Mobile values, new names, and secure communication, 28th Annual Symposium on Principles of Programming Languages (POPL). ACM, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Abstract, The Journal of Symbolic Logic, vol.417, issue.02, pp.543-574, 1994. ,
DOI : 10.1007/BF01622878
Full Abstraction for PCF, Information and Computation, vol.163, issue.2, pp.409-470, 2000. ,
DOI : 10.1006/inco.2000.2930
Probabilistic and nondeterministic aspects of anonymity, Theoretical Computer Science, vol.410, issue.41, pp.4006-4025, 2009. ,
DOI : 10.1016/j.tcs.2009.06.008
URL : https://hal.archives-ouvertes.fr/inria-00424855
Epistemic Logic for the Applied Pi Calculus, Proceedings of FMOODS, pp.182-197, 2009. ,
DOI : 10.1016/j.entcs.2006.08.026
Bisimulation for Demonic Schedulers, Proc. of the Twelfth International Conference on Foundations of Software Science and Computation Structures, pp.318-332, 2009. ,
DOI : 10.1007/3-540-61770-1_38
Making random choices invisible to the scheduler, Information and Computation, vol.208, issue.6, pp.694-715, 2010. ,
DOI : 10.1016/j.ic.2009.06.006
URL : https://hal.archives-ouvertes.fr/inria-00424860
Anonymity protocols as noisy channels, Inf. and Comp, vol.206, pp.2-4, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00349225
The Anatomy of Innocence, Lecture Notes in Computer Science, vol.2142, pp.188-202, 2001. ,
DOI : 10.1007/3-540-44802-0_14
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap, Proceedings of the 14th International Conference on Logic for Programming Artificial Intelligence and Reasoning (LPAR'07), pp.226-241, 2007. ,
DOI : 10.1007/978-3-540-75560-9_18
Reasoning About Knowledge, 1995. ,
Knowledge and common knowledge in a distributed environment, Proc. of Principles of Distributed Computing, pp.50-61, 1984. ,
On observing nondeterminism and concurrency, Lecture Notes in Computer Science, vol.85, pp.299-309, 1980. ,
DOI : 10.1007/3-540-10003-2_79
Algebraic laws for nondeterminism and concurrency, Journal of the ACM, vol.32, issue.1, pp.137-162, 1985. ,
DOI : 10.1145/2455.2460
Information hiding, anonymity and privacy: a modular approach, Journal of Computer Security, vol.12, issue.1, pp.3-36, 2004. ,
DOI : 10.3233/JCS-2004-12102
On Full Abstraction for PCF: I, II, and III, Information and Computation, vol.163, issue.2, pp.285-408, 2000. ,
DOI : 10.1006/inco.2000.2917
A quantitative doxastic logic for probabilistic processes and applications to information-hiding, Journal of Applied Non-Classical Logics, vol.4790, issue.4, pp.489-516, 2009. ,
DOI : 10.2168/LMCS-1(3:1)2005
URL : https://hal.archives-ouvertes.fr/inria-00445212
Probabilistic knowledge and probabilistic common knowledge, ISMIS 90, pp.1-8, 1990. ,
Semantical analysis of modal logic, Zeitschrift fur Mathematische Logik und Grundlagen der Mathematik 9, pp.67-96, 1963. ,
Distributed Games, FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, pp.338-351, 2003. ,
DOI : 10.1007/978-3-540-24597-1_29
CSP and anonymity, Proc. of ESORICS, pp.198-218, 1996. ,
DOI : 10.1007/3-540-61770-1_38
A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423623, 1948. ,
DOI : 10.1002/j.1538-7305.1948.tb01338.x
Modal correspondence theory Modal Logic and Classical Logic, 1976. ,