@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'year>=1998 & year <= 2013' -c 'author: "palamidessi"' papers.bib}}

@UNPUBLISHED{elsalamouny:hal-00760735,
  AUTHOR = {Elsalamouny, Ehab and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
  NOTE = {This paper is to appear in the proceedings of POST 2013 (Principles of Security and Trust).},
  TITLE = {{A differentially private mechanism of optimal utility for a region of priors}},
  YEAR = 2013,
  URL = {http://hal.inria.fr/hal-00760735},
  X-ID-HAL = {hal-00760735}
}

@ARTICLE{chatzikokolakis:hal-00760596,
  AUTHOR = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia and Braun, Christelle},
  JOURNAL = {{Mathematical Structures in Computer Science}},
  NOTE = {To appear},
  PUBLISHER = {Cambridge University Press},
  TITLE = {{Compositional Methods for Information-Hiding}},
  URL = {http://hal.inria.fr/hal-00760596},
  X-EDITORIAL-BOARD = {yes},
  X-ID-HAL = {hal-00760596},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2013}
}

@TECHREPORT{andres:hal-00766821,
  AUTHOR = {Andres, E., Miguel and Bordenabe, Nicolas E. and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
  TITLE = {{Geo-Indistinguishability: Differential Privacy for Location-Based Systems}},
  TYPE = {Technical Report},
  URL = {http://hal.inria.fr/hal-00766821},
  X-ID-HAL = {hal-00766821},
  YEAR = {2012}
}

@TECHREPORT{chatzikokolakis:hal-00767210,
  AUTHOR = {Chatzikokolakis, Konstantinos and Andres, E., Miguel and Bordenabe, Nicolas E. and Palamidessi, Catuscia},
  TITLE = {{Enhancing Differential Privacy: from Hamming to General Metrics}},
  TYPE = {Technical Report},
  URL = {http://hal.inria.fr/hal-00767210},
  X-ID-HAL = {hal-00767210},
  YEAR = {2012}
}

@INPROCEEDINGS{gazeau:hal-00665995,
  ADDRESS = {Tallinn, Estonia},
  AUTHOR = {Gazeau, Ivan and Miller, Dale and Palamidessi, Catuscia},
  BOOKTITLE = {{QAPL - Tenth Workshop on Quantitative Aspects of Programming Languages}},
  DOI = {10.4204/EPTCS.85.5},
  EDITOR = {Mieke Massink and Herbert Wiklicky},
  MONTH = MAR,
  TITLE = {{A non-local method for robustness analysis of floating point programs}},
  URL = {http://hal.inria.fr/hal-00665995},
  X-ID-HAL = {hal-00665995},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2012}
}

@ARTICLE{chatzikokolakis:inria-00637160,
  AUTHOR = {Chatzikokolakis, Konstantinos and Knight, Sophia and Palamidessi, Catuscia and Panangaden, Prakash},
  DOI = {10.1145/2362355.2362356},
  JOURNAL = {{Transactions on Computational Logic}},
  MONTH = OCT,
  NUMBER = {4},
  PAGES = {28:1-28:35},
  PUBLISHER = {ACM},
  TITLE = {{Epistemic Strategies and Games on Concurrent Processes}},
  URL = {http://hal.inria.fr/inria-00637160},
  VOLUME = {13},
  X-EDITORIAL-BOARD = {yes},
  X-ID-HAL = {inria-00637160},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2012}
}

@ARTICLE{alvim:inria-00637356,
  AUTHOR = {Alvim, S., Mario and Andres, E., Miguel and Palamidessi, Catuscia},
  JOURNAL = {{Journal of Computer Security}},
  NUMBER = {1},
  PAGES = {3-50},
  PUBLISHER = {IOS Press},
  TITLE = {{Quantitative Information Flow in Interactive Systems}},
  URL = {http://hal.inria.fr/inria-00637356},
  VOLUME = {20},
  X-EDITORIAL-BOARD = {yes},
  X-ID-HAL = {inria-00637356},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2012}
}

@INPROCEEDINGS{alvim:hal-00734044,
  ADDRESS = {Cambridge MA, United States},
  AUTHOR = {Alvim, S., Mario and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia and Smith, Geoffrey},
  BOOKTITLE = { Proceedings of {Computer Security Foundations (CSF)}},
  DOI = {10.1109/CSF.2012.26},
  PAGES = {265-279},
  PUBLISHER = {IEEE},
  TITLE = {{Measuring Information Leakage using Generalized Gain Functions}},
  URL = {http://hal.inria.fr/hal-00734044},
  X-ID-HAL = {hal-00734044},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2012}
}

@INPROCEEDINGS{palamidessi:hal-00760688,
  ADDRESS = {Tallin, Estonia},
  AUTHOR = {Palamidessi, Catuscia and Stronati, Marco},
  BOOKTITLE = {{QAPL - Tenth Workshop on Quantitative Aspects of Programming Languages}},
  DOI = {10.4204/EPTCS.85.7},
  EDITOR = {Wiklicky, Herbert and Massink, Mieke},
  PAGES = {92-105},
  PUBLISHER = {Open Publishing Association},
  TITLE = {{Differential privacy for relational algebra: improving the sensitivity bounds via constraint systems}},
  URL = {http://hal.inria.fr/hal-00760688},
  VOLUME = {85},
  X-ID-HAL = {hal-00760688},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2012}
}

@INPROCEEDINGS{knight:hal-00761116,
  ADDRESS = {Newcastle upon Tyne, United Kingdom},
  AUTHOR = {Knight, Sophia and Palamidessi, Catuscia and Panangaden, Prakash and Valencia, Frank D.},
  BOOKTITLE = {Proceedings of {CONCUR 2012 - Concurrency Theory - 23rd International Conference, CONCUR 2012}},
  DOI = {10.1007/978-3-642-32940-1},
  MONTH = SEP,
  PAGES = {317-332},
  TITLE = {{Spatial and Epistemic Modalities in Constraint-Based Process Calculi}},
  URL = {http://hal.inria.fr/hal-00761116},
  VOLUME = {7454},
  X-ID-HAL = {hal-00761116},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2012}
}

@INPROCEEDINGS{giunti:hal-00761118,
  ADDRESS = {New Castle upon Tyne, United Kingdom},
  AUTHOR = {Giunti, Marco and Palamidessi, Catuscia and Valencia, Frank D.},
  BOOKTITLE = {{Combined 19th International Workshop on Expressiveness in Concurrency and 9th Workshop on Structured Operational Semantics (EXPRESS/SOS 2012)}},
  DOI = {10.4204/EPTCS.89},
  MONTH = AUG,
  PAGES = {65-80},
  TITLE = {{Hide and New in the Pi-Calculus}},
  URL = {http://hal.inria.fr/hal-00761118},
  X-ID-HAL = {hal-00761118},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2012}
}

@ARTICLE{andres:2011:hal-00573447:1,
  AUTHOR = {Andres, E., Miguel and Palamidessi, Catuscia and Sokolova, Ana and Van Rossum, Peter},
  X-PAYS = {AT,NL},
  TITLE = {{Information Hiding in Probabilistic Concurrent Systems}},
  JOURNAL = {{Journal of Theoretical Computer Science}},
  VOLUME = {412},
  NUMBER = {28},
  PAGES = {3072-3089},
  YEAR = {2011},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-EDITORIAL-BOARD = {yes},
  URL = {http://hal.inria.fr/hal-00573447/en},
  X-ID-HAL = {hal-00573447}
}

