@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'year>=1998 & year <= 2013' -c 'author: "palamidessi"' papers.bib}}
@UNPUBLISHED{elsalamouny:hal-00760735,
AUTHOR = {Elsalamouny, Ehab and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
NOTE = {This paper is to appear in the proceedings of POST 2013 (Principles of Security and Trust).},
TITLE = {{A differentially private mechanism of optimal utility for a region of priors}},
YEAR = 2013,
URL = {http://hal.inria.fr/hal-00760735},
X-ID-HAL = {hal-00760735}
}
@ARTICLE{chatzikokolakis:hal-00760596,
AUTHOR = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia and Braun, Christelle},
JOURNAL = {{Mathematical Structures in Computer Science}},
NOTE = {To appear},
PUBLISHER = {Cambridge University Press},
TITLE = {{Compositional Methods for Information-Hiding}},
URL = {http://hal.inria.fr/hal-00760596},
X-EDITORIAL-BOARD = {yes},
X-ID-HAL = {hal-00760596},
X-INTERNATIONAL-AUDIENCE = {yes},
YEAR = {2013}
}
@TECHREPORT{andres:hal-00766821,
AUTHOR = {Andres, E., Miguel and Bordenabe, Nicolas E. and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
TITLE = {{Geo-Indistinguishability: Differential Privacy for Location-Based Systems}},
TYPE = {Technical Report},
URL = {http://hal.inria.fr/hal-00766821},
X-ID-HAL = {hal-00766821},
YEAR = {2012}
}
@TECHREPORT{chatzikokolakis:hal-00767210,
AUTHOR = {Chatzikokolakis, Konstantinos and Andres, E., Miguel and Bordenabe, Nicolas E. and Palamidessi, Catuscia},
TITLE = {{Enhancing Differential Privacy: from Hamming to General Metrics}},
TYPE = {Technical Report},
URL = {http://hal.inria.fr/hal-00767210},
X-ID-HAL = {hal-00767210},
YEAR = {2012}
}
@INPROCEEDINGS{gazeau:hal-00665995,
ADDRESS = {Tallinn, Estonia},
AUTHOR = {Gazeau, Ivan and Miller, Dale and Palamidessi, Catuscia},
BOOKTITLE = {{QAPL - Tenth Workshop on Quantitative Aspects of Programming Languages}},
DOI = {10.4204/EPTCS.85.5},
EDITOR = {Mieke Massink and Herbert Wiklicky},
MONTH = MAR,
TITLE = {{A non-local method for robustness analysis of floating point programs}},
URL = {http://hal.inria.fr/hal-00665995},
X-ID-HAL = {hal-00665995},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PROCEEDINGS = {yes},
YEAR = {2012}
}
@ARTICLE{chatzikokolakis:inria-00637160,
AUTHOR = {Chatzikokolakis, Konstantinos and Knight, Sophia and Palamidessi, Catuscia and Panangaden, Prakash},
DOI = {10.1145/2362355.2362356},
JOURNAL = {{Transactions on Computational Logic}},
MONTH = OCT,
NUMBER = {4},
PAGES = {28:1-28:35},
PUBLISHER = {ACM},
TITLE = {{Epistemic Strategies and Games on Concurrent Processes}},
URL = {http://hal.inria.fr/inria-00637160},
VOLUME = {13},
X-EDITORIAL-BOARD = {yes},
X-ID-HAL = {inria-00637160},
X-INTERNATIONAL-AUDIENCE = {yes},
YEAR = {2012}
}
@ARTICLE{alvim:inria-00637356,
AUTHOR = {Alvim, S., Mario and Andres, E., Miguel and Palamidessi, Catuscia},
JOURNAL = {{Journal of Computer Security}},
NUMBER = {1},
PAGES = {3-50},
PUBLISHER = {IOS Press},
TITLE = {{Quantitative Information Flow in Interactive Systems}},
URL = {http://hal.inria.fr/inria-00637356},
VOLUME = {20},
X-EDITORIAL-BOARD = {yes},
X-ID-HAL = {inria-00637356},
X-INTERNATIONAL-AUDIENCE = {yes},
YEAR = {2012}
}
@INPROCEEDINGS{alvim:hal-00734044,
ADDRESS = {Cambridge MA, United States},
AUTHOR = {Alvim, S., Mario and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia and Smith, Geoffrey},
BOOKTITLE = { Proceedings of {Computer Security Foundations (CSF)}},
DOI = {10.1109/CSF.2012.26},
PAGES = {265-279},
PUBLISHER = {IEEE},
TITLE = {{Measuring Information Leakage using Generalized Gain Functions}},
URL = {http://hal.inria.fr/hal-00734044},
X-ID-HAL = {hal-00734044},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PROCEEDINGS = {yes},
YEAR = {2012}
}
@INPROCEEDINGS{palamidessi:hal-00760688,
ADDRESS = {Tallin, Estonia},
AUTHOR = {Palamidessi, Catuscia and Stronati, Marco},
BOOKTITLE = {{QAPL - Tenth Workshop on Quantitative Aspects of Programming Languages}},
DOI = {10.4204/EPTCS.85.7},
EDITOR = {Wiklicky, Herbert and Massink, Mieke},
PAGES = {92-105},
PUBLISHER = {Open Publishing Association},
TITLE = {{Differential privacy for relational algebra: improving the sensitivity bounds via constraint systems}},
URL = {http://hal.inria.fr/hal-00760688},
VOLUME = {85},
X-ID-HAL = {hal-00760688},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PROCEEDINGS = {yes},
YEAR = {2012}
}
@INPROCEEDINGS{knight:hal-00761116,
ADDRESS = {Newcastle upon Tyne, United Kingdom},
AUTHOR = {Knight, Sophia and Palamidessi, Catuscia and Panangaden, Prakash and Valencia, Frank D.},
BOOKTITLE = {Proceedings of {CONCUR 2012 - Concurrency Theory - 23rd International Conference, CONCUR 2012}},
DOI = {10.1007/978-3-642-32940-1},
MONTH = SEP,
PAGES = {317-332},
TITLE = {{Spatial and Epistemic Modalities in Constraint-Based Process Calculi}},
URL = {http://hal.inria.fr/hal-00761116},
VOLUME = {7454},
X-ID-HAL = {hal-00761116},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PROCEEDINGS = {yes},
YEAR = {2012}
}
@INPROCEEDINGS{giunti:hal-00761118,
ADDRESS = {New Castle upon Tyne, United Kingdom},
AUTHOR = {Giunti, Marco and Palamidessi, Catuscia and Valencia, Frank D.},
BOOKTITLE = {{Combined 19th International Workshop on Expressiveness in Concurrency and 9th Workshop on Structured Operational Semantics (EXPRESS/SOS 2012)}},
DOI = {10.4204/EPTCS.89},
MONTH = AUG,
PAGES = {65-80},
TITLE = {{Hide and New in the Pi-Calculus}},
URL = {http://hal.inria.fr/hal-00761118},
X-ID-HAL = {hal-00761118},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PROCEEDINGS = {yes},
YEAR = {2012}
}
@ARTICLE{andres:2011:hal-00573447:1,
AUTHOR = {Andres, E., Miguel and Palamidessi, Catuscia and Sokolova, Ana and Van Rossum, Peter},
X-PAYS = {AT,NL},
TITLE = {{Information Hiding in Probabilistic Concurrent Systems}},
JOURNAL = {{Journal of Theoretical Computer Science}},
VOLUME = {412},
NUMBER = {28},
PAGES = {3072-3089},
YEAR = {2011},
X-INTERNATIONAL-AUDIENCE = {yes},
X-EDITORIAL-BOARD = {yes},
URL = {http://hal.inria.fr/hal-00573447/en},
X-ID-HAL = {hal-00573447}
}
@INPROCEEDINGS{aristizabal:2011:hal-00546722:1,
AUTHOR = {Aristizabal, Andr\'es and Bonchi, Filippo and Palamidessi, Catuscia and Pino, Luis and Valencia, Frank D.},
TITLE = {{Deriving Labels and Bisimilarity for Concurrent Constraint Programming}},
BOOKTITLE = { {Proceedings of the 14th International Conference on Foundations of Software Science an Computation Structures (FOSSACS 2011). }},
