@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'author:"alvim" | author:"andres" | author:"aranda" | author:"aristizabal" | author:"beauxis" | author:"bonchi" | author:"bordenabe" | author:"braun" | author:"chatzikokolakis" | author:"chothia" | author:"deng" | author:"dubreil" | author:"elsalamouny" | author:"giunti" | author:"hamadou" | author:"knight" | author:"kramer" | author:"mio" | author:"olarte" | author:"palamidessi" | author:"pang" | author:"pino" | author:"pradalier" | author:"stronati" | author: "troina" | author:"valencia" | author:"wu" | author:"xu" | author:"ziegler"' -c year=2008 papers.bib}}
@INPROCEEDINGS{Braun:08:FOSSACS, AUTHOR = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi}, BOOKTITLE = {Proceedings of FOSSACS}, DATE-ADDED = {2008-12-30 06:11:27 +0100}, DATE-MODIFIED = {2008-12-30 06:11:27 +0100}, DOI = {10.1007/978-3-540-78499-9_31}, EDITOR = {Roberto Amadio}, PAGES = {443-457}, PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Compositional Methods for Information-Hiding}, URL = {http://hal.inria.fr/inria-00349227/en/}, VOLUME = {4962}, YEAR = {2008}, BDSK-URL-1 = {http://hal.inria.fr/inria-00349227/en/}, BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-540-78499-9_31}, BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf} }
@INPROCEEDINGS{Beauxis:08:BOOK, AUTHOR = {Romain Beauxis and Catuscia Palamidessi and Frank D. Valencia}, BOOKTITLE = {Concurrency, Graphs and Models}, DATE-ADDED = {2008-12-30 06:11:03 +0100}, DATE-MODIFIED = {2008-12-30 06:11:03 +0100}, DOI = {10.1007/978-3-540-68679-8_29}, EDITOR = {Pierpaolo Degano and Rocco {De Nicola} and Jos\'e Meseguer}, PAGES = {473-492}, PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf}, PUBLISHER = {Springer}, READ = {Yes}, SERIES = {Lecture Notes in Computer Science}, TITLE = {On the Asynchronous Nature of the Asynchronous pi-Calculus}, URL = {http://hal.inria.fr/inria-00349226/en/}, VOLUME = {5065}, YEAR = {2008}, BDSK-URL-1 = {http://hal.inria.fr/inria-00349226/en/}, BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-540-68679-8_29}, BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf} }
@INPROCEEDINGS{Beauxis:08:TGC, AUTHOR = {Romain Beauxis and Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, BOOKTITLE = {Proceedings of the Third Symposium on Trustworthy Global Computing (TGC 2007)}, DATE-ADDED = {2008-12-30 06:10:45 +0100}, DATE-MODIFIED = {2008-12-30 06:10:45 +0100}, DOI = {10.1007/978-3-540-78663-4_23}, EDITOR = {Gilles Barthe and C{\'e}dric Fournet}, PAGES = {347-362}, PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Channels-TGC07/tgc.pdf}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Formal Approaches to Information-Hiding (Tutorial)}, URL = {http://hal.inria.fr/inria-00261827/en/}, VOLUME = {4912}, YEAR = {2008}, BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-78663-4_23}, BDSK-URL-2 = {http://hal.inria.fr/inria-00261827/en/} }
@ARTICLE{Chatzikokolakis:08:JCS, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, DATE-ADDED = {2008-12-30 06:07:59 +0100}, DATE-MODIFIED = {2008-12-30 06:07:59 +0100}, DOI = {10.3233/JCS-2008-0333}, JOURNAL = {Journal of Computer Security}, NUMBER = {5}, PAGES = {531--571}, PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf}, TITLE = {On the Bayes risk in information-hiding protocols}, URL = {http://hal.inria.fr/inria-00349224/en/}, VOLUME = {16}, YEAR = {2008}, BDSK-URL-1 = {http://hal.inria.fr/inria-00349224/en/}, BDSK-URL-2 = {http://dx.doi.org/10.3233/JCS-2008-0333}, BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf} }