@INPROCEEDINGS{aristizabal:2011:hal-00546722:1,
  AUTHOR = {Aristizabal, Andr\'es and Bonchi, Filippo and Palamidessi, Catuscia and Pino, Luis and Valencia, Frank D.},
  TITLE = {{Deriving Labels and Bisimilarity for Concurrent Constraint Programming}},
  BOOKTITLE = { {Proceedings of the 14th International Conference on Foundations of Software Science an Computation Structures (FOSSACS 2011). }},
  YEAR = {2011},
  SERIES = {Lecture Notes in Computer Science},
  EDITOR = {Martin Hofmann},
  DOI = {10.1007/ISBN 978-3-642-19804-5},
  PUBLISHER = {Springer},
  VOLUME = {6604},
  PAGES = {138-152},
  ADDRESS = {Saarbr{\"u}cken, Germany},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  URL = {http://hal.inria.fr/hal-00546722/en},
  X-ID-HAL = {hal-00546722}
}

@INPROCEEDINGS{alvim:2011:inria-00580122:5,
  AUTHOR = {Alvim, S., M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Degano, Pierpaolo and Palamidessi, Catuscia},
  X-PAYS = {IT},
  TITLE = {{Differential Privacy: on the trade-off between Utility and Information Leakage}},
  BOOKTITLE = {{The 8th International Workshop on Formal Aspects of Security \& Trust (FAST)}},
  YEAR = {2011},
  MONTH = MAR,
  SERIES = {Lecture Notes in Computer Science},
  EDITOR = {Gilles Barthe and Anupam Datta and Sandro Etalle},
  PUBLISHER = {Springer},
  ADDRESS = {Leuven, Belgium},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  URL = {http://hal.inria.fr/inria-00580122/en},
  X-ID-HAL = {inria-00580122}
}

@INPROCEEDINGS{alvim:2011:inria-00627937:1,
  AUTHOR = {Alvim, S., M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
  TITLE = {{On the relation between Differential Privacy and Quantitative Information Flow}},
  BOOKTITLE = {{38th International Colloquium on Automata, Languages and Programming - ICALP 2011}},
  YEAR = {2011},
  SERIES = {Lecture Notes in Computer Science},
  EDITOR = {Luca Aceto, Monika Henzinger, Jiri Sgall},
  DOI = {10.1007/978-3-642-22012-8\_4},
  PUBLISHER = {Springer},
  VOLUME = {6756},
  PAGES = {60-76},
  ADDRESS = {Zurich, Switzerland},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  X-INVITED-CONFERENCE = {yes},
  URL = {http://hal.inria.fr/inria-00627937/en},
  X-ID-HAL = {inria-00627937}
}

@INCOLLECTION{alvim:2011:hal-00655522:1,
  AUTHOR = {Alvim, M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
  TITLE = {{Quantitative Information Flow and Applications to Differential Privacy}},
  YEAR = {2011},
  BOOKTITLE = {{Foundations of Security Analysis and Design VI -- FOSAD Tutorial Lectures}},
  EDITOR = {Alessandro Aldini and Roberto Gorrieri},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  DOI = {10.1007/978-3-642-23082-0\_8},
  PAGES = {211--230},
  VOLUME = {6858},
  X-INTERNATIONAL-AUDIENCE = {yes},
  URL = {http://hal.inria.fr/hal-00655522/en},
  X-ID-HAL = {hal-00655522}
}

@PROCEEDINGS{modersheim:2011:hal-00655523:1,
  X-PROCEEDINGS = {yes},
  AUTHOR = {M{\"o}dersheim, Sebastian and Palamidessi, Catuscia},
  X-PAYS = {DK},
  TITLE = {{Post-proceedings of TOSCA -- Theory of Security and Applications}},
  YEAR = {2011},
  SERIES = {Lecture Notes in Computer Science},
  EDITOR = {Sebastian M{\"o}dersheim and Catuscia Palamidessi},
  PAGES = {235 pages},
  PUBLISHER = {Springer},
  VOLUME = {6993},
  X-INTERNATIONAL-AUDIENCE = {yes},
  URL = {http://hal.inria.fr/hal-00655523/en},
  X-ID-HAL = {hal-00655523}
}

@PROCEEDINGS{palamidessi:2011:hal-00655524:1,
  X-PROCEEDINGS = {yes},
  AUTHOR = {Palamidessi, Catuscia and Riska, Alma},
  X-PAYS = {US},
  TITLE = {{Proceedings of the Eighth International Conference on Quantitative Evaluation of SysTems}},
  YEAR = {2011},
  EDITOR = {Catuscia Palamidessi and Alma Riska},
  PAGES = {276 pages},
  PUBLISHER = {IEEE},
  X-INTERNATIONAL-AUDIENCE = {yes},
  URL = {http://hal.inria.fr/hal-00655524/en},
  X-ID-HAL = {hal-00655524}
}

@INPROCEEDINGS{hamadou:2010:inria-00424853:2,
  ADDRESS = {Eindhoven, The Netherlands},
  AUTHOR = {Hamadou, Sardaouna and Palamidessi, Catuscia and Sassone, Vladimiro and ElSalamouny, Ehab},
  BOOKTITLE = {Postproceedings of the 6th International Workshop on Formal Aspects in Security and Trust},
  DATE-ADDED = {2011-01-02 19:05:50 +0100},
  DATE-MODIFIED = {2011-01-02 19:09:15 +0100},
  DOI = {10.1007/978-3-642-12459-4{\_}11},
  EDITOR = {Pierpaolo Degano and Joshua D. Guttman},
  PAGES = {141-156},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Probable Innocence and Independent Knowledge},
  URL = {http://hal.inria.fr/inria-00424853/en},
  VOLUME = {5983},
  X-ID-HAL = {inria-00424853},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {GB,CA},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-12459-4%7B%5C_%7D11}
}

@INCOLLECTION{longo:2010:hal-00445553:3,
  AUTHOR = {Longo, Giuseppe and Palamidessi, Catuscia and Thierry, Paul},
  BOOKTITLE = {Randomness Through Computation},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  EDITOR = {Hector Zenil},
  NOTE = {ISBN: 978-981-4327-74-9},
  PUBLISHER = {World Scientific},
  TITLE = {{Some Bridging Results and Challenges in Classical, Quantum and Computational Randomnessi}},
  URL = {http://hal.inria.fr/hal-00445553/en},
  X-ID-HAL = {hal-00445553},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2011}
}