YEAR = {2011},
SERIES = {Lecture Notes in Computer Science},
EDITOR = {Martin Hofmann},
DOI = {10.1007/ISBN 978-3-642-19804-5},
PUBLISHER = {Springer},
VOLUME = {6604},
PAGES = {138-152},
ADDRESS = {Saarbr{\"u}cken, Germany},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PROCEEDINGS = {yes},
URL = {http://hal.inria.fr/hal-00546722/en},
X-ID-HAL = {hal-00546722}
}
@INPROCEEDINGS{alvim:2011:inria-00580122:5,
AUTHOR = {Alvim, S., M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Degano, Pierpaolo and Palamidessi, Catuscia},
X-PAYS = {IT},
TITLE = {{Differential Privacy: on the trade-off between Utility and Information Leakage}},
BOOKTITLE = {{The 8th International Workshop on Formal Aspects of Security \& Trust (FAST)}},
YEAR = {2011},
MONTH = MAR,
SERIES = {Lecture Notes in Computer Science},
EDITOR = {Gilles Barthe and Anupam Datta and Sandro Etalle},
PUBLISHER = {Springer},
ADDRESS = {Leuven, Belgium},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PROCEEDINGS = {yes},
URL = {http://hal.inria.fr/inria-00580122/en},
X-ID-HAL = {inria-00580122}
}
@INPROCEEDINGS{alvim:2011:inria-00627937:1,
AUTHOR = {Alvim, S., M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
TITLE = {{On the relation between Differential Privacy and Quantitative Information Flow}},
BOOKTITLE = {{38th International Colloquium on Automata, Languages and Programming - ICALP 2011}},
YEAR = {2011},
SERIES = {Lecture Notes in Computer Science},
EDITOR = {Luca Aceto, Monika Henzinger, Jiri Sgall},
DOI = {10.1007/978-3-642-22012-8\_4},
PUBLISHER = {Springer},
VOLUME = {6756},
PAGES = {60-76},
ADDRESS = {Zurich, Switzerland},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PROCEEDINGS = {yes},
X-INVITED-CONFERENCE = {yes},
URL = {http://hal.inria.fr/inria-00627937/en},
X-ID-HAL = {inria-00627937}
}
@INCOLLECTION{alvim:2011:hal-00655522:1,
AUTHOR = {Alvim, M{\'a}rio and Andres, E., Miguel and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
TITLE = {{Quantitative Information Flow and Applications to Differential Privacy}},
YEAR = {2011},
BOOKTITLE = {{Foundations of Security Analysis and Design VI -- FOSAD Tutorial Lectures}},
EDITOR = {Alessandro Aldini and Roberto Gorrieri},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
DOI = {10.1007/978-3-642-23082-0\_8},
PAGES = {211--230},
VOLUME = {6858},
X-INTERNATIONAL-AUDIENCE = {yes},
URL = {http://hal.inria.fr/hal-00655522/en},
X-ID-HAL = {hal-00655522}
}
@PROCEEDINGS{modersheim:2011:hal-00655523:1,
X-PROCEEDINGS = {yes},
AUTHOR = {M{\"o}dersheim, Sebastian and Palamidessi, Catuscia},
X-PAYS = {DK},
TITLE = {{Post-proceedings of TOSCA -- Theory of Security and Applications}},
YEAR = {2011},
SERIES = {Lecture Notes in Computer Science},
EDITOR = {Sebastian M{\"o}dersheim and Catuscia Palamidessi},
PAGES = {235 pages},
PUBLISHER = {Springer},
VOLUME = {6993},
X-INTERNATIONAL-AUDIENCE = {yes},
URL = {http://hal.inria.fr/hal-00655523/en},
X-ID-HAL = {hal-00655523}
}
@PROCEEDINGS{palamidessi:2011:hal-00655524:1,
X-PROCEEDINGS = {yes},
AUTHOR = {Palamidessi, Catuscia and Riska, Alma},
X-PAYS = {US},
TITLE = {{Proceedings of the Eighth International Conference on Quantitative Evaluation of SysTems}},
YEAR = {2011},
EDITOR = {Catuscia Palamidessi and Alma Riska},
PAGES = {276 pages},
PUBLISHER = {IEEE},
X-INTERNATIONAL-AUDIENCE = {yes},
URL = {http://hal.inria.fr/hal-00655524/en},
X-ID-HAL = {hal-00655524}
}
@INPROCEEDINGS{hamadou:2010:inria-00424853:2,
ADDRESS = {Eindhoven, The Netherlands},
AUTHOR = {Hamadou, Sardaouna and Palamidessi, Catuscia and Sassone, Vladimiro and ElSalamouny, Ehab},
BOOKTITLE = {Postproceedings of the 6th International Workshop on Formal Aspects in Security and Trust},
DATE-ADDED = {2011-01-02 19:05:50 +0100},
DATE-MODIFIED = {2011-01-02 19:09:15 +0100},
DOI = {10.1007/978-3-642-12459-4{\_}11},
EDITOR = {Pierpaolo Degano and Joshua D. Guttman},
PAGES = {141-156},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Probable Innocence and Independent Knowledge},
URL = {http://hal.inria.fr/inria-00424853/en},
VOLUME = {5983},
X-ID-HAL = {inria-00424853},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {GB,CA},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-12459-4%7B%5C_%7D11}
}
@INCOLLECTION{longo:2010:hal-00445553:3,
AUTHOR = {Longo, Giuseppe and Palamidessi, Catuscia and Thierry, Paul},
BOOKTITLE = {Randomness Through Computation},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
EDITOR = {Hector Zenil},
NOTE = {ISBN: 978-981-4327-74-9},
PUBLISHER = {World Scientific},
TITLE = {{Some Bridging Results and Challenges in Classical, Quantum and Computational Randomnessi}},
URL = {http://hal.inria.fr/hal-00445553/en},
X-ID-HAL = {hal-00445553},
X-INTERNATIONAL-AUDIENCE = {yes},
YEAR = {2011}
}
@INPROCEEDINGS{PALAMIDESSI:2010:HAL-00548210:1,
ADDRESS = {{L}ac {B}eaufort, {Q}u\'ebec {C}ity, {C}anada},
AUTHOR = {{C}atuscia {P}alamidessi},
BOOKTITLE = {Joint Conference: 10th International Conference on the Mathematics of Program Construction (MPC 2010), and 13th International Conference on Algebraic Methodology And Software Technology (AMAST 2010)},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1007/978-3-642-13321-3\_2},
EDITOR = {{C}laude {B}olduc and {J}ules {D}esharnais and {B}{\'e}chir {K}tari},
HAL_ID = {hal-00548210},
LANGUAGE = {{E}nglish},
PAGES = {19-19},
PUBLISHER = {{S}pringer},
SERIES = {{L}ecture {N}otes in {C}omputer {S}cience},
TITLE = {{C}ompositionality of {S}ecure {I}nformation {F}low},
URL = {http://hal.archives-ouvertes.fr/hal-00548210/en/},
VOLUME = {6120},
X-INTERNATIONAL-AUDIENCE = {yes},
X-INVITED-CONFERENCE = {yes},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548210/en/},
BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-13321-3_2}
}
@INPROCEEDINGS{PALAMIDESSI:2010:HAL-00548211:1,
ADDRESS = {{P}aphos, {C}yprus},
AUTHOR = {Catuscia {P}alamidessi and {M}\'ario S. {A}lvim and Miguel E. Andres},
BOOKTITLE = {{J}oint {W}orkshop on {A}utomated {R}easoning for {S}ecurity {P}rotocol {A}nalysis and {I}ssues in the {T}heory of {S}ecurity ({ARSPA}-{WITS} 2010)},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1007/978-3-642-16074-5\_8},
EDITOR = {{A}lessandro {A}rmando and {G}avin {L}owe},
HAL_ID = {hal-00548211},
LANGUAGE = {{E}nglish},
PAGES = {111-111},
PUBLISHER = {{S}pringer},
SERIES = {{L}ecture {N}otes in {C}omputer {S}cience},
TITLE = {{I}nteractive {I}nformation {F}low},
