Items where Subject is "Q Science > QA Mathematics (inc Computing science) > QA 9 Formal systems, logics"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creator's name | Item Type | Date | No Grouping
Number of items at this level: 29.

2015

Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2015) Composing security protocols: from confidentiality to privacy. In: 4th International Conference on Principles of Security and Trust (POST'15), April 2015, London, UK. (In press) (Full text available)
[img]
Preview
[img]
Preview

Cheval, Vincent and Cortier, Véronique (2015) Timing attacks: symbolic framework and proof techniques. In: 4th International Conference on Principles of Security and Trust (POST'15), April 2015, London, UK. (In press) (Full text available)
[img]
Preview
[img]
Preview

2014

Bocchi, Laura and Yang, Weizhen and Yoshida, Nobuko (2014) Timed Multiparty Session Types. In: Concurrency Theory (CONCUR), September 2-5, 2014, Rome, Italy. (Full text available)
[img]
Preview

Boiten, Eerke (2014) It’s possible to write flaw-free software, so why don’t we? . The Conversation UK Internet only. (Full text available)
[img]

Cheval, Vincent (2014) APTE: An Algorithm for Proving Trace Equivalence. In: Ábrahám, Erika and Havelund, Klaus, eds. Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science, 8413. Springer-Verlag Berlin, Grenoble, France pp. 587-592. ISBN 978-3-642-54861-1. (Full text available)
[img]
Preview

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2014) A procedure for deciding symbolic equivalence between sets of constraint systems. Information and Computation . ISSN 0890-5401. (Submitted) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Cheval, Vincent and Delaune, Stéphanie and Ryan, Mark (2014) Tests for Establishing Security Properties. In: Maffei, Matteo and Tuosto, Emilio, eds. Trustworthy Global Computing. Lecture Notes in Computer Science, 8902. Springer-Verlag Berlin pp. 82-96. ISBN 978-3-662-45916-4. (Full text available)
[img]
Preview

Delaney, Aidan and Stapleton, Gem and Taylor, John and Thompson, Simon (2014) A normal form for spider diagrams of order. Journal of Visual Languages and Computing, 25 (6). pp. 935-944. ISSN 1045-926X. (In press) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Su, Li and Gomez, Rodolfo and Bowman, Howard (2014) Analysing neurobiological models using communicating automata. Formal Aspects of Computing, 26 (6). pp. 1169-1204. ISSN 0934-5043. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided)
[img]

Thompson, Simon and Delaney, Aidan and Stapleton, Gem and Taylor, John (2014) A Normal Form for Spider Diagrams of Order. In: 2014 International Workshop on Visual Languages and Computing, 27-29 August 2014. (Full text available)
[img]
Preview

2013

Bocchi, Laura and Demangeon, Romain (2013) Embedding Session Types in HML. In: Programming Language Approaches to Concurrency and Communication-cEntric Software (PLACES), 23rd March, 2013, Rome, Italy. (Full text available)
[img]
Preview

Cheval, Vincent and Blanchet, Bruno (2013) Proving More Observational Equivalences with ProVerif. In: Basin, David and Mitchell, John C., eds. Principles of Security and Trust. Lecture Notes in Computer Science, 7796. Springer-Verlag Berlin, Roma, Italy pp. 226-246. ISBN 9783642368295. (Full text available)
[img]
Preview
[img]
Preview

Cheval, Vincent and Cortier, Véronique and Delaune, Stéphanie (2013) Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492 . pp. 1-39. ISSN 03043975. (Full text available)
[img]
Preview

Cheval, Vincent and Cortier, Véronique and Plet, Antoine (2013) Lengths May Break Privacy – Or How to Check for Equivalences with Length. In: Shargina, Natasha and Veith, Helmut, eds. Computer Aided Verification. Lecture Notes in Computer Science, 8044. Springer-Verlag Berlin, St Petersburg, Russia pp. 708-723. ISBN 978-3-642-39798-1. (Full text available)
[img]
Preview
[img]
Preview