@INPROCEEDINGS{PALAMIDESSI:2010:HAL-00548210:1,
  ADDRESS = {{L}ac {B}eaufort, {Q}u\'ebec {C}ity, {C}anada},
  AUTHOR = {{C}atuscia {P}alamidessi},
  BOOKTITLE = {Joint Conference: 10th International Conference on the Mathematics of Program Construction (MPC 2010), and 13th International Conference on Algebraic Methodology And Software Technology (AMAST 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-13321-3\_2},
  EDITOR = {{C}laude {B}olduc and {J}ules {D}esharnais and {B}{\'e}chir {K}tari},
  HAL_ID = {hal-00548210},
  LANGUAGE = {{E}nglish},
  PAGES = {19-19},
  PUBLISHER = {{S}pringer},
  SERIES = {{L}ecture {N}otes in {C}omputer {S}cience},
  TITLE = {{C}ompositionality of {S}ecure {I}nformation {F}low},
  URL = {http://hal.archives-ouvertes.fr/hal-00548210/en/},
  VOLUME = {6120},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-INVITED-CONFERENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548210/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-13321-3_2}
}

@INPROCEEDINGS{PALAMIDESSI:2010:HAL-00548211:1,
  ADDRESS = {{P}aphos, {C}yprus},
  AUTHOR = {Catuscia {P}alamidessi and {M}\'ario S. {A}lvim and Miguel E. Andres},
  BOOKTITLE = {{J}oint {W}orkshop on {A}utomated {R}easoning for {S}ecurity {P}rotocol {A}nalysis and {I}ssues in the {T}heory of {S}ecurity ({ARSPA}-{WITS} 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-16074-5\_8},
  EDITOR = {{A}lessandro {A}rmando and {G}avin {L}owe},
  HAL_ID = {hal-00548211},
  LANGUAGE = {{E}nglish},
  PAGES = {111-111},
  PUBLISHER = {{S}pringer},
  SERIES = {{L}ecture {N}otes in {C}omputer {S}cience},
  TITLE = {{I}nteractive {I}nformation {F}low},
  URL = {http://hal.archives-ouvertes.fr/hal-00548211/en/},
  VOLUME = {6186},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-INVITED-CONFERENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548211/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-16074-5_8}
}

@INPROCEEDINGS{ALVIM:2010:HAL-00548212:1,
  ADDRESS = {{B}risbane, {A}ustralia},
  AUDIENCE = {international},
  AUTHOR = {{M}\'ario S. {A}lvim and Miguel E. Andres and {C}atuscia {P}alamidessi},
  BOOKTITLE = {6th {IFIP} {I}nternational {C}onference on {T}heoretical {C}omputer {S}cience ({TCS} 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-15240-5\_4},
  EDITOR = {{C}ristian {S}. {C}alude and {V}ladimiro {S}assone},
  HAL_ID = {hal-00548212},
  LANGUAGE = {{E}nglish},
  PAGES = {53-54},
  PUBLISHER = {{S}pringer},
  SERIES = {{IFIP} {A}dvances in {I}nformation and {C}ommunication {T}echnology},
  TITLE = {{E}ntropy and {A}ttack {M}odels in {I}nformation {F}low},
  URL = {http://hal.archives-ouvertes.fr/hal-00548212/en/},
  VOLUME = {323},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-INVITED-CONFERENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548212/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-15240-5_4}
}

@ARTICLE{chatzikokolakis:2010:inria-00424860:2,
  AUTHOR = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1016/j.ic.2009.06.006},
  JOURNAL = {Information and Computation},
  NUMBER = {6},
  PAGES = {694-715},
  TITLE = {Making Random Choices Invisible to the Scheduler},
  URL = {http://hal.inria.fr/inria-00424860/en},
  VOLUME = {208},
  X-EDITORIAL-BOARD = {yes},
  X-ID-HAL = {inria-00424860},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1016/j.ic.2009.06.006}
}

@INPROCEEDINGS{chiarugi:2010:hal-00548213:1,
  ADDRESS = {Niagara Falls, New York, USA},
  AUTHOR = {Chiarugi, Davide and Falaschi, Moreno and Olarte, Carlos and Palamidessi, Catuscia},
  BOOKTITLE = {First ACM International Conference on Bioinformatics and Computational Biology (BCB 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1145/1854776.1854843},
  PAGES = {414-417},
  PUBLISHER = {ACM Digital Libraries},
  TITLE = {Compositional modelling of signalling pathways in timed concurrent constraint programming},
  URL = {http://hal.inria.fr/hal-00548213/en},
  X-ID-HAL = {hal-00548213},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {IT,CO},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1145/1854776.1854843}
}

@INPROCEEDINGS{andres:2010:hal-00445445:2,
  ADDRESS = {Cyprus},
  AUTHOR = {Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter and Smith, Geoffrey},
  BOOKTITLE = {16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-12002-2{\_}32},
  EDITOR = {Javier Esparza and Rupak Majumdar},
  PAGES = {373-389},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Computing the Leakage of Information-Hiding Systems},
  URL = {http://hal.inria.fr/hal-00445445/en},
  VOLUME = {6015},
  X-ID-HAL = {hal-00445445},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {NL,US},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-12002-2%7B%5C_%7D32}
}

@INPROCEEDINGS{andres:2010:hal-00548187:1,
  ADDRESS = {Williamsburg, VA, USA},
  AUTHOR = {Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter and Sokolova, Ana},
  BOOKTITLE = {7th IEEE International Conference on Quantitative Evaluation of SysTems (QEST 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1109/QEST.2010.11},
  PAGES = {17-26},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Information Hiding in Probabilistic Concurrent Systems},
  URL = {http://hal.inria.fr/hal-00548187/en},
  X-ID-HAL = {hal-00548187},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {NL,AT},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1109/QEST.2010.11}
}

@INPROCEEDINGS{alvim:2010:inria-00479672:2,
  ADDRESS = {Paris, France},
  AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia},
  BOOKTITLE = {21th International Conference on Concurrency Theory (CONCUR 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-15375-4{\_}8},
  EDITOR = {Paul Gastin and Fran{\c{c}}ois Laroussinie},
  PAGES = {102-116},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Information Flow in Interactive Systems},
  URL = {http://hal.inria.fr/inria-00479672/en},
  VOLUME = {6269},
  X-ID-HAL = {inria-00479672},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-15375-4%7B%5C_%7D8}
}

@INPROCEEDINGS{alvim:2010:inria-00479674:2,
  ADDRESS = {Brisbane, Australia},
  AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter},
  BOOKTITLE = {6th IFIP International Conference on Theoretical Computer Science (TCS 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-15240-5{\_}5},
  EDITOR = {Cristian S. Calude and Vladimiro Sassone},
  PAGES = {55-70},
  PUBLISHER = {Springer},
  SERIES = {IFIP Advances in Information and Communication Technology},
  TITLE = {Safe Equivalences for Security Properties},
  URL = {http://hal.inria.fr/inria-00479674/en},
  VOLUME = {323},
  X-ID-HAL = {inria-00479674},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-15240-5%7B%5C_%7D5}
}

@INPROCEEDINGS{hamadou:2010:inria-00548007:1,
  ADDRESS = {Berleley/Oakland, California, USA},
  AUTHOR = {Hamadou, Sardaouna and Sassone, Vladimiro and Palamidessi, Catuscia},
  BOOKTITLE = {31st IEEE Symposium on Security and Privacy},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1109/SP.2010.13},
  PAGES = {79-92},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Reconciling Belief and Vulnerability in Information Flow},
  URL = {http://hal.inria.fr/inria-00548007/en},
  X-ID-HAL = {inria-00548007},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {GB},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1109/SP.2010.13}
}