URL = {http://hal.archives-ouvertes.fr/hal-00548211/en/},
VOLUME = {6186},
X-INTERNATIONAL-AUDIENCE = {yes},
X-INVITED-CONFERENCE = {yes},
X-PAYS = {NL},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548211/en/},
BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-16074-5_8}
}
@INPROCEEDINGS{ALVIM:2010:HAL-00548212:1,
ADDRESS = {{B}risbane, {A}ustralia},
AUDIENCE = {international},
AUTHOR = {{M}\'ario S. {A}lvim and Miguel E. Andres and {C}atuscia {P}alamidessi},
BOOKTITLE = {6th {IFIP} {I}nternational {C}onference on {T}heoretical {C}omputer {S}cience ({TCS} 2010)},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1007/978-3-642-15240-5\_4},
EDITOR = {{C}ristian {S}. {C}alude and {V}ladimiro {S}assone},
HAL_ID = {hal-00548212},
LANGUAGE = {{E}nglish},
PAGES = {53-54},
PUBLISHER = {{S}pringer},
SERIES = {{IFIP} {A}dvances in {I}nformation and {C}ommunication {T}echnology},
TITLE = {{E}ntropy and {A}ttack {M}odels in {I}nformation {F}low},
URL = {http://hal.archives-ouvertes.fr/hal-00548212/en/},
VOLUME = {323},
X-INTERNATIONAL-AUDIENCE = {yes},
X-INVITED-CONFERENCE = {yes},
X-PAYS = {NL},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548212/en/},
BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-15240-5_4}
}
@ARTICLE{chatzikokolakis:2010:inria-00424860:2,
AUTHOR = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1016/j.ic.2009.06.006},
JOURNAL = {Information and Computation},
NUMBER = {6},
PAGES = {694-715},
TITLE = {Making Random Choices Invisible to the Scheduler},
URL = {http://hal.inria.fr/inria-00424860/en},
VOLUME = {208},
X-EDITORIAL-BOARD = {yes},
X-ID-HAL = {inria-00424860},
X-INTERNATIONAL-AUDIENCE = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://dx.doi.org/10.1016/j.ic.2009.06.006}
}
@INPROCEEDINGS{chiarugi:2010:hal-00548213:1,
ADDRESS = {Niagara Falls, New York, USA},
AUTHOR = {Chiarugi, Davide and Falaschi, Moreno and Olarte, Carlos and Palamidessi, Catuscia},
BOOKTITLE = {First ACM International Conference on Bioinformatics and Computational Biology (BCB 2010)},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1145/1854776.1854843},
PAGES = {414-417},
PUBLISHER = {ACM Digital Libraries},
TITLE = {Compositional modelling of signalling pathways in timed concurrent constraint programming},
URL = {http://hal.inria.fr/hal-00548213/en},
X-ID-HAL = {hal-00548213},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {IT,CO},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://dx.doi.org/10.1145/1854776.1854843}
}
@INPROCEEDINGS{andres:2010:hal-00445445:2,
ADDRESS = {Cyprus},
AUTHOR = {Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter and Smith, Geoffrey},
BOOKTITLE = {16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2010)},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1007/978-3-642-12002-2{\_}32},
EDITOR = {Javier Esparza and Rupak Majumdar},
PAGES = {373-389},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Computing the Leakage of Information-Hiding Systems},
URL = {http://hal.inria.fr/hal-00445445/en},
VOLUME = {6015},
X-ID-HAL = {hal-00445445},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {NL,US},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-12002-2%7B%5C_%7D32}
}
@INPROCEEDINGS{andres:2010:hal-00548187:1,
ADDRESS = {Williamsburg, VA, USA},
AUTHOR = {Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter and Sokolova, Ana},
BOOKTITLE = {7th IEEE International Conference on Quantitative Evaluation of SysTems (QEST 2010)},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1109/QEST.2010.11},
PAGES = {17-26},
PUBLISHER = {IEEE Computer Society},
TITLE = {Information Hiding in Probabilistic Concurrent Systems},
URL = {http://hal.inria.fr/hal-00548187/en},
X-ID-HAL = {hal-00548187},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {NL,AT},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://dx.doi.org/10.1109/QEST.2010.11}
}
@INPROCEEDINGS{alvim:2010:inria-00479672:2,
ADDRESS = {Paris, France},
AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia},
BOOKTITLE = {21th International Conference on Concurrency Theory (CONCUR 2010)},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1007/978-3-642-15375-4{\_}8},
EDITOR = {Paul Gastin and Fran{\c{c}}ois Laroussinie},
PAGES = {102-116},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Information Flow in Interactive Systems},
URL = {http://hal.inria.fr/inria-00479672/en},
VOLUME = {6269},
X-ID-HAL = {inria-00479672},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {NL},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-15375-4%7B%5C_%7D8}
}
@INPROCEEDINGS{alvim:2010:inria-00479674:2,
ADDRESS = {Brisbane, Australia},
AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter},
BOOKTITLE = {6th IFIP International Conference on Theoretical Computer Science (TCS 2010)},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1007/978-3-642-15240-5{\_}5},
EDITOR = {Cristian S. Calude and Vladimiro Sassone},
PAGES = {55-70},
PUBLISHER = {Springer},
SERIES = {IFIP Advances in Information and Communication Technology},
TITLE = {Safe Equivalences for Security Properties},
URL = {http://hal.inria.fr/inria-00479674/en},
VOLUME = {323},
X-ID-HAL = {inria-00479674},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {NL},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-15240-5%7B%5C_%7D5}
}
@INPROCEEDINGS{hamadou:2010:inria-00548007:1,
ADDRESS = {Berleley/Oakland, California, USA},
AUTHOR = {Hamadou, Sardaouna and Sassone, Vladimiro and Palamidessi, Catuscia},
BOOKTITLE = {31st IEEE Symposium on Security and Privacy},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1109/SP.2010.13},
PAGES = {79-92},
PUBLISHER = {IEEE Computer Society},
TITLE = {Reconciling Belief and Vulnerability in Information Flow},
URL = {http://hal.inria.fr/inria-00548007/en},
X-ID-HAL = {inria-00548007},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {GB},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://dx.doi.org/10.1109/SP.2010.13}
}
@INPROCEEDINGS{alvim:2010:hal-00548200:1,
ADDRESS = {Edinburgh, United Kingdom},
AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia},
BOOKTITLE = {25th Annual IEEE Symposium on Logic in Computer Science (LICS 2010)},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1109/LICS.2010.53},
PAGES = {314-321},
PUBLISHER = {IEEE Computer Society},
TITLE = {Probabilistic Information Flow},
URL = {http://hal.inria.fr/hal-00548200/en},
