@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'year>=1998 & year <= 2013' -c 'author: "kramer"' papers.bib}}
@ARTICLE{Kramer:10:JCV,
AUTHOR = {Simon Kramer and Julian C. Bradfield},
BIBSOURCE = {DBLP, http://dblp.uni-trier.de},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
EE = {http://dx.doi.org/10.1007/s11416-009-0137-1},
JOURNAL = {Journal in Computer Virology},
NUMBER = {2},
PAGES = {105-114},
TITLE = {A general definition of malware},
URL = {http://www.springerlink.com/content/x5373l5445477225/},
VOLUME = {6},
X-EDITORIAL-BOARD = {yes},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {GB},
YEAR = {2010},
BDSK-URL-1 = {http://www.springerlink.com/content/x5373l5445477225/}
}
@ARTICLE{Kramer:09:JANCL,
AUTHOR = {Simon Kramer and Catuscia Palamidessi and Roberto Segala and Andrea Turrini and Christelle Braun},
DATE-ADDED = {2010-12-30 03:55:02 +0100},
DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
DOI = {10.3166/jancl.19.489516},
JOURNAL = {The Journal of Applied Non-Classical Logics},
NUMBER = {4},
PAGES = {489-516},
TITLE = {A Quantitative Doxastic Logic for Probabilistic Processes and Applications to Information-Hiding},
URL = {http://hal.archives-ouvertes.fr/inria-00445212/en/},
VOLUME = {19},
X-EDITORIAL-BOARD = {yes},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {IT},
YEAR = {2009},
BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00445212/en/},
BDSK-URL-2 = {http://dx.doi.org/10.3166/jancl.19.489516}
}
@ARTICLE{Kramer:08:JLAP,
AUTHOR = {Simon Kramer},
DATE-ADDED = {2008-12-27 13:06:37 +0100},
DATE-MODIFIED = {2008-12-27 13:07:13 +0100},
DOI = {DOI: 10.1016/j.jlap.2008.05.005},
ISSN = {1567-8326},
JOURNAL = {Journal of Logic and Algebraic Programming},
KEYWORDS = {Process algebra},
NUMBER = {1-2},
PAGES = {60 - 91},
TITLE = {Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography},
URL = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42},
VOLUME = {77},
YEAR = {2008},
BDSK-URL-1 = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42},
BDSK-URL-2 = {http://dx.doi.org/10.1016/j.jlap.2008.05.005}
}
@INPROCEEDINGS{Kramer:08:TCV,
AUTHOR = {Simon Kramer and Julian C. Bradfield},
BOOKTITLE = {Proceedings of the Workshop on the Theory of Computer Viruses},
DATE-ADDED = {2008-12-25 01:38:08 +0100},
DATE-MODIFIED = {2008-12-27 22:04:05 +0100},
NOTE = {Extended version submitted to the Journal of Computer Virology},
TITLE = {A General Definition of Malware},
URL = {\url{http://tcv.loria.fr/}},
YEAR = {2008},
BDSK-URL-1 = {http://tcv.loria.fr/}
}
@INPROCEEDINGS{Kramer:08:IMLA,
AUTHOR = {Simon Kramer},
BOOKTITLE = {Proceedings of the {LiCS}-affiliated Intuitionistic Modal Logics and Applications Workshop},
DATE-ADDED = {2008-12-25 01:33:00 +0100},
DATE-MODIFIED = {2008-12-30 03:48:47 +0100},
NOTE = {To appear. Extended version submitted to Information and Computation},
PUBLISHER = {Elsevier B.V.},
SERIES = {Electronic Notes in Theoretical Computer Science},
TITLE = {Reducing Provability to Knowledge in Multi-Agent Systems},
YEAR = {2008},
BDSK-URL-1 = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-90.pdf}
}
@BOOK{Magee:99:WILEY,
AUTHOR = {Jeff Magee and Jeff Kramer},
PUBLISHER = {Wiley},
TITLE = {Concurrency: State Models and Java Programs},
YEAR = 1999
}
This file has been generated by bibtex2html 1.74