Kahrs, Stefan (2013) Infinitary rewriting: closure operators, equivalences and models. Acta Informatica, 50 (2). pp. 123-156. ISSN 0001-5903. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Landes, Jürgen and Williamson, Jon (2013) Objective Bayesianism and the maximum entropy principle. Entropy, 15 (9). pp. 3528-3591. ISSN 1099-4300. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Stapleton, Gem and Howse, John and Thompson, Simon and Taylor, John and Chapman, Peter (2013) On the Completeness of Spider Diagrams Augmented with Constants. In: Moktefi, Amirouche and Shin, Sun-Joo, eds. Visual Reasoning with Diagrams. Studies in Universal Logic . Birkhauser, pp. 101-133. ISBN 9783034805995. (Full text available)
[img]
Preview

2012

Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2012) Verifying Privacy-Type Properties in a Modular Way. In: Cortier, Véronique and Zdancewic, Steve, eds. 2012 IEEE 25th Computer Security Foundations Symposium. IEEE pp. 95-109. ISBN 978-1-4673-1918-8. (Full text available)
[img]
Preview
[img]
Preview

Barrett, Edd and King, Andy (2012) Range and Set Abstraction using SAT. Electronic Notes in Theoretical Computer Science, 267 (1). pp. 93-107. ISSN 978-3-642-32468-0. (Full text available)
[img]
Preview

Cheval, Vincent (2012) Automatic verification of cryptographic protocols: privacy-type properties. Doctor of Philosophy (PhD) thesis, ENS-Cachan. (Full text available)
[img]
Preview

Morgan, Byron J. T. and Besbeas, Panagiotis (2012) Kalman filter initialization for integrated population modelling. Journal of the Royal Statistical Society: Series C (Applied Statistics), 61 (1). pp. 151-162. ISSN 0035-9254. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

2011

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2011) Trace Equivalence Decision: Negative Tests and Non-determinism. In: Chen, Yan and Danezis, George and Shmatikov, Vitaly, eds. Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. ACM Press pp. 321-330. ISBN 978-1-4503-0948-6. (Full text available)
[img]
Preview

Wheeler, Gregory and Williamson, Jon (2011) Evidential Probability and Objective Bayesian Epistemology. In: Bandyopadhyay, Prasanta S. and Forster, Malcolm R., eds. Philosophy of statistics. Handbook of the Philosophy of Science, 7 . Elsevier Science & Technology/ North Holland, Oxford, pp. 307-331. ISBN 9780444518620. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

2010

Cheval, Vincent and Comon-Lundh, Hubert and Delaune, Stéphanie (2010) Automating Security Analysis: Symbolic Equivalence of Constraint Systems. In: Giesl, Jürgen and Hähnle, Reiner, eds. Automated Reasoning. Lecture Notes in Computer Science, 6173. Springer-Verlag Berlin, Edinburgh, Scotland, UK pp. 412-426. ISBN 978-3-642-14202-4. (Full text available)
[img]
Preview

2009

Avanaki, Mohammad R. N. and Hojjatoleslami, Ali (2009) Speckle Reduction with Attenuation Compensation for Skin OCT Images Enhancement. In: MIUA, 14th-15th July 2009, Kingston University, London. (Unpublished) (Full text available)
[img]
Preview

2006

Buchberger, Bruno and Craciun, Adrian and Jebelean, Tudor and Kovacs, Laura and Temur, Kutsia and Koji, Nakagawa and Piroi, Florina and Popov, Nikolaj and Robu, Judit and Rosenkranz, Markus and Windsteiger, Wolfgang (2006) Theorema: Towards computer-aided mathematical theory exploration. Journal of Applied Logic, 4 (4). pp. 470-504. ISSN 1570-8683. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Fischer, Michael D. (2006) Cultural Agents: A Community of Minds. In: Engineering Societies in the Agents World VI. Springer, pp. 259-274. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Windsteiger, Wolfgang and Buchberger, Bruno and Rosenkranz, Markus (2006) Theorema. In: Wiedijk, Freek, ed. The Seventeen Provers of the World. Lecture Notes in Artificial Intelligence, 3600 . Springer, pp. 96-107. ISBN 9783540307044. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

1994

Fischer, Michael D. (1994) Applications in Computing for Social Anthropologists. ASA Research Methods . Routledge, London, 248 pp. ISBN 9780203451083. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

This list was generated on Thu Jul 30 21:57:11 2015 BST.