X-ID-HAL = {hal-00548200},
X-INTERNATIONAL-AUDIENCE = {yes},
X-INVITED-CONFERENCE = {yes},
X-PAYS = {NL},
X-PROCEEDINGS = {yes},
YEAR = {2010},
BDSK-URL-1 = {http://dx.doi.org/10.1109/LICS.2010.53}
}
@TECHREPORT{alvim:2010:hal-00548214:1,
AUTHOR = {Alvim, M{\'a}rio S. and Chatzikokolakis, Konstantinos and Degano, Pierpaolo and Palamidessi, Catuscia},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
INSTITUTION = {INRIA},
TITLE = {Differential Privacy versus Quantitative Information Flow},
URL = {http://hal.inria.fr/hal-00548214/en},
X-ID-HAL = {hal-00548214},
X-PAYS = {NL,IT},
YEAR = {2010}
}
@INCOLLECTION{gabbrielli:2010:hal-00545256:1,
AUTHOR = {Gabbrielli, Maurizio and Palamidessi, Catuscia and Valencia, Frank D.},
BOOKTITLE = {A 25-Year Perspective on Logic Programming},
DATE-ADDED = {2010-12-30 03:55:53 +0100},
DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
DOI = {10.1007/978-3-642-14309-0{\_}11},
EDITOR = {Agostino Dovier and Enrico Pontelli},
MONTH = JUN,
PAGES = {231-253},
PUBLISHER = {Springer},
TITLE = {Concurrent and Reactive Constraint Programming},
URL = {http://hal.inria.fr/hal-00545256/en},
X-ID-HAL = {hal-00545256},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {IT},
YEAR = {2010},
BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-14309-0%7B%5C_%7D11}
}
@ARTICLE{Kramer:09:JANCL,
AUTHOR = {Simon Kramer and Catuscia Palamidessi and Roberto Segala and Andrea Turrini and Christelle Braun},
DATE-ADDED = {2010-12-30 03:55:02 +0100},
DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
DOI = {10.3166/jancl.19.489516},
JOURNAL = {The Journal of Applied Non-Classical Logics},
NUMBER = {4},
PAGES = {489-516},
TITLE = {A Quantitative Doxastic Logic for Probabilistic Processes and Applications to Information-Hiding},
URL = {http://hal.archives-ouvertes.fr/inria-00445212/en/},
VOLUME = {19},
X-EDITORIAL-BOARD = {yes},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {IT},
YEAR = {2009},
BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00445212/en/},
BDSK-URL-2 = {http://dx.doi.org/10.3166/jancl.19.489516}
}
@INPROCEEDINGS{Bhowmick:08:TGC,
AUTHOR = {Abhishek Bhowmick and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the Fourth Symposium on Trustworthy Global Computing (TGC 2008)},
DATE-ADDED = {2010-12-30 03:55:02 +0100},
DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
EDITOR = {Christos Kaklamanis and Flemming Nielson},
PAGES = {36--51},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Bounds on the leakage of the input's distribution in information-hiding protocols},
URL = {http://hal.archives-ouvertes.fr/hal-00444579/en/},
VOLUME = {5474},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {IN},
X-PROCEEDINGS = {yes},
YEAR = {2009},
BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00444579/en/}
}
@ARTICLE{Norman:08:TSE,
AUTHOR = {Gethin Norman and Catuscia Palamidessi and David Parker and Peng Wu},
DATE-ADDED = {2010-12-30 03:55:02 +0100},
DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
JOURNAL = {IEEE Transactions of Software Engineering},
NUMBER = {2},
PAGES = {209--223},
RATING = {1},
TITLE = {Model checking probabilistic and stochastic extensions of the $\pi$-calculus},
URL = {http://hal.archives-ouvertes.fr/inria-00424856/en/},
VOLUME = {35},
X-EDITORIAL-BOARD = {yes},
X-INTERNATIONAL-AUDIENCE = {yes},
YEAR = {2009},
BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00424856/en/}
}
@ARTICLE{Cacciagrano:08:LMCS,
AUTHOR = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi},
DATE-ADDED = {2010-12-30 03:55:02 +0100},
DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
JOURNAL = {Logical Methods in Computer Science},
NUMBER = {2 - 15},
TITLE = {Explicit Fairness in Testing Semantics},
URL = {http://hal.archives-ouvertes.fr/hal-00444580/en/},
VOLUME = {5},
X-EDITORIAL-BOARD = {yes},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {IT},
YEAR = {2009},
BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00444580/en/}
}
@ARTICLE{Beauxis:09:TCS,
AUTHOR = {Romain Beauxis and Catuscia Palamidessi},
BIBDATE = {2009-09-03},
BIBSOURCE = {DBLP, http://dblp.uni-trier.de/db/journals/tcs/tcs410.html#BeauxisP09},
DATE-ADDED = {2010-12-30 03:55:02 +0100},
DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
DOI = {http://dx.doi.org/10.1016/j.tcs.2009.06.008},
JOURNAL = {Theoretical Computer Science},
NUMBER = {41},
PAGES = {4006--4025},
TITLE = {Probabilistic and nondeterministic aspects of anonymity},
URL = {http://hal.archives-ouvertes.fr/inria-00424855/en/},
VOLUME = {410},
X-EDITORIAL-BOARD = {yes},
X-INTERNATIONAL-AUDIENCE = {yes},
YEAR = {2009},
BDSK-URL-1 = {http://dx.doi.org/10.1016/j.tcs.2009.06.008},
BDSK-URL-2 = {http://hal.archives-ouvertes.fr/inria-00424855/en/}
}
@INPROCEEDINGS{Braun:09:MFPS,
AUTHOR = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the 25th Conf. on Mathematical Foundations of Programming Semantics},
DATE-ADDED = {2010-12-30 03:55:02 +0100},
DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
PAGES = {75-91},
PUBLISHER = {Elsevier B.V.},
SERIES = {Electronic Notes in Theoretical Computer Science},
TITLE = {Quantitative Notions of Leakage for One-try Attacks},
URL = {http://hal.archives-ouvertes.fr/inria-00424852/en/},
VOLUME = {249},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {NL},
X-PROCEEDINGS = {yes},
YEAR = {2009},
BDSK-URL-1 = {http://hal.archives-ouvertes.fr/inria-00424852/en/}
}
@INPROCEEDINGS{Falaschi:09:PPDP,
AUTHOR = {Moreno Falaschi and Carlos Olarte and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the 11th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, PPDP'09},
DATE-ADDED = {2010-12-30 03:55:02 +0100},
DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
DOI = {10.1145/1599410.1599436},
EDITOR = {Ant{\'o}nio Porto and Francisco Javier L{\'o}pez-Fraguas},
LIXCATEGORIE = {CIA},
LIXEQUIPE = {comete},
PAGES = {207-218},
PUBLISHER = {ACM},
TITLE = {A framework for abstract interpretation of timed concurrent constraint programs},
URL = {http://hal.inria.fr/inria-00426608/en/},
X-INTERNATIONAL-AUDIENCE = {yes},
X-PAYS = {IT},
X-PROCEEDINGS = {yes},
YEAR = {2009},
BDSK-URL-1 = {http://hal.inria.fr/inria-00426608/en/},
BDSK-URL-2 = {http://dx.doi.org/10.1145/1599410.1599436}
}
@INPROCEEDINGS{Braun:08:FOSSACS,
AUTHOR = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of FOSSACS},
DATE-ADDED = {2008-12-30 06:11:27 +0100},
DATE-MODIFIED = {2008-12-30 06:11:27 +0100},