@ARTICLE{Kramer:08:JLAP, AUTHOR = {Simon Kramer}, DATE-ADDED = {2008-12-27 13:06:37 +0100}, DATE-MODIFIED = {2008-12-27 13:07:13 +0100}, DOI = {DOI: 10.1016/j.jlap.2008.05.005}, ISSN = {1567-8326}, JOURNAL = {Journal of Logic and Algebraic Programming}, KEYWORDS = {Process algebra}, NUMBER = {1-2}, PAGES = {60 - 91}, TITLE = {Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography}, URL = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42}, VOLUME = {77}, YEAR = {2008}, BDSK-URL-1 = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42}, BDSK-URL-2 = {http://dx.doi.org/10.1016/j.jlap.2008.05.005} }
@TECHREPORT{Troina:08:TechRep, AUTHOR = {Angelo Troina and Jean Goubault-Larrecq and Catuscia Palamidessi}, DATE-ADDED = {2008-12-25 01:55:14 +0100}, DATE-MODIFIED = {2008-12-25 01:58:13 +0100}, INSTITUTION = {{LIX}, {E}cole {P}olytechnique}, TITLE = {A Probabilistic Applied Pi-Calculus}, YEAR = {2008} }
@INPROCEEDINGS{Krivine:08:MFPS, AUTHOR = {Jean Krivine and Robin Milner and Angelo Troina}, BOOKTITLE = {Proceedings of the 24th Conference on the Mathematical Foundations of Programming Semantics (MFPS XXIV)}, DATE-ADDED = {2008-12-25 01:48:07 +0100}, DATE-MODIFIED = {2008-12-25 01:52:54 +0100}, DOI = {10.1016/j.entcs.2008.10.006}, EDITOR = {Andrej Bauer and Michael Mislove}, PAGES = {73-96}, PUBLISHER = {Elsevier B.V.}, SERIES = {Electronic Notes in Theoretical Computer Science}, TITLE = {Stochastic Bigraphs}, VOLUME = {218}, YEAR = {2008}, BDSK-URL-1 = {http://dx.doi.org/10.1016/j.entcs.2008.10.006%20%20%20%20} }
@INPROCEEDINGS{Kramer:08:TCV, AUTHOR = {Simon Kramer and Julian C. Bradfield}, BOOKTITLE = {Proceedings of the Workshop on the Theory of Computer Viruses}, DATE-ADDED = {2008-12-25 01:38:08 +0100}, DATE-MODIFIED = {2008-12-27 22:04:05 +0100}, NOTE = {Extended version submitted to the Journal of Computer Virology}, TITLE = {A General Definition of Malware}, URL = {\url{http://tcv.loria.fr/}}, YEAR = {2008}, BDSK-URL-1 = {http://tcv.loria.fr/} }
@INPROCEEDINGS{Kramer:08:IMLA, AUTHOR = {Simon Kramer}, BOOKTITLE = {Proceedings of the {LiCS}-affiliated Intuitionistic Modal Logics and Applications Workshop}, DATE-ADDED = {2008-12-25 01:33:00 +0100}, DATE-MODIFIED = {2008-12-30 03:48:47 +0100}, NOTE = {To appear. Extended version submitted to Information and Computation}, PUBLISHER = {Elsevier B.V.}, SERIES = {Electronic Notes in Theoretical Computer Science}, TITLE = {Reducing Provability to Knowledge in Multi-Agent Systems}, YEAR = {2008}, BDSK-URL-1 = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-90.pdf} }
@ARTICLE{Credi:08:TCS, AUTHOR = {Alberto Credi and Marco Garavelli and Cosimo Laneve and Sylvain Pradalier and Serena Silvi and Gianluigi Zavattaro}, DATE-ADDED = {2008-12-24 18:08:11 +0100}, DATE-MODIFIED = {2008-12-24 18:09:22 +0100}, DOI = {10.1016/j.tcs.2008.07.006}, JOURNAL = {Theoretical Computer Science}, NUMBER = {1}, PAGES = {17-30}, TITLE = {nanoK: A calculus for the modeling and simulation of nano devices}, VOLUME = {408}, YEAR = {2008}, BDSK-URL-1 = {http://dx.doi.org/10.1016/j.tcs.2008.07.006} }
@INPROCEEDINGS{Beauxis:08:ICLP, AUTHOR = {Romain Beauxis}, BOOKTITLE = {24th International Conference on Logic Programming}, DATE-ADDED = {2008-12-24 16:47:59 +0100}, DATE-MODIFIED = {2008-12-24 16:50:26 +0100}, DOI = {10.1007/978-3-540-89982-2_80}, EDITOR = {Maria Garcia de la Banda and Enrico Pontelli}, PAGES = {801-802}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Probabilistic and Concurrent Models for Security}, VOLUME = {5366}, YEAR = {2008}, BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-89982-2_80} }
