People

Papers & Software

Seminar

Stages



INRIA

LIX

CNRS
Papers

Papers published in 2008

[1] Jesús Aranda, Jorge A. Pérez, Camilo Rueda, and Frank D. Valencia. Stochastic behavior and explicit discrete time in concurrent constraint programming. In Maria Garcia de la Banda and Enrico Pontelli, editors, 24th International Conference on Logic Programming, volume 5366 of Lecture Notes in Computer Science, pages 682-686. Springer, 2008.
[ bib ]
[2] Romain Beauxis. Probabilistic and concurrent models for security. In Maria Garcia de la Banda and Enrico Pontelli, editors, 24th International Conference on Logic Programming, volume 5366 of Lecture Notes in Computer Science, pages 801-802. Springer, 2008.
[ bib ]
[3] Romain Beauxis, Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. Formal approaches to information-hiding (tutorial). In Gilles Barthe and Cédric Fournet, editors, Proceedings of the Third Symposium on Trustworthy Global Computing (TGC 2007), volume 4912 of Lecture Notes in Computer Science, pages 347-362. Springer, 2008.
[ bib | http | .pdf ]
[4] Romain Beauxis, Catuscia Palamidessi, and Frank D. Valencia. On the asynchronous nature of the asynchronous pi-calculus. In Pierpaolo Degano, Rocco De Nicola, and José Meseguer, editors, Concurrency, Graphs and Models, volume 5065 of Lecture Notes in Computer Science, pages 473-492. Springer, 2008.
[ bib | http | .pdf ]
[5] Christelle Braun, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. Compositional methods for information-hiding. In Roberto Amadio, editor, Proceedings of FOSSACS, volume 4962 of Lecture Notes in Computer Science, pages 443-457. Springer, 2008.
[ bib | http | .pdf ]
[6] Diletta Cacciagrano, Flavio Corradini, Jesús Aranda, and Frank D. Valencia. Linearity, persistence and testing semantics in the asynchronous pi-calculus. In Roberto Amadio and Thomas Hildenbrandt, editors, Proc. of 14th International Workshop on Expressiveness of Concurrency, (EXPRESS'07), volume 194 of ENTCS, pages 59-84. Elsevier, 2008. http://www.brics.dk/~fvalenci/papers/pers-test.pdf.
[ bib ]
[7] Konstantinos Chatzikokolakis and Keye Martin. A monotonicity principle for information theory. In Andrej Bauer and Michael Mislove, editors, Proceedings of the Twenty-fourth Conference on the Mathematical Foundations of Programming Semantics, volume 218 of Electronic Notes in Theoretical Computer Science, pages 111-129. Elsevier B.V., 2008.
[ bib ]
[8] Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. Anonymity protocols as noisy channels. Inf. and Comp., 206(2-4):378-401, 2008.
[ bib | http ]
[9] Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. On the bayes risk in information-hiding protocols. Journal of Computer Security, 16(5):531-571, 2008.
[ bib | http | .pdf ]
[10] Alberto Credi, Marco Garavelli, Cosimo Laneve, Sylvain Pradalier, Serena Silvi, and Gianluigi Zavattaro. nanok: A calculus for the modeling and simulation of nano devices. Theoretical Computer Science, 408(1):17-30, 2008.
[ bib ]
[11] Simon Kramer. Cryptographic protocol logic: Satisfaction for (timed) dolev-yao cryptography. Journal of Logic and Algebraic Programming, 77(1-2):60 - 91, 2008.
[ bib | http ]
[12] Simon Kramer. Reducing provability to knowledge in multi-agent systems. In Proceedings of the LiCS-affiliated Intuitionistic Modal Logics and Applications Workshop, Electronic Notes in Theoretical Computer Science. Elsevier B.V., 2008. To appear. Extended version submitted to Information and Computation.
[ bib ]
[13] Simon Kramer and Julian C. Bradfield. A general definition of malware. In Proceedings of the Workshop on the Theory of Computer Viruses, 2008. Extended version submitted to the Journal of Computer Virology.
[ bib | www: ]
[14] Jean Krivine, Robin Milner, and Angelo Troina. Stochastic bigraphs. In Andrej Bauer and Michael Mislove, editors, Proceedings of the 24th Conference on the Mathematical Foundations of Programming Semantics (MFPS XXIV), volume 218 of Electronic Notes in Theoretical Computer Science, pages 73-96. Elsevier B.V., 2008.
[ bib ]
[15] Carlos Olarte and Frank D. Valencia. The expressivity of universal timed ccp: undecidability of monadic fltl and closure operators for security. In Sergio Antoy and Elvira Albert, editors, Proceedings of the 10th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, pages 8-19, 2008.
[ bib | http ]
[16] Carlos Olarte and Frank D. Valencia. Universal concurrent constraint programing: Symbolic semantics and applications to security. In Proceedings of the 23rd ACM Symposium on Applied Computing (SAC), pages 145-150. ACM, 2008. http://www.lix.polytechnique.fr/~colarte/colarte/Publications_files/sac08.pdf.
[ bib | http | .pdf ]
[17] Angelo Troina, Jean Goubault-Larrecq, and Catuscia Palamidessi. A probabilistic applied pi-calculus. Technical report, LIX, Ecole Polytechnique, 2008.
[ bib ]

This file has been generated by bibtex2html 1.74


Back


Page maintainer: Catuscia Palamidessi