@INPROCEEDINGS{alvim:2010:hal-00548200:1,
  ADDRESS = {Edinburgh, United Kingdom},
  AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia},
  BOOKTITLE = {25th Annual IEEE Symposium on Logic in Computer Science (LICS 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1109/LICS.2010.53},
  PAGES = {314-321},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Probabilistic Information Flow},
  URL = {http://hal.inria.fr/hal-00548200/en},
  X-ID-HAL = {hal-00548200},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-INVITED-CONFERENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1109/LICS.2010.53}
}

@TECHREPORT{alvim:2010:hal-00548214:1,
  AUTHOR = {Alvim, M{\'a}rio S. and Chatzikokolakis, Konstantinos and Degano, Pierpaolo and Palamidessi, Catuscia},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  INSTITUTION = {INRIA},
  TITLE = {Differential Privacy versus Quantitative Information Flow},
  URL = {http://hal.inria.fr/hal-00548214/en},
  X-ID-HAL = {hal-00548214},
  X-PAYS = {NL,IT},
  YEAR = {2010}
}

@INCOLLECTION{gabbrielli:2010:hal-00545256:1,
  AUTHOR = {Gabbrielli, Maurizio and Palamidessi, Catuscia and Valencia, Frank D.},
  BOOKTITLE = {A 25-Year Perspective on Logic Programming},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-14309-0{\_}11},
  EDITOR = {Agostino Dovier and Enrico Pontelli},
  MONTH = JUN,
  PAGES = {231-253},
  PUBLISHER = {Springer},
  TITLE = {Concurrent and Reactive Constraint Programming},
  URL = {http://hal.inria.fr/hal-00545256/en},
  X-ID-HAL = {hal-00545256},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {IT},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-14309-0%7B%5C_%7D11}
}

@ARTICLE{Kramer:09:JANCL,
  AUTHOR = {Simon Kramer and Catuscia Palamidessi and Roberto Segala and Andrea Turrini and Christelle Braun},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  DOI = {10.3166/jancl.19.489516},
  JOURNAL = {The Journal of Applied Non-Classical Logics},
  NUMBER = {4},
  PAGES = {489-516},
  TITLE = {A Quantitative Doxastic Logic for Probabilistic Processes and Applications to Information-Hiding},
  URL = {http://hal.archives-ouvertes.fr/inria-00445212/en/},
  VOLUME = {19},
  X-EDITORIAL-BOARD = {yes},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {IT},
  YEAR = {2009},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00445212/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.3166/jancl.19.489516}
}

@INPROCEEDINGS{Bhowmick:08:TGC,
  AUTHOR = {Abhishek Bhowmick and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the Fourth Symposium on Trustworthy Global Computing (TGC 2008)},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  EDITOR = {Christos Kaklamanis and Flemming Nielson},
  PAGES = {36--51},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Bounds on the leakage of the input's distribution in information-hiding protocols},
  URL = {http://hal.archives-ouvertes.fr/hal-00444579/en/},
  VOLUME = {5474},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {IN},
  X-PROCEEDINGS = {yes},
  YEAR = {2009},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00444579/en/}
}

@ARTICLE{Norman:08:TSE,
  AUTHOR = {Gethin Norman and Catuscia Palamidessi and David Parker and Peng Wu},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  JOURNAL = {IEEE Transactions of Software Engineering},
  NUMBER = {2},
  PAGES = {209--223},
  RATING = {1},
  TITLE = {Model checking probabilistic and stochastic extensions of the $\pi$-calculus},
  URL = {http://hal.archives-ouvertes.fr/inria-00424856/en/},
  VOLUME = {35},
  X-EDITORIAL-BOARD = {yes},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2009},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00424856/en/}
}

@ARTICLE{Cacciagrano:08:LMCS,
  AUTHOR = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  JOURNAL = {Logical Methods in Computer Science},
  NUMBER = {2 - 15},
  TITLE = {Explicit Fairness in Testing Semantics},
  URL = {http://hal.archives-ouvertes.fr/hal-00444580/en/},
  VOLUME = {5},
  X-EDITORIAL-BOARD = {yes},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {IT},
  YEAR = {2009},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00444580/en/}
}

@ARTICLE{Beauxis:09:TCS,
  AUTHOR = {Romain Beauxis and Catuscia Palamidessi},
  BIBDATE = {2009-09-03},
  BIBSOURCE = {DBLP, http://dblp.uni-trier.de/db/journals/tcs/tcs410.html#BeauxisP09},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  DOI = {http://dx.doi.org/10.1016/j.tcs.2009.06.008},
  JOURNAL = {Theoretical Computer Science},
  NUMBER = {41},
  PAGES = {4006--4025},
  TITLE = {Probabilistic and nondeterministic aspects of anonymity},
  URL = {http://hal.archives-ouvertes.fr/inria-00424855/en/},
  VOLUME = {410},
  X-EDITORIAL-BOARD = {yes},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2009},
  BDSK-URL-1 = {http://dx.doi.org/10.1016/j.tcs.2009.06.008},
  BDSK-URL-2 = {http://hal.archives-ouvertes.fr/inria-00424855/en/}
}

@INPROCEEDINGS{Braun:09:MFPS,
  AUTHOR = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the 25th Conf. on Mathematical Foundations of Programming Semantics},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  PAGES = {75-91},
  PUBLISHER = {Elsevier B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Quantitative Notions of Leakage for One-try Attacks},
  URL = {http://hal.archives-ouvertes.fr/inria-00424852/en/},
  VOLUME = {249},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2009},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00424852/en/}
}

@INPROCEEDINGS{Falaschi:09:PPDP,
  AUTHOR = {Moreno Falaschi and Carlos Olarte and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the 11th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, PPDP'09},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  DOI = {10.1145/1599410.1599436},
  EDITOR = {Ant{\'o}nio Porto and Francisco Javier L{\'o}pez-Fraguas},
  LIXCATEGORIE = {CIA},
  LIXEQUIPE = {comete},
  PAGES = {207-218},
  PUBLISHER = {ACM},
  TITLE = {A framework for abstract interpretation of timed concurrent constraint programs},
  URL = {http://hal.inria.fr/inria-00426608/en/},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {IT},
  X-PROCEEDINGS = {yes},
  YEAR = {2009},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00426608/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1145/1599410.1599436}
}

@INPROCEEDINGS{Braun:08:FOSSACS,
  AUTHOR = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of FOSSACS},
  DATE-ADDED = {2008-12-30 06:11:27 +0100},
  DATE-MODIFIED = {2008-12-30 06:11:27 +0100},
  DOI = {10.1007/978-3-540-78499-9_31},
  EDITOR = {Roberto Amadio},
  PAGES = {443-457},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Compositional Methods for Information-Hiding},
  URL = {http://hal.inria.fr/inria-00349227/en/},
  VOLUME = {4962},
  YEAR = {2008},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00349227/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-540-78499-9_31},
  BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf}
}

