j.ic.2007.07.003}
}


This file has been generated by bibtex2html 1.74