@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'year>=1998 & year <= 2013' -c 'author: "kramer"' papers.bib}}
@ARTICLE{Kramer:10:JCV, AUTHOR = {Simon Kramer and Julian C. Bradfield}, BIBSOURCE = {DBLP, http://dblp.uni-trier.de}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, EE = {http://dx.doi.org/10.1007/s11416-009-0137-1}, JOURNAL = {Journal in Computer Virology}, NUMBER = {2}, PAGES = {105-114}, TITLE = {A general definition of malware}, URL = {http://www.springerlink.com/content/x5373l5445477225/}, VOLUME = {6}, X-EDITORIAL-BOARD = {yes}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {GB}, YEAR = {2010}, BDSK-URL-1 = {http://www.springerlink.com/content/x5373l5445477225/} }
@ARTICLE{Kramer:09:JANCL, AUTHOR = {Simon Kramer and Catuscia Palamidessi and Roberto Segala and Andrea Turrini and Christelle Braun}, DATE-ADDED = {2010-12-30 03:55:02 +0100}, DATE-MODIFIED = {2010-12-30 03:55:02 +0100}, DOI = {10.3166/jancl.19.489516}, JOURNAL = {The Journal of Applied Non-Classical Logics}, NUMBER = {4}, PAGES = {489-516}, TITLE = {A Quantitative Doxastic Logic for Probabilistic Processes and Applications to Information-Hiding}, URL = {http://hal.archives-ouvertes.fr/inria-00445212/en/}, VOLUME = {19}, X-EDITORIAL-BOARD = {yes}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {IT}, YEAR = {2009}, BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00445212/en/}, BDSK-URL-2 = {http://dx.doi.org/10.3166/jancl.19.489516} }
@ARTICLE{Kramer:08:JLAP, AUTHOR = {Simon Kramer}, DATE-ADDED = {2008-12-27 13:06:37 +0100}, DATE-MODIFIED = {2008-12-27 13:07:13 +0100}, DOI = {DOI: 10.1016/j.jlap.2008.05.005}, ISSN = {1567-8326}, JOURNAL = {Journal of Logic and Algebraic Programming}, KEYWORDS = {Process algebra}, NUMBER = {1-2}, PAGES = {60 - 91}, TITLE = {Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography}, URL = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42}, VOLUME = {77}, YEAR = {2008}, BDSK-URL-1 = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42}, BDSK-URL-2 = {http://dx.doi.org/10.1016/j.jlap.2008.05.005} }
@INPROCEEDINGS{Kramer:08:TCV, AUTHOR = {Simon Kramer and Julian C. Bradfield}, BOOKTITLE = {Proceedings of the Workshop on the Theory of Computer Viruses}, DATE-ADDED = {2008-12-25 01:38:08 +0100}, DATE-MODIFIED = {2008-12-27 22:04:05 +0100}, NOTE = {Extended version submitted to the Journal of Computer Virology}, TITLE = {A General Definition of Malware}, URL = {\url{http://tcv.loria.fr/}}, YEAR = {2008}, BDSK-URL-1 = {http://tcv.loria.fr/} }
@INPROCEEDINGS{Kramer:08:IMLA, AUTHOR = {Simon Kramer}, BOOKTITLE = {Proceedings of the {LiCS}-affiliated Intuitionistic Modal Logics and Applications Workshop}, DATE-ADDED = {2008-12-25 01:33:00 +0100}, DATE-MODIFIED = {2008-12-30 03:48:47 +0100}, NOTE = {To appear. Extended version submitted to Information and Computation}, PUBLISHER = {Elsevier B.V.}, SERIES = {Electronic Notes in Theoretical Computer Science}, TITLE = {Reducing Provability to Knowledge in Multi-Agent Systems}, YEAR = {2008}, BDSK-URL-1 = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-90.pdf} }
@BOOK{Magee:99:WILEY, AUTHOR = {Jeff Magee and Jeff Kramer}, PUBLISHER = {Wiley}, TITLE = {Concurrency: State Models and Java Programs}, YEAR = 1999 }
This file has been generated by bibtex2html 1.74