@INPROCEEDINGS{Beauxis:08:BOOK,
  AUTHOR = {Romain Beauxis and Catuscia Palamidessi and Frank D. Valencia},
  BOOKTITLE = {Concurrency, Graphs and Models},
  DATE-ADDED = {2008-12-30 06:11:03 +0100},
  DATE-MODIFIED = {2008-12-30 06:11:03 +0100},
  DOI = {10.1007/978-3-540-68679-8_29},
  EDITOR = {Pierpaolo Degano and Rocco {De Nicola} and Jos\'e Meseguer},
  PAGES = {473-492},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf},
  PUBLISHER = {Springer},
  READ = {Yes},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {On the Asynchronous Nature of the Asynchronous pi-Calculus},
  URL = {http://hal.inria.fr/inria-00349226/en/},
  VOLUME = {5065},
  YEAR = {2008},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00349226/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-540-68679-8_29},
  BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf}
}

@INPROCEEDINGS{Beauxis:08:TGC,
  AUTHOR = {Romain Beauxis and Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
  BOOKTITLE = {Proceedings of the Third Symposium on Trustworthy Global Computing (TGC 2007)},
  DATE-ADDED = {2008-12-30 06:10:45 +0100},
  DATE-MODIFIED = {2008-12-30 06:10:45 +0100},
  DOI = {10.1007/978-3-540-78663-4_23},
  EDITOR = {Gilles Barthe and C{\'e}dric Fournet},
  PAGES = {347-362},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Channels-TGC07/tgc.pdf},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Formal Approaches to Information-Hiding (Tutorial)},
  URL = {http://hal.inria.fr/inria-00261827/en/},
  VOLUME = {4912},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-78663-4_23},
  BDSK-URL-2 = {http://hal.inria.fr/inria-00261827/en/}
}

@ARTICLE{Chatzikokolakis:08:JCS,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
  DATE-ADDED = {2008-12-30 06:07:59 +0100},
  DATE-MODIFIED = {2008-12-30 06:07:59 +0100},
  DOI = {10.3233/JCS-2008-0333},
  JOURNAL = {Journal of Computer Security},
  NUMBER = {5},
  PAGES = {531--571},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf},
  TITLE = {On the Bayes risk in information-hiding protocols},
  URL = {http://hal.inria.fr/inria-00349224/en/},
  VOLUME = {16},
  YEAR = {2008},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00349224/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.3233/JCS-2008-0333},
  BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf}
}

@TECHREPORT{Troina:08:TechRep,
  AUTHOR = {Angelo Troina and Jean Goubault-Larrecq and Catuscia Palamidessi},
  DATE-ADDED = {2008-12-25 01:55:14 +0100},
  DATE-MODIFIED = {2008-12-25 01:58:13 +0100},
  INSTITUTION = {{LIX}, {E}cole {P}olytechnique},
  TITLE = {A Probabilistic Applied Pi-Calculus},
  YEAR = {2008}
}

@ARTICLE{Palamidessi:00:IandC,
  AUTHOR = {Catuscia Palamidessi and Joachim Parrow and Rob J. van Glabbeek},
  DATE-ADDED = {2008-12-24 10:16:23 +0100},
  DATE-MODIFIED = {2008-12-24 10:18:05 +0100},
  JOURNAL = {Information and Computation},
  NUMBER = {1-2},
  PAGES = {1},
  TITLE = {Preface},
  VOLUME = {156},
  YEAR = {2000}
}

@INPROCEEDINGS{Aranda:06:FMCO,
  AUTHOR = {Jesus Aranda and Cinzia Di Giusto and Catuscia Palamidessi and Frank Valencia},
  BOOKTITLE = {Postproceedings of the 5th International Symposium on Formal Methods for Components and Objects (FMCO'06)},
  DATE-MODIFIED = {2008-02-06 03:14:14 +0100},
  EDITOR = {Frank S. {de Boer} and Marcello M. Bonsangue},
  NOTE = {\url{http://www.lix.polytechnique.fr/~fvalenci/papers/fmco07.pdf}},
  PAGES = {185-206},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Expressiveness of Recursion, Replication and Scope Mechanisms in Process Calculi},
  VOLUME = {4709},
  YEAR = {2007}
}

@ARTICLE{Chatzikokolakis:08:IC,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
  DATE-MODIFIED = {2010-01-04 10:41:19 +0100},
  DOI = {10.1016/j.ic.2007.07.003},
  JOURNAL = {Inf. and Comp.},
  NUMBER = {2--4},
  PAGES = {378--401},
  TITLE = {Anonymity Protocols as Noisy Channels},
  URL = {http://hal.inria.fr/inria-00349225/en/},
  VOLUME = {206},
  YEAR = {2008},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00349225/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1016/j.ic.2007.07.003}
}

@INPROCEEDINGS{Goubault-Larrecq:07:APLAS,
  AUTHOR = {Jean Goubault-Larrecq and Catuscia Palamidessi and Angelo Troina},
  BOOKTITLE = {Proceedings of the 5th Asian Symposium on Programming Languages and Systems (APLAS'07)},
  DATE-MODIFIED = {2007-12-16 15:51:49 +0100},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Angelo/aplas.pdf}},
  PAGES = {175-190},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {A Probabilistic Applied Pi-Calculus},
  VOLUME = {4807},
  YEAR = 2007
}

@ARTICLE{Vigliotti:07:TCS,
  AUTHOR = {Maria Grazia Vigliotti and Iain Phillips and Catuscia Palamidessi},
  DATE-MODIFIED = {2008-12-28 16:41:03 +0100},
  JOURNAL = {Theoretical Computer Science},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/2007/MariaGrazia/tcs.pdf}},
  NUMBER = {1-3},
  PAGES = {267-289},
  TITLE = {Tutorial on separation results in process calculi via leader election problems},
  URL = {http://hal.inria.fr/inria-00201071/en/},
  VOLUME = {388},
  YEAR = 2007,
  BDSK-URL-1 = {http://hal.inria.fr/inria-00201071/en/}
}

@INPROCEEDINGS{Norman:07:QEST,
  AUTHOR = {Gethin Norman and Catuscia Palamidessi and David Parker and Peng Wu},
  BOOKTITLE = {4th International Conference on the Quantitative Evaluation of SysTems (QEST)},
  DATE-MODIFIED = {2009-01-02 03:27:24 +0100},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Wu/qest1.pdf}. Full version in \url{http://www.lix.polytechnique.fr/~catuscia/papers/2009/TSE.pdf}},
  PAGES = {169-178},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Model checking the probabilistic pi-calculus},
  YEAR = 2007
}

@INPROCEEDINGS{Wu:07:QEST,
  AUTHOR = {Peng Wu and Catuscia Palamidessi and Huimin Lin},
  BOOKTITLE = {Proceedings of 4th International Conference on the Quantitative Evaluation of SysTems (QEST)},
  DATE-MODIFIED = {2007-12-23 00:54:37 +0100},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Wu/qest2.pdf}},
  PAGES = {179-188},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Symbolic Bisimulation for Probabilistic Systems},
  YEAR = 2007
}