DOI = {10.1007/978-3-540-78499-9_31},
EDITOR = {Roberto Amadio},
PAGES = {443-457},
PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Compositional Methods for Information-Hiding},
URL = {http://hal.inria.fr/inria-00349227/en/},
VOLUME = {4962},
YEAR = {2008},
BDSK-URL-1 = {http://hal.inria.fr/inria-00349227/en/},
BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-540-78499-9_31},
BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf}
}
@INPROCEEDINGS{Beauxis:08:BOOK,
AUTHOR = {Romain Beauxis and Catuscia Palamidessi and Frank D. Valencia},
BOOKTITLE = {Concurrency, Graphs and Models},
DATE-ADDED = {2008-12-30 06:11:03 +0100},
DATE-MODIFIED = {2008-12-30 06:11:03 +0100},
DOI = {10.1007/978-3-540-68679-8_29},
EDITOR = {Pierpaolo Degano and Rocco {De Nicola} and Jos\'e Meseguer},
PAGES = {473-492},
PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf},
PUBLISHER = {Springer},
READ = {Yes},
SERIES = {Lecture Notes in Computer Science},
TITLE = {On the Asynchronous Nature of the Asynchronous pi-Calculus},
URL = {http://hal.inria.fr/inria-00349226/en/},
VOLUME = {5065},
YEAR = {2008},
BDSK-URL-1 = {http://hal.inria.fr/inria-00349226/en/},
BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-540-68679-8_29},
BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf}
}
@INPROCEEDINGS{Beauxis:08:TGC,
AUTHOR = {Romain Beauxis and Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
BOOKTITLE = {Proceedings of the Third Symposium on Trustworthy Global Computing (TGC 2007)},
DATE-ADDED = {2008-12-30 06:10:45 +0100},
DATE-MODIFIED = {2008-12-30 06:10:45 +0100},
DOI = {10.1007/978-3-540-78663-4_23},
EDITOR = {Gilles Barthe and C{\'e}dric Fournet},
PAGES = {347-362},
PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Channels-TGC07/tgc.pdf},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Formal Approaches to Information-Hiding (Tutorial)},
URL = {http://hal.inria.fr/inria-00261827/en/},
VOLUME = {4912},
YEAR = {2008},
BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-78663-4_23},
BDSK-URL-2 = {http://hal.inria.fr/inria-00261827/en/}
}
@ARTICLE{Chatzikokolakis:08:JCS,
AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
DATE-ADDED = {2008-12-30 06:07:59 +0100},
DATE-MODIFIED = {2008-12-30 06:07:59 +0100},
DOI = {10.3233/JCS-2008-0333},
JOURNAL = {Journal of Computer Security},
NUMBER = {5},
PAGES = {531--571},
PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf},
TITLE = {On the Bayes risk in information-hiding protocols},
URL = {http://hal.inria.fr/inria-00349224/en/},
VOLUME = {16},
YEAR = {2008},
BDSK-URL-1 = {http://hal.inria.fr/inria-00349224/en/},
BDSK-URL-2 = {http://dx.doi.org/10.3233/JCS-2008-0333},
BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf}
}
@TECHREPORT{Troina:08:TechRep,
AUTHOR = {Angelo Troina and Jean Goubault-Larrecq and Catuscia Palamidessi},
DATE-ADDED = {2008-12-25 01:55:14 +0100},
DATE-MODIFIED = {2008-12-25 01:58:13 +0100},
INSTITUTION = {{LIX}, {E}cole {P}olytechnique},
TITLE = {A Probabilistic Applied Pi-Calculus},
YEAR = {2008}
}
@ARTICLE{Palamidessi:00:IandC,
AUTHOR = {Catuscia Palamidessi and Joachim Parrow and Rob J. van Glabbeek},
DATE-ADDED = {2008-12-24 10:16:23 +0100},
DATE-MODIFIED = {2008-12-24 10:18:05 +0100},
JOURNAL = {Information and Computation},
NUMBER = {1-2},
PAGES = {1},
TITLE = {Preface},
VOLUME = {156},
YEAR = {2000}
}
@INPROCEEDINGS{Aranda:06:FMCO,
AUTHOR = {Jesus Aranda and Cinzia Di Giusto and Catuscia Palamidessi and Frank Valencia},
BOOKTITLE = {Postproceedings of the 5th International Symposium on Formal Methods for Components and Objects (FMCO'06)},
DATE-MODIFIED = {2008-02-06 03:14:14 +0100},
EDITOR = {Frank S. {de Boer} and Marcello M. Bonsangue},
NOTE = {\url{http://www.lix.polytechnique.fr/~fvalenci/papers/fmco07.pdf}},
PAGES = {185-206},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Expressiveness of Recursion, Replication and Scope Mechanisms in Process Calculi},
VOLUME = {4709},
YEAR = {2007}
}
@ARTICLE{Chatzikokolakis:08:IC,
AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
DATE-MODIFIED = {2010-01-04 10:41:19 +0100},
DOI = {10.1016/j.ic.2007.07.003},
JOURNAL = {Inf. and Comp.},
NUMBER = {2--4},
PAGES = {378--401},
TITLE = {Anonymity Protocols as Noisy Channels},
URL = {http://hal.inria.fr/inria-00349225/en/},
VOLUME = {206},
YEAR = {2008},
BDSK-URL-1 = {http://hal.inria.fr/inria-00349225/en/},
BDSK-URL-2 = {http://dx.doi.org/10.1016/j.ic.2007.07.003}
}
@INPROCEEDINGS{Goubault-Larrecq:07:APLAS,
AUTHOR = {Jean Goubault-Larrecq and Catuscia Palamidessi and Angelo Troina},
BOOKTITLE = {Proceedings of the 5th Asian Symposium on Programming Languages and Systems (APLAS'07)},
DATE-MODIFIED = {2007-12-16 15:51:49 +0100},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Angelo/aplas.pdf}},
PAGES = {175-190},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {A Probabilistic Applied Pi-Calculus},
VOLUME = {4807},
YEAR = 2007
}
@ARTICLE{Vigliotti:07:TCS,
AUTHOR = {Maria Grazia Vigliotti and Iain Phillips and Catuscia Palamidessi},
DATE-MODIFIED = {2008-12-28 16:41:03 +0100},
JOURNAL = {Theoretical Computer Science},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/2007/MariaGrazia/tcs.pdf}},
NUMBER = {1-3},
PAGES = {267-289},
TITLE = {Tutorial on separation results in process calculi via leader election problems},
URL = {http://hal.inria.fr/inria-00201071/en/},
VOLUME = {388},
YEAR = 2007,
BDSK-URL-1 = {http://hal.inria.fr/inria-00201071/en/}
}
@INPROCEEDINGS{Norman:07:QEST,
AUTHOR = {Gethin Norman and Catuscia Palamidessi and David Parker and Peng Wu},
BOOKTITLE = {4th International Conference on the Quantitative Evaluation of SysTems (QEST)},
DATE-MODIFIED = {2009-01-02 03:27:24 +0100},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Wu/qest1.pdf}. Full version in \url{http://www.lix.polytechnique.fr/~catuscia/papers/2009/TSE.pdf}},
PAGES = {169-178},
PUBLISHER = {IEEE Computer Society},
TITLE = {Model checking the probabilistic pi-calculus},
YEAR = 2007
}
@INPROCEEDINGS{Wu:07:QEST,
AUTHOR = {Peng Wu and Catuscia Palamidessi and Huimin Lin},
BOOKTITLE = {Proceedings of 4th International Conference on the Quantitative Evaluation of SysTems (QEST)},
DATE-MODIFIED = {2007-12-23 00:54:37 +0100},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Wu/qest2.pdf}},
PAGES = {179-188},
PUBLISHER = {IEEE Computer Society},
TITLE = {Symbolic Bisimulation for Probabilistic Systems},
YEAR = 2007
}
@INPROCEEDINGS{Olarte:07:ICLP,