@INPROCEEDINGS{Aranda:08:ICLP, AUTHOR = {Jes{\'u}s Aranda and Jorge A. P{\'e}rez and Camilo Rueda and Frank D. Valencia}, BOOKTITLE = {24th International Conference on Logic Programming}, DATE-ADDED = {2008-12-24 16:40:08 +0100}, DATE-MODIFIED = {2008-12-24 16:42:59 +0100}, DOI = {10.1007/978-3-540-89982-2}, EDITOR = {Maria Garcia de la Banda and Enrico Pontelli}, PAGES = {682-686}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Stochastic Behavior and Explicit Discrete Time in Concurrent Constraint Programming}, VOLUME = {5366}, YEAR = {2008}, BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-89982-2} }
@INPROCEEDINGS{Olarte:08:PPDP, AUTHOR = {Carlos Olarte and Frank D. Valencia}, BOOKTITLE = {Proceedings of the 10th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming}, DATE-ADDED = {2008-12-24 16:32:28 +0100}, DATE-MODIFIED = {2008-12-30 05:38:27 +0100}, DOI = {10.1145/1389449.1389452}, EDITOR = {Sergio Antoy and Elvira Albert}, PAGES = {8-19}, TITLE = {The expressivity of universal timed CCP: undecidability of Monadic FLTL and closure operators for security}, URL = {http://hal.inria.fr/inria-00349353/en/}, YEAR = {2008}, BDSK-URL-1 = {http://dx.doi.org/10.1145/1389449.1389452} }
@INPROCEEDINGS{Chatzikokolakis:08:MFPS, AUTHOR = {Konstantinos Chatzikokolakis and Keye Martin}, BOOKTITLE = {Proceedings of the Twenty-fourth Conference on the Mathematical Foundations of Programming Semantics}, DATE-ADDED = {2008-07-22 05:54:40 +0200}, DATE-MODIFIED = {2008-12-24 16:25:39 +0100}, DOI = {10.1016/j.entcs.2008.10.008}, EDITOR = {Andrej Bauer and Michael Mislove}, PAGES = {111-129}, PUBLISHER = {Elsevier B.V.}, SERIES = {Electronic Notes in Theoretical Computer Science}, TITLE = {A Monotonicity Principle for Information Theory.}, VOLUME = {218}, YEAR = {2008}, BDSK-URL-1 = {http://dx.doi.org/10.1016/j.entcs.2008.10.008} }
@INPROCEEDINGS{Olarte:08:SAC, AUTHOR = {Carlos Olarte and Frank D. Valencia}, BOOKTITLE = {Proceedings of the 23rd ACM Symposium on Applied Computing (SAC)}, DATE-ADDED = {2007-12-09 23:59:15 +0100}, DATE-MODIFIED = {2008-12-30 06:06:40 +0100}, DOI = {10.1145/1363686.1363726}, NOTE = {\url{http://www.lix.polytechnique.fr/~colarte/colarte/Publications_files/sac08.pdf}}, PAGES = {145-150}, PDF = {http://www.lix.polytechnique.fr/~colarte/colarte/Publications_files/sac08.pdf}, PUBLISHER = {ACM}, TITLE = {Universal Concurrent Constraint Programing: Symbolic Semantics and Applications to Security}, URL = {http://hal.inria.fr/inria-00201497/en/}, YEAR = 2008, BDSK-URL-1 = {http://dx.doi.org/10.1145/1363686.1363726}, BDSK-URL-2 = {http://hal.inria.fr/inria-00201497/en/}, BDSK-URL-3 = {http://www.lix.polytechnique.fr/~colarte/colarte/Publications_files/sac08.pdf} }
@INPROCEEDINGS{Cacciagrano:07:EXPRESS, AUTHOR = {Diletta Cacciagrano and Flavio Corradini and Jes\'us Aranda and Frank D. Valencia}, BOOKTITLE = {Proc. of 14th International Workshop on Expressiveness of Concurrency, ({EXPRESS}'07)}, DATE-MODIFIED = {2008-12-28 17:52:46 +0100}, DOI = {10.1016/j.entcs.2007.11.006}, EDITOR = {Roberto Amadio and Thomas Hildenbrandt}, NOTE = {\url{http://www.brics.dk/~fvalenci/papers/pers-test.pdf}}, PAGES = {59-84}, PUBLISHER = {Elsevier}, SERIES = {ENTCS}, TITLE = {Linearity, Persistence and Testing Semantics in the Asynchronous Pi-Calculus}, VOLUME = {194}, YEAR = {2008}, BDSK-URL-1 = {http://dx.doi.org/10.1016/j.entcs.2007.11.006} }
@ARTICLE{Chatzikokolakis:08:IC, AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, DATE-MODIFIED = {2010-01-04 10:41:19 +0100}, DOI = {10.1016/j.ic.2007.07.003}, JOURNAL = {Inf. and Comp.}, NUMBER = {2--4}, PAGES = {378--401}, TITLE = {Anonymity Protocols as Noisy Channels}, URL = {http://hal.inria.fr/inria-00349225/en/}, VOLUME = {206}, YEAR = {2008}, BDSK-URL-1 = {http://hal.inria.fr/inria-00349225/en/}, BDSK-URL-2 = {http://dx.doi.org/10.1016/j.ic.2007.07.003} }
This file has been generated by bibtex2html 1.74