@INPROCEEDINGS{Olarte:07:ICLP,
  AUTHOR = {Carlos Olarte and Catuscia Palamidessi and Frank D. Valencia},
  BOOKTITLE = {Proceedings of the 23rd International Conference in Logic Programming (ICLP'07)},
  EDITOR = {Ver{\'o}nica Dahl and Ilkka Niemel{\"a}},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Carlos/iclp07DC.pdf}},
  PAGES = {464--465},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Universal Timed Concurrent Constraint Programming},
  VOLUME = {4670},
  YEAR = 2007
}

@INPROCEEDINGS{Falaschi:07:ICLP,
  AUTHOR = {Moreno Falaschi and Carlos Olarte and Catuscia Palamidessi and Frank D. Valencia},
  BOOKTITLE = {Proceedings of The 23rd International Conference in Logic Programming (ICLP'07)},
  EDITOR = {Ver{\'o}nica Dahl and Ilkka Niemel{\"a}},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Carlos/iclp07.pdf}},
  PAGES = {271--285},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Declarative Diagnosis of Temporal Concurrent Constraint Programs},
  VOLUME = {4670},
  YEAR = 2007
}

@INPROCEEDINGS{Chatzikokolakis:07:CONCUR,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of CONCUR'07},
  EDITOR = {Lu{\'\i}s Caires and Vasco Thudichum Vasconcelos},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Scheduler/report.pdf}},
  PAGES = {42--58},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Making Random Choices Invisible to the Scheduler},
  VOLUME = {4703},
  YEAR = 2007
}

@INPROCEEDINGS{Chatzikokolakis:07:CSF,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
  BOOKTITLE = {Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20)},
  DATE-MODIFIED = {2008-12-30 05:07:47 +0100},
  PAGES = {341-354},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Probability of Error in Information-Hiding Protocols},
  YEAR = 2007,
  BDSK-URL-1 = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full_original.pdf}
}

@INPROCEEDINGS{Cacciagrano:06:EXPRESS,
  AUTHOR = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the 13th International Workshop on Expressiveness in Concurrency (EXPRESS'06)},
  EDITORS = {Iain Phillips and Roberto Amadio},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Diletta/FairPi/express06.pdf}},
  PAGES = {3--26},
  PUBLISHER = {Elsevier Science B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Fair $\Pi$},
  VOLUME = {175 (3)},
  YEAR = {2007}
}

@INPROCEEDINGS{Chatzikokolakis:06:TGC,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
  BOOKTITLE = {Proceedings of the 2nd Symposium on Trustworthy Global Computing (TGC)},
  DATE-MODIFIED = {2007-12-23 19:18:49 +0100},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Channels/tgc.pdf}},
  PAGES = {281-300},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Anonymity Protocols as Noisy Channels},
  VOLUME = {4661},
  YEAR = {2006}
}

@ARTICLE{Deng:07:TCS,
  AUTHOR = {Yuxin Deng and Catuscia Palamidessi},
  DATE-MODIFIED = {2008-12-28 16:55:03 +0100},
  JOURNAL = {Theoretical Computer Science},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_Axiom/tcs.pdf}},
  NUMBER = {1-2},
  PAGES = {92--114},
  TITLE = {Axiomatizations for probabilistic finite-state behaviors},
  URL = {http://hal.inria.fr/inria-00200928/en/},
  VOLUME = {373},
  YEAR = {2007},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00200928/en/}
}

@ARTICLE{Palamidessi:06:EATCS,
  AUTHOR = {C. Palamidessi and F. Valencia},
  JOURNAL = {Bulletin of the European Association for Theoretical Computer Science},
  MONTH = OCT,
  NOTE = {Column: Programming Languages. \url{http://www.lix.polytechnique.fr/~catuscia/papers/Frank/EATCS_06/paper.pdf}},
  PAGES = {155--171},
  TITLE = {Languages for Concurrency},
  VOLUME = {90},
  YEAR = {2006}
}

@INPROCEEDINGS{Lopez:06:ICLP,
  AUTHOR = {Hugo A. L{\'o}pez and Catuscia Palamidessi and Jorge and Camilo Rueda and Frank D. Valencia},
  BOOKTITLE = {Proceedings of the 22nd International Conference on logic Programming, (ICLP)},
  DATE-MODIFIED = {2007-12-26 04:06:43 +0100},
  EDITOR = {Sandro Etalle and Miroslaw Truszczynski},
  PAGES = {449--450},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {A Declarative Framework for Security: Secure Concurrent Constraint Programming},
  VOLUME = {4079},
  YEAR = {2006}
}

@INPROCEEDINGS{Palamidessi:06:LICS,
  AUTHOR = {Catuscia Palamidessi and Vijay A. Saraswat and Frank D. Valencia and Bj{\"o}rn Victor},
  BOOKTITLE = {Proceedings of the Twenty First Annual IEEE Symposium on Logic in Computer Science (LICS)},
  DATE-MODIFIED = {2008-12-28 17:04:57 +0100},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Frank/LICS_06/main.pdf}},
  PAGES = {59--68},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {On the Expressiveness of Linearity vs Persistence in the Asynchronous pi-calculus},
  URL = {http://hal.inria.fr/inria-00201096/en/},
  YEAR = 2006,
  BDSK-URL-1 = {http://hal.inria.fr/inria-00201096/en/}
}

@ARTICLE{Cacciagrano:06:TCS,
  AUTHOR = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi},
  DATE-MODIFIED = {2008-12-28 17:35:48 +0100},
  JOURNAL = {Theoretical Computer Science},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Diletta/Must/report.pdf}},
  NUMBER = {3},
  PAGES = {218-235},
  TITLE = {Separation of synchronous and asynchronous communication via testing},
  URL = {http://hal.inria.fr/inria-00200916/en/},
  VOLUME = {386},
  YEAR = {2007},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00200916/en/}
}

@ARTICLE{Chatzikokolakis:06:TCS,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
  DATE-MODIFIED = {2008-12-28 16:57:29 +0100},
  JOURNAL = {Theoretical Computer Science},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/tcsPI.pdf}},
  NUMBER = {1-2},
  PAGES = {123--138},
  TITLE = {Probable Innocence Revisited},
  URL = {http://hal.inria.fr/inria-00201072/en/},
  VOLUME = 367,
  YEAR = {2006},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00201072/en/}
}

@INPROCEEDINGS{Palamidessi:05:FMCO,
  AUTHOR = {Catuscia Palamidessi and Iain Phillips and Maria Grazia Vigliotti},
  BOOKTITLE = {Postproceedings of the 4th International Symposium on Formal Methods for Components and Objects (FMCO)},
  EDITOR = {Frank S. de Boer and Marcello M. Bonsangue and Susanne Graf and Willem P. de Roever},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/2006/MariaGrazia/FMCO/fmco-06.pdf}},
  PAGES = {172--194},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Expressiveness via Leader Election Problems},
  VOLUME = {4111},
  YEAR = {2005}
}

@INPROCEEDINGS{Pradalier:06:QAPL,
  AUTHOR = {Sylvain Pradalier and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the 4th International Workshop on Quantitative Aspects of Programming Languages (QAPL)},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Sylvain/QAPL06/FinalBis.pdf}},
  PAGES = {119--136},
  PUBLISHER = {Elsevier Science B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Expressiveness of probabilistic $\pi$-calculi},
  VOLUME = {164 (3)},
  YEAR = 2006
}