AUTHOR = {Carlos Olarte and Catuscia Palamidessi and Frank D. Valencia},
BOOKTITLE = {Proceedings of the 23rd International Conference in Logic Programming (ICLP'07)},
EDITOR = {Ver{\'o}nica Dahl and Ilkka Niemel{\"a}},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Carlos/iclp07DC.pdf}},
PAGES = {464--465},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Universal Timed Concurrent Constraint Programming},
VOLUME = {4670},
YEAR = 2007
}
@INPROCEEDINGS{Falaschi:07:ICLP,
AUTHOR = {Moreno Falaschi and Carlos Olarte and Catuscia Palamidessi and Frank D. Valencia},
BOOKTITLE = {Proceedings of The 23rd International Conference in Logic Programming (ICLP'07)},
EDITOR = {Ver{\'o}nica Dahl and Ilkka Niemel{\"a}},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Carlos/iclp07.pdf}},
PAGES = {271--285},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Declarative Diagnosis of Temporal Concurrent Constraint Programs},
VOLUME = {4670},
YEAR = 2007
}
@INPROCEEDINGS{Chatzikokolakis:07:CONCUR,
AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of CONCUR'07},
EDITOR = {Lu{\'\i}s Caires and Vasco Thudichum Vasconcelos},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Scheduler/report.pdf}},
PAGES = {42--58},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Making Random Choices Invisible to the Scheduler},
VOLUME = {4703},
YEAR = 2007
}
@INPROCEEDINGS{Chatzikokolakis:07:CSF,
AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
BOOKTITLE = {Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20)},
DATE-MODIFIED = {2008-12-30 05:07:47 +0100},
PAGES = {341-354},
PUBLISHER = {IEEE Computer Society},
TITLE = {Probability of Error in Information-Hiding Protocols},
YEAR = 2007,
BDSK-URL-1 = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full_original.pdf}
}
@INPROCEEDINGS{Cacciagrano:06:EXPRESS,
AUTHOR = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the 13th International Workshop on Expressiveness in Concurrency (EXPRESS'06)},
EDITORS = {Iain Phillips and Roberto Amadio},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Diletta/FairPi/express06.pdf}},
PAGES = {3--26},
PUBLISHER = {Elsevier Science B.V.},
SERIES = {Electronic Notes in Theoretical Computer Science},
TITLE = {Fair $\Pi$},
VOLUME = {175 (3)},
YEAR = {2007}
}
@INPROCEEDINGS{Chatzikokolakis:06:TGC,
AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
BOOKTITLE = {Proceedings of the 2nd Symposium on Trustworthy Global Computing (TGC)},
DATE-MODIFIED = {2007-12-23 19:18:49 +0100},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Channels/tgc.pdf}},
PAGES = {281-300},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Anonymity Protocols as Noisy Channels},
VOLUME = {4661},
YEAR = {2006}
}
@ARTICLE{Deng:07:TCS,
AUTHOR = {Yuxin Deng and Catuscia Palamidessi},
DATE-MODIFIED = {2008-12-28 16:55:03 +0100},
JOURNAL = {Theoretical Computer Science},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_Axiom/tcs.pdf}},
NUMBER = {1-2},
PAGES = {92--114},
TITLE = {Axiomatizations for probabilistic finite-state behaviors},
URL = {http://hal.inria.fr/inria-00200928/en/},
VOLUME = {373},
YEAR = {2007},
BDSK-URL-1 = {http://hal.inria.fr/inria-00200928/en/}
}
@ARTICLE{Palamidessi:06:EATCS,
AUTHOR = {C. Palamidessi and F. Valencia},
JOURNAL = {Bulletin of the European Association for Theoretical Computer Science},
MONTH = OCT,
NOTE = {Column: Programming Languages. \url{http://www.lix.polytechnique.fr/~catuscia/papers/Frank/EATCS_06/paper.pdf}},
PAGES = {155--171},
TITLE = {Languages for Concurrency},
VOLUME = {90},
YEAR = {2006}
}
@INPROCEEDINGS{Lopez:06:ICLP,
AUTHOR = {Hugo A. L{\'o}pez and Catuscia Palamidessi and Jorge and Camilo Rueda and Frank D. Valencia},
BOOKTITLE = {Proceedings of the 22nd International Conference on logic Programming, (ICLP)},
DATE-MODIFIED = {2007-12-26 04:06:43 +0100},
EDITOR = {Sandro Etalle and Miroslaw Truszczynski},
PAGES = {449--450},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {A Declarative Framework for Security: Secure Concurrent Constraint Programming},
VOLUME = {4079},
YEAR = {2006}
}
@INPROCEEDINGS{Palamidessi:06:LICS,
AUTHOR = {Catuscia Palamidessi and Vijay A. Saraswat and Frank D. Valencia and Bj{\"o}rn Victor},
BOOKTITLE = {Proceedings of the Twenty First Annual IEEE Symposium on Logic in Computer Science (LICS)},
DATE-MODIFIED = {2008-12-28 17:04:57 +0100},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Frank/LICS_06/main.pdf}},
PAGES = {59--68},
PUBLISHER = {IEEE Computer Society},
TITLE = {On the Expressiveness of Linearity vs Persistence in the Asynchronous pi-calculus},
URL = {http://hal.inria.fr/inria-00201096/en/},
YEAR = 2006,
BDSK-URL-1 = {http://hal.inria.fr/inria-00201096/en/}
}
@ARTICLE{Cacciagrano:06:TCS,
AUTHOR = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi},
DATE-MODIFIED = {2008-12-28 17:35:48 +0100},
JOURNAL = {Theoretical Computer Science},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Diletta/Must/report.pdf}},
NUMBER = {3},
PAGES = {218-235},
TITLE = {Separation of synchronous and asynchronous communication via testing},
URL = {http://hal.inria.fr/inria-00200916/en/},
VOLUME = {386},
YEAR = {2007},
BDSK-URL-1 = {http://hal.inria.fr/inria-00200916/en/}
}
@ARTICLE{Chatzikokolakis:06:TCS,
AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
DATE-MODIFIED = {2008-12-28 16:57:29 +0100},
JOURNAL = {Theoretical Computer Science},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/tcsPI.pdf}},
NUMBER = {1-2},
PAGES = {123--138},
TITLE = {Probable Innocence Revisited},
URL = {http://hal.inria.fr/inria-00201072/en/},
VOLUME = 367,
YEAR = {2006},
BDSK-URL-1 = {http://hal.inria.fr/inria-00201072/en/}
}
@INPROCEEDINGS{Palamidessi:05:FMCO,
AUTHOR = {Catuscia Palamidessi and Iain Phillips and Maria Grazia Vigliotti},
BOOKTITLE = {Postproceedings of the 4th International Symposium on Formal Methods for Components and Objects (FMCO)},
EDITOR = {Frank S. de Boer and Marcello M. Bonsangue and Susanne Graf and Willem P. de Roever},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/2006/MariaGrazia/FMCO/fmco-06.pdf}},
PAGES = {172--194},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Expressiveness via Leader Election Problems},
VOLUME = {4111},
YEAR = {2005}
}
@INPROCEEDINGS{Pradalier:06:QAPL,
AUTHOR = {Sylvain Pradalier and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the 4th International Workshop on Quantitative Aspects of Programming Languages (QAPL)},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Sylvain/QAPL06/FinalBis.pdf}},
