@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'year>=1998 & year <= 2013' -c 'author: "kramer"' papers.bib}}

@ARTICLE{Kramer:10:JCV,
  AUTHOR = {Simon Kramer and Julian C. Bradfield},
  BIBSOURCE = {DBLP, http://dblp.uni-trier.de},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  EE = {http://dx.doi.org/10.1007/s11416-009-0137-1},
  JOURNAL = {Journal in Computer Virology},
  NUMBER = {2},
  PAGES = {105-114},
  TITLE = {A general definition of malware},
  URL = {http://www.springerlink.com/content/x5373l5445477225/},
  VOLUME = {6},
  X-EDITORIAL-BOARD = {yes},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {GB},
  YEAR = {2010},
  BDSK-URL-1 = {http://www.springerlink.com/content/x5373l5445477225/}
}

@ARTICLE{Kramer:09:JANCL,
  AUTHOR = {Simon Kramer and Catuscia Palamidessi and Roberto Segala and Andrea Turrini and Christelle Braun},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  DOI = {10.3166/jancl.19.489516},
  JOURNAL = {The Journal of Applied Non-Classical Logics},
  NUMBER = {4},
  PAGES = {489-516},
  TITLE = {A Quantitative Doxastic Logic for Probabilistic Processes and Applications to Information-Hiding},
  URL = {http://hal.archives-ouvertes.fr/inria-00445212/en/},
  VOLUME = {19},
  X-EDITORIAL-BOARD = {yes},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {IT},
  YEAR = {2009},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00445212/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.3166/jancl.19.489516}
}

@ARTICLE{Kramer:08:JLAP,
  AUTHOR = {Simon Kramer},
  DATE-ADDED = {2008-12-27 13:06:37 +0100},
  DATE-MODIFIED = {2008-12-27 13:07:13 +0100},
  DOI = {DOI: 10.1016/j.jlap.2008.05.005},
  ISSN = {1567-8326},
  JOURNAL = {Journal of Logic and Algebraic Programming},
  KEYWORDS = {Process algebra},
  NUMBER = {1-2},
  PAGES = {60 - 91},
  TITLE = {Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography},
  URL = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42},
  VOLUME = {77},
  YEAR = {2008},
  BDSK-URL-1 = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42},
  BDSK-URL-2 = {http://dx.doi.org/10.1016/j.jlap.2008.05.005}
}

@INPROCEEDINGS{Kramer:08:TCV,
  AUTHOR = {Simon Kramer and Julian C. Bradfield},
  BOOKTITLE = {Proceedings of the Workshop on the Theory of Computer Viruses},
  DATE-ADDED = {2008-12-25 01:38:08 +0100},
  DATE-MODIFIED = {2008-12-27 22:04:05 +0100},
  NOTE = {Extended version submitted to the Journal of Computer Virology},
  TITLE = {A General Definition of Malware},
  URL = {\url{http://tcv.loria.fr/}},
  YEAR = {2008},
  BDSK-URL-1 = {http://tcv.loria.fr/}
}

@INPROCEEDINGS{Kramer:08:IMLA,
  AUTHOR = {Simon Kramer},
  BOOKTITLE = {Proceedings of the {LiCS}-affiliated Intuitionistic Modal Logics and Applications Workshop},
  DATE-ADDED = {2008-12-25 01:33:00 +0100},
  DATE-MODIFIED = {2008-12-30 03:48:47 +0100},
  NOTE = {To appear. Extended version submitted to Information and Computation},
  PUBLISHER = {Elsevier B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Reducing Provability to Knowledge in Multi-Agent Systems},
  YEAR = {2008},
  BDSK-URL-1 = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-90.pdf}
}

@BOOK{Magee:99:WILEY,
  AUTHOR = {Jeff Magee and Jeff Kramer},
  PUBLISHER = {Wiley},
  TITLE = {Concurrency: State Models and Java Programs},
  YEAR = 1999
}


This file has been generated by bibtex2html 1.74