@INPROCEEDINGS{palamidessi_et_al:DSP:2006:299,
  AUTHOR = {Catuscia Palamidessi and Mohit Bhargava},
  BOOKTITLE = {Foundations of Global Computing},
  EDITOR = {Jos{\'e} Luiz Fiadeiro and Ugo Montanari and Martin Wirsing},
  NOTE = {\url{drops.dagstuhl.de/opus/volltexte/2006/299}},
  NUMBER = {05081},
  PUBLISHER = {Internationales Begegnungs- und Forschungszentrum (IBFI), Schloss Dagstuhl, Germany},
  SERIES = {Dagstuhl Seminar Proceedings},
  TITLE = {Probabilistic Anonymity},
  YEAR = {2006}
}

@INPROCEEDINGS{Deng:05:FOSSACS,
  AUTHOR = {Yuxin Deng and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of FOSSACS'05},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_Axiom/fossacs05.pdf}},
  PAGES = {110--124},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Axiomatizations for probabilistic finite-state behaviors},
  VOLUME = 3441,
  YEAR = {2005}
}

@ARTICLE{Palamidessi:05:TCS,
  AUTHOR = {Catuscia Palamidessi and Oltea M. Herescu},
  DATE-MODIFIED = {2008-12-28 17:01:48 +0100},
  JOURNAL = {Theoretical Computer Science},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/prob_enc/report.pdf}},
  NUMBER = {2-3},
  PAGES = {373-404},
  TITLE = {A randomized encoding of the $\pi$-calculus with mixed choice},
  URL = {http://hal.inria.fr/inria-00201105/en/},
  VOLUME = 335,
  YEAR = {2005},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00201105/en/}
}

@ARTICLE{Chatzikokolakis:05:TCS,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
  DATE-MODIFIED = {2007-12-16 16:11:42 +0100},
  JOURNAL = {Theoretical Computer Science},
  NOTE = {A short version of this paper appeared in the {\em Proceedings of the Symposium on Trustworthy Global Computing (TGC)}, volume 3705 of LNCS, pages 146-162. Springer. \url{http://www.lix.polytechnique.fr/~catuscia/papers/PartialSecrets/TCSreport.pdf}},
  NUMBER = {3},
  PAGES = {512-527},
  TITLE = {A Framework for Analyzing Probabilistic Protocols and its Application to the Partial Secrets Exchange},
  VOLUME = {389},
  YEAR = 2007
}

@INPROCEEDINGS{Chatzikokolakis:05:TGC,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the Symp. on Trustworthy Global Computing},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/PartialSecrets/tgc05.pdf}},
  PAGES = {146-162},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {A Framework for Analyzing Probabilistic Protocols and its Application to the Partial Secrets Exchange},
  VOLUME = 3705,
  YEAR = {2005}
}

@INPROCEEDINGS{Deng:05:QAPL,
  AUTHOR = {Yuxin Deng and Tom Chothia and Catuscia Palamidessi and Jun Pang},
  BOOKTITLE = {Proceedings of the Third Workshop on Quantitative Aspects of Programming Languages (QAPL 2005)},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Metrics/QAPL/gts.pdf}},
  NUMBER = {2},
  PAGES = {79--96},
  PUBLISHER = {Elsevier Science Publishers},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Metrics for Action-labelled Quantitative Transition Systems},
  VOLUME = {153},
  YEAR = {2006}
}

@INPROCEEDINGS{Chatzikokolakis:05:FAST,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
  BOOKTITLE = {Third International Workshop on Formal Aspects in Security and Trust (FAST 2005), Revised Selected Papers},
  EDITOR = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider},
  PAGES = {142-157},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/reportPI.pdf},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Probable Innocence Revisited},
  VOLUME = {3866},
  YEAR = {2006}
}

@INPROCEEDINGS{Deng:05:SECCO,
  AUTHOR = {Yuxin Deng and Catuscia Palamidessi and Jun Pang},
  BOOKTITLE = {Proceedings of the 3rd International Workshop on Security Issues in Concurrency (SecCo)},
  DATE-MODIFIED = {2007-12-22 09:09:14 +0100},
  EDITOR = {Michael Backes and Andre Scedrov},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/report_wa.pdf}},
  PAGES = {55--76},
  PUBLISHER = {Elsevier Science B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Weak Probabilistic Anonymity},
  VOLUME = {180 (1)},
  YEAR = {2007}
}

@INPROCEEDINGS{Bhargava:05:CONCUR,
  AUTHOR = {Mohit Bhargava and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of CONCUR},
  EDITOR = {Mart\'{\i}n Abadi and Luca de Alfaro},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/concur.pdf}},
  PAGES = {171--185},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Probabilistic Anonymity},
  VOLUME = 3653,
  YEAR = 2005
}

@INPROCEEDINGS{Cacciagrano:05:EXPRESS,
  ADDRESS = {San Francisco, USA},
  AUTHOR = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the 12th International Workshop on Expressiveness in Concurrency (EXPRESS 2005)},
  EDITORS = {Jos Baeten and Iain Phillips},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Diletta/Must/report.pdf}},
  NUMBER = {3},
  PAGES = {95--108},
  PUBLISHER = {Elsevier Science B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Separation of synchronous and asynchronous communication via testing},
  VOLUME = {154},
  YEAR = {2006}
}

@INPROCEEDINGS{Palamidessi:05:MFPS,
  ADDRESS = {Birmingham, UK},
  AUTHOR = {Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the 21st Conference on the Mathematical Foundations of Programming Semantics (MFPS XXI)},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/MFPS/paper.pdf}},
  PAGES = {33--42},
  PUBLISHER = {Elsevier Science B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Probabilistic and nondeterministic aspects of Anonymity},
  VOLUME = {155},
  YEAR = {2006}
}

@INPROCEEDINGS{Palamidessi:05:BERTINORO,
  ADDRESS = {Bertinoro, Italy},
  AUTHOR = {Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the Workshop on ``Essays on Algebraic Process Calculi'' (APC 25)},
  EDITORS = {Luca Aceto and Andrew D. Gordon},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Bertinoro/paper.pdf}},
  PAGES = {277-279},
  PUBLISHER = {Elsevier Science B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {Anonymity in probabilistic and nondeterministic systems},
  VOLUME = {162},
  YEAR = {2006}
}

@INPROCEEDINGS{Ziegler:05:SOS,
  ADDRESS = {Lisbon, Portugal},
  AUTHOR = {Axelle Ziegler and Dale Miller and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the 2nd Workshop on Structural Operational Semantics (SOS'05)},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Axelle/SOS_05/report.pdf}},
  NUMBER = {1},
  PAGES = {169--189},
  PUBLISHER = {Elsevier Science B.V.},
  SERIES = {Electronic Notes in Theoretical Computer Science},
  TITLE = {A Congruence Format for Name-passing Calculi},
  VOLUME = {156},
  YEAR = {2006}
}