PAGES = {119--136},
PUBLISHER = {Elsevier Science B.V.},
SERIES = {Electronic Notes in Theoretical Computer Science},
TITLE = {Expressiveness of probabilistic $\pi$-calculi},
VOLUME = {164 (3)},
YEAR = 2006
}
@INPROCEEDINGS{palamidessi_et_al:DSP:2006:299,
AUTHOR = {Catuscia Palamidessi and Mohit Bhargava},
BOOKTITLE = {Foundations of Global Computing},
EDITOR = {Jos{\'e} Luiz Fiadeiro and Ugo Montanari and Martin Wirsing},
NOTE = {\url{drops.dagstuhl.de/opus/volltexte/2006/299}},
NUMBER = {05081},
PUBLISHER = {Internationales Begegnungs- und Forschungszentrum (IBFI), Schloss Dagstuhl, Germany},
SERIES = {Dagstuhl Seminar Proceedings},
TITLE = {Probabilistic Anonymity},
YEAR = {2006}
}
@INPROCEEDINGS{Deng:05:FOSSACS,
AUTHOR = {Yuxin Deng and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of FOSSACS'05},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_Axiom/fossacs05.pdf}},
PAGES = {110--124},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Axiomatizations for probabilistic finite-state behaviors},
VOLUME = 3441,
YEAR = {2005}
}
@ARTICLE{Palamidessi:05:TCS,
AUTHOR = {Catuscia Palamidessi and Oltea M. Herescu},
DATE-MODIFIED = {2008-12-28 17:01:48 +0100},
JOURNAL = {Theoretical Computer Science},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/prob_enc/report.pdf}},
NUMBER = {2-3},
PAGES = {373-404},
TITLE = {A randomized encoding of the $\pi$-calculus with mixed choice},
URL = {http://hal.inria.fr/inria-00201105/en/},
VOLUME = 335,
YEAR = {2005},
BDSK-URL-1 = {http://hal.inria.fr/inria-00201105/en/}
}
@ARTICLE{Chatzikokolakis:05:TCS,
AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
DATE-MODIFIED = {2007-12-16 16:11:42 +0100},
JOURNAL = {Theoretical Computer Science},
NOTE = {A short version of this paper appeared in the {\em Proceedings of the Symposium on Trustworthy Global Computing (TGC)}, volume 3705 of LNCS, pages 146-162. Springer. \url{http://www.lix.polytechnique.fr/~catuscia/papers/PartialSecrets/TCSreport.pdf}},
NUMBER = {3},
PAGES = {512-527},
TITLE = {A Framework for Analyzing Probabilistic Protocols and its Application to the Partial Secrets Exchange},
VOLUME = {389},
YEAR = 2007
}
@INPROCEEDINGS{Chatzikokolakis:05:TGC,
AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the Symp. on Trustworthy Global Computing},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/PartialSecrets/tgc05.pdf}},
PAGES = {146-162},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {A Framework for Analyzing Probabilistic Protocols and its Application to the Partial Secrets Exchange},
VOLUME = 3705,
YEAR = {2005}
}
@INPROCEEDINGS{Deng:05:QAPL,
AUTHOR = {Yuxin Deng and Tom Chothia and Catuscia Palamidessi and Jun Pang},
BOOKTITLE = {Proceedings of the Third Workshop on Quantitative Aspects of Programming Languages (QAPL 2005)},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Metrics/QAPL/gts.pdf}},
NUMBER = {2},
PAGES = {79--96},
PUBLISHER = {Elsevier Science Publishers},
SERIES = {Electronic Notes in Theoretical Computer Science},
TITLE = {Metrics for Action-labelled Quantitative Transition Systems},
VOLUME = {153},
YEAR = {2006}
}
@INPROCEEDINGS{Chatzikokolakis:05:FAST,
AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
BOOKTITLE = {Third International Workshop on Formal Aspects in Security and Trust (FAST 2005), Revised Selected Papers},
EDITOR = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider},
PAGES = {142-157},
PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/reportPI.pdf},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Probable Innocence Revisited},
VOLUME = {3866},
YEAR = {2006}
}
@INPROCEEDINGS{Deng:05:SECCO,
AUTHOR = {Yuxin Deng and Catuscia Palamidessi and Jun Pang},
BOOKTITLE = {Proceedings of the 3rd International Workshop on Security Issues in Concurrency (SecCo)},
DATE-MODIFIED = {2007-12-22 09:09:14 +0100},
EDITOR = {Michael Backes and Andre Scedrov},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/report_wa.pdf}},
PAGES = {55--76},
PUBLISHER = {Elsevier Science B.V.},
SERIES = {Electronic Notes in Theoretical Computer Science},
TITLE = {Weak Probabilistic Anonymity},
VOLUME = {180 (1)},
YEAR = {2007}
}
@INPROCEEDINGS{Bhargava:05:CONCUR,
AUTHOR = {Mohit Bhargava and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of CONCUR},
EDITOR = {Mart\'{\i}n Abadi and Luca de Alfaro},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/concur.pdf}},
PAGES = {171--185},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Probabilistic Anonymity},
VOLUME = 3653,
YEAR = 2005
}
@INPROCEEDINGS{Cacciagrano:05:EXPRESS,
ADDRESS = {San Francisco, USA},
AUTHOR = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the 12th International Workshop on Expressiveness in Concurrency (EXPRESS 2005)},
EDITORS = {Jos Baeten and Iain Phillips},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Diletta/Must/report.pdf}},
NUMBER = {3},
PAGES = {95--108},
PUBLISHER = {Elsevier Science B.V.},
SERIES = {Electronic Notes in Theoretical Computer Science},
TITLE = {Separation of synchronous and asynchronous communication via testing},
VOLUME = {154},
YEAR = {2006}
}
@INPROCEEDINGS{Palamidessi:05:MFPS,
ADDRESS = {Birmingham, UK},
AUTHOR = {Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the 21st Conference on the Mathematical Foundations of Programming Semantics (MFPS XXI)},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/MFPS/paper.pdf}},
PAGES = {33--42},
PUBLISHER = {Elsevier Science B.V.},
SERIES = {Electronic Notes in Theoretical Computer Science},
TITLE = {Probabilistic and nondeterministic aspects of Anonymity},
VOLUME = {155},
YEAR = {2006}
}
@INPROCEEDINGS{Palamidessi:05:BERTINORO,
ADDRESS = {Bertinoro, Italy},
AUTHOR = {Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the Workshop on ``Essays on Algebraic Process Calculi'' (APC 25)},
EDITORS = {Luca Aceto and Andrew D. Gordon},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Bertinoro/paper.pdf}},
PAGES = {277-279},
PUBLISHER = {Elsevier Science B.V.},
SERIES = {Electronic Notes in Theoretical Computer Science},
TITLE = {Anonymity in probabilistic and nondeterministic systems},
VOLUME = {162},
YEAR = {2006}
}
@INPROCEEDINGS{Ziegler:05:SOS,
ADDRESS = {Lisbon, Portugal},
AUTHOR = {Axelle Ziegler and Dale Miller and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the 2nd Workshop on Structural Operational Semantics (SOS'05)},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Axelle/SOS_05/report.pdf}},
