Author of the publication

When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus.

, , and . Theor. Comput. Sci., (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity., , and . ICTAC, volume 12819 of Lecture Notes in Computer Science, page 235-255. Springer, (2021)The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement., , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 90-110. Springer, (2018)Theories of life and computation: Special issue on the occasion of the 65th birthday of Professor Gabriel Ciobanu., , and . Theor. Comput. Sci., (2022)A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic., , and . Log. Methods Comput. Sci., (2021)A Graphical Proof Theory of Logical Time., , , and . FSCD, volume 228 of LIPIcs, page 22:1-22:25. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Diamonds for Security: A Non-Interleaving Operational Semantics for the Applied Pi-Calculus., , and . CONCUR, volume 243 of LIPIcs, page 30:1-30:26. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)The Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic.. FSCD, volume 131 of LIPIcs, page 23:1-23:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Is Eve nearby? Analysing protocols under the distant-attacker assumption., , , , and . CSF, page 17-32. IEEE, (2022)A logical account of subtyping for session types., and . J. Log. Algebraic Methods Program., (2024)Extracting Threshold Conceptual Structures from Web Documents., , and . ICCS, volume 8577 of Lecture Notes in Computer Science, page 130-144. Springer, (2014)