@INCOLLECTION{Deng:05:BookJW,
  AUTHOR = {Yuxin Deng and Catuscia Palamidessi and Jun Pang},
  BOOKTITLE = {Processes, Terms and Cycles: Steps on the Road to Infinity},
  DATE-MODIFIED = {2009-01-02 02:46:39 +0100},
  EDITOR = {Aart Middeldorp and Vincent van Oostrom and Femke van Raamsdonk and Roel C. de Vrijer},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Yuxin/BookJW/par.pdf}},
  PAGES = {309-337},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Compositional Reasoning for Probabilistic Finite-State Behaviors},
  VOLUME = {3838},
  YEAR = {2005}
}

@ARTICLE{Palamidessi:05:EATCS,
  AUTHOR = {Catuscia Palamidessi and Frank D. Valencia},
  BIBDATE = {2005-11-14},
  DATE-MODIFIED = {2010-01-09 05:21:19 +0100},
  JOURNAL = {Bulletin of the EATCS},
  NOTE = {Column: Concurrency. \url{http://www.lix.polytechnique.fr/~catuscia/papers/Frank/EATCS_05/recrep.pdf}},
  PAGES = {105--125},
  TITLE = {Recursion vs Replication in Process Calculi: Expressiveness},
  VOLUME = {87},
  YEAR = {2005}
}

@INPROCEEDINGS{Palamidessi:01:CP,
  AUTHOR = {Catuscia Palamidessi and Frank D. Valencia},
  BOOKTITLE = {Proc. of the 7th International Conference on Principles and Practice of Constraint Programming},
  DATE-MODIFIED = {2010-01-09 05:21:39 +0100},
  EDITOR = {Toby Walsh},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Ntcc/final.ps}},
  PAGES = {302--316},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {A Temporal Concurrent Constraint Programming Calculus},
  VOLUME = {2239},
  YEAR = {2001}
}

@INPROCEEDINGS{Herescu:00:FOSSACS,
  AUTHOR = {Oltea Mihaela Herescu and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of FOSSACS 2000 (Part of ETAPS 2000)},
  EDITOR = {Jerzy Tiuryn},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_asy_pi/fossacs.ps}},
  PAGES = {146--160},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Probabilistic Asynchronous $\pi$-Calculus},
  VOLUME = {1784},
  YEAR = {2000}
}

@INPROCEEDINGS{Herescu:01:PODC,
  AUTHOR = {Oltea Mihaela Herescu and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the 20th {ACM} Symposium on Principles of Distributed Computing},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Gen_Phil/podc.ps}},
  PAGES = {81--89},
  TITLE = {On the Generalized Dining Philosophers Problem},
  YEAR = {2001}
}

@INPROCEEDINGS{Gilbert:00:CL,
  AUTHOR = {David Gilbert and Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the Conference on Computational Logic - CL 2000},
  EDITOR = {John Lloyd et al.},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/CC_Migration/cl.ps}},
  PAGES = {463--477},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Artificial Intelligence},
  TITLE = {Concurrent Constraint Programming with Process Mobility},
  YEAR = {2000}
}

@INPROCEEDINGS{Palamidessi:02:TCS,
  AUTHOR = {Catuscia Palamidessi and Oltea M. Herescu},
  BOOKTITLE = {Proceedings of the {\it 2nd IFIP International Conference on Theoretical Computer Science}},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/prob_enc/ifiptcs02.ps}},
  PAGES = {537--549},
  TITLE = {A randomized encoding of the $\pi$-calculus with mixed choice},
  YEAR = {2002}
}

@INPROCEEDINGS{Nielsen:02:PPDP,
  ADDRESS = {New York},
  AUTHOR = {Mogens Nielsen and Catuscia Palamidessi and Frank D. Valencia},
  BOOKTITLE = {Proceedings of the Fourth {ACM} {SIGPLAN} Conference on Principles and Practice of Declarative Programming},
  MONTH = OCT # {6--8},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/ppdp02.ps}},
  PAGES = {156--167},
  PUBLISHER = {ACM Press},
  TITLE = {On the expressive power of temporal concurrent constraint programming languages},
  YEAR = {2002}
}

@INPROCEEDINGS{Palamidessi:02:PPDP,
  ADDRESS = {New York},
  AUTHOR = {Catuscia Palamidessi},
  BOOKTITLE = {Proceedings of the Fourth {ACM} {SIGPLAN} Conference on Principles and Practice of Declarative Programming ({PPDP}-02)},
  NOTE = {Invited talk},
  PAGES = {74--75},
  PUBLISHER = {ACM Press},
  TITLE = {Mobile calculi for distributed programming},
  YEAR = {2002}
}

@ARTICLE{Nielsen:02:NJC,
  AUTHOR = {M. Nielsen and C. Palamidessi and F. Valencia},
  JOURNAL = {Nordic Journal of Computing},
  NOTE = {\url {http://www.lix.polytechnique.fr/~catuscia/papers/Ntcc/njc02.ps}},
  PAGES = {145--188},
  TITLE = {Temporal Concurrent Constraint Programming: Denotation, Logic and Applications},
  VOLUME = {9},
  YEAR = {2002}
}

@ARTICLE{Palamidessi:03:MSCS,
  AUTHOR = {Catuscia Palamidessi},
  DATE-MODIFIED = {2008-12-28 17:00:52 +0100},
  JOURNAL = {Mathematical Structures in Computer Science},
  NOTE = {Available at \url{http://www.lix.polytechnique.fr/~catuscia/papers/pi_calc/mscs.pdf}. A short version of this paper appeared in POPL'97.},
  NUMBER = {5},
  PAGES = {685--719},
  TITLE = {Comparing the Expressive Power of the Synchronous and the Asynchronous pi-calculus},
  URL = {http://hal.inria.fr/inria-00201104/en/},
  VOLUME = {13},
  YEAR = {2003},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00201104/en/}
}

@ARTICLE{Mcdowell:03:TCS,
  AUTHOR = {Raymond McDowell and Dale Miller and Catuscia Palamidessi},
  JOURNAL = {Theoretical Computer Science},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Tran_Sys_in_SC/tcs.ps}},
  NUMBER = 3,
  PAGES = {411-437},
  TITLE = {Encoding transition systems in sequent calculus},
  VOLUME = 294,
  YEAR = 2003
}

@TECHREPORT{Herescu:04:TR,
  AUTHOR = {Oltea M. Herescu and Catuscia Palamidessi},
  INSTITUTION = {INRIA Futurs and LIX},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_asy_pi/report.ps}},
  TITLE = {Probabilistic Asynchronous $\pi$-calculus},
  YEAR = {2004}
}

@TECHREPORT{Bhargava:05:TR,
  AUTHOR = {Mohit Bhargava and Catuscia Palamidessi},
  INSTITUTION = {INRIA Futurs and LIX},
  NOTE = {To appear in the proceedings of CONCUR 2005. Report version available at \url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/report.ps}},
  TITLE = {Probabilistic Anonymity},
  YEAR = {2005}
}

@TECHREPORT{Chatzikokolakis:05:TR,
  AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
  INSTITUTION = {INRIA Futurs and LIX},
  NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/reportPI.pdf}},
  TITLE = {Probable Innocence Revisited},
  YEAR = {2005}
}


This file has been generated by bibtex2html 1.74