NUMBER = {1},
PAGES = {169--189},
PUBLISHER = {Elsevier Science B.V.},
SERIES = {Electronic Notes in Theoretical Computer Science},
TITLE = {A Congruence Format for Name-passing Calculi},
VOLUME = {156},
YEAR = {2006}
}
@INCOLLECTION{Deng:05:BookJW,
AUTHOR = {Yuxin Deng and Catuscia Palamidessi and Jun Pang},
BOOKTITLE = {Processes, Terms and Cycles: Steps on the Road to Infinity},
DATE-MODIFIED = {2009-01-02 02:46:39 +0100},
EDITOR = {Aart Middeldorp and Vincent van Oostrom and Femke van Raamsdonk and Roel C. de Vrijer},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Yuxin/BookJW/par.pdf}},
PAGES = {309-337},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Compositional Reasoning for Probabilistic Finite-State Behaviors},
VOLUME = {3838},
YEAR = {2005}
}
@ARTICLE{Palamidessi:05:EATCS,
AUTHOR = {Catuscia Palamidessi and Frank D. Valencia},
BIBDATE = {2005-11-14},
DATE-MODIFIED = {2010-01-09 05:21:19 +0100},
JOURNAL = {Bulletin of the EATCS},
NOTE = {Column: Concurrency. \url{http://www.lix.polytechnique.fr/~catuscia/papers/Frank/EATCS_05/recrep.pdf}},
PAGES = {105--125},
TITLE = {Recursion vs Replication in Process Calculi: Expressiveness},
VOLUME = {87},
YEAR = {2005}
}
@INPROCEEDINGS{Palamidessi:01:CP,
AUTHOR = {Catuscia Palamidessi and Frank D. Valencia},
BOOKTITLE = {Proc. of the 7th International Conference on Principles and Practice of Constraint Programming},
DATE-MODIFIED = {2010-01-09 05:21:39 +0100},
EDITOR = {Toby Walsh},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Ntcc/final.ps}},
PAGES = {302--316},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {A Temporal Concurrent Constraint Programming Calculus},
VOLUME = {2239},
YEAR = {2001}
}
@INPROCEEDINGS{Herescu:00:FOSSACS,
AUTHOR = {Oltea Mihaela Herescu and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of FOSSACS 2000 (Part of ETAPS 2000)},
EDITOR = {Jerzy Tiuryn},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_asy_pi/fossacs.ps}},
PAGES = {146--160},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Computer Science},
TITLE = {Probabilistic Asynchronous $\pi$-Calculus},
VOLUME = {1784},
YEAR = {2000}
}
@INPROCEEDINGS{Herescu:01:PODC,
AUTHOR = {Oltea Mihaela Herescu and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the 20th {ACM} Symposium on Principles of Distributed Computing},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Gen_Phil/podc.ps}},
PAGES = {81--89},
TITLE = {On the Generalized Dining Philosophers Problem},
YEAR = {2001}
}
@INPROCEEDINGS{Gilbert:00:CL,
AUTHOR = {David Gilbert and Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the Conference on Computational Logic - CL 2000},
EDITOR = {John Lloyd et al.},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/CC_Migration/cl.ps}},
PAGES = {463--477},
PUBLISHER = {Springer},
SERIES = {Lecture Notes in Artificial Intelligence},
TITLE = {Concurrent Constraint Programming with Process Mobility},
YEAR = {2000}
}
@INPROCEEDINGS{Palamidessi:02:TCS,
AUTHOR = {Catuscia Palamidessi and Oltea M. Herescu},
BOOKTITLE = {Proceedings of the {\it 2nd IFIP International Conference on Theoretical Computer Science}},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/prob_enc/ifiptcs02.ps}},
PAGES = {537--549},
TITLE = {A randomized encoding of the $\pi$-calculus with mixed choice},
YEAR = {2002}
}
@INPROCEEDINGS{Nielsen:02:PPDP,
ADDRESS = {New York},
AUTHOR = {Mogens Nielsen and Catuscia Palamidessi and Frank D. Valencia},
BOOKTITLE = {Proceedings of the Fourth {ACM} {SIGPLAN} Conference on Principles and Practice of Declarative Programming},
MONTH = OCT # {6--8},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/ppdp02.ps}},
PAGES = {156--167},
PUBLISHER = {ACM Press},
TITLE = {On the expressive power of temporal concurrent constraint programming languages},
YEAR = {2002}
}
@INPROCEEDINGS{Palamidessi:02:PPDP,
ADDRESS = {New York},
AUTHOR = {Catuscia Palamidessi},
BOOKTITLE = {Proceedings of the Fourth {ACM} {SIGPLAN} Conference on Principles and Practice of Declarative Programming ({PPDP}-02)},
NOTE = {Invited talk},
PAGES = {74--75},
PUBLISHER = {ACM Press},
TITLE = {Mobile calculi for distributed programming},
YEAR = {2002}
}
@ARTICLE{Nielsen:02:NJC,
AUTHOR = {M. Nielsen and C. Palamidessi and F. Valencia},
JOURNAL = {Nordic Journal of Computing},
NOTE = {\url {http://www.lix.polytechnique.fr/~catuscia/papers/Ntcc/njc02.ps}},
PAGES = {145--188},
TITLE = {Temporal Concurrent Constraint Programming: Denotation, Logic and Applications},
VOLUME = {9},
YEAR = {2002}
}
@ARTICLE{Palamidessi:03:MSCS,
AUTHOR = {Catuscia Palamidessi},
DATE-MODIFIED = {2008-12-28 17:00:52 +0100},
JOURNAL = {Mathematical Structures in Computer Science},
NOTE = {Available at \url{http://www.lix.polytechnique.fr/~catuscia/papers/pi_calc/mscs.pdf}. A short version of this paper appeared in POPL'97.},
NUMBER = {5},
PAGES = {685--719},
TITLE = {Comparing the Expressive Power of the Synchronous and the Asynchronous pi-calculus},
URL = {http://hal.inria.fr/inria-00201104/en/},
VOLUME = {13},
YEAR = {2003},
BDSK-URL-1 = {http://hal.inria.fr/inria-00201104/en/}
}
@ARTICLE{Mcdowell:03:TCS,
AUTHOR = {Raymond McDowell and Dale Miller and Catuscia Palamidessi},
JOURNAL = {Theoretical Computer Science},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Tran_Sys_in_SC/tcs.ps}},
NUMBER = 3,
PAGES = {411-437},
TITLE = {Encoding transition systems in sequent calculus},
VOLUME = 294,
YEAR = 2003
}
@TECHREPORT{Herescu:04:TR,
AUTHOR = {Oltea M. Herescu and Catuscia Palamidessi},
INSTITUTION = {INRIA Futurs and LIX},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_asy_pi/report.ps}},
TITLE = {Probabilistic Asynchronous $\pi$-calculus},
YEAR = {2004}
}
@TECHREPORT{Bhargava:05:TR,
AUTHOR = {Mohit Bhargava and Catuscia Palamidessi},
INSTITUTION = {INRIA Futurs and LIX},
NOTE = {To appear in the proceedings of CONCUR 2005. Report version available at \url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/report.ps}},
TITLE = {Probabilistic Anonymity},
YEAR = {2005}
}
@TECHREPORT{Chatzikokolakis:05:TR,
AUTHOR = {Konstantinos Chatzikokolakis and Catuscia Palamidessi},
INSTITUTION = {INRIA Futurs and LIX},
NOTE = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/reportPI.pdf}},
TITLE = {Probable Innocence Revisited},
YEAR = {2005}
}
This file has been generated by bibtex2html 1.74