| Publication | Date of Publication | Type |
|---|
| Utility-preserving privacy mechanisms for counting queries | 2024-02-23 | Paper |
| CONCUR Test-Of-Time Award 2021 (Invited Paper) | 2023-08-21 | Paper |
| Linear constraint systems as high-level nets | 2023-06-28 | Paper |
| Confluence in concurrent constraint programming | 2022-08-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5089267 | 2022-07-18 | Paper |
| Establishing the price of privacy in federated data trading | 2022-07-13 | Paper |
| PRIVIC: A privacy-preserving method for incremental collection of location data | 2022-06-21 | Paper |
| An incentive mechanism for trading personal data in data markets | 2022-03-31 | Paper |
| Proving correctness of Constraint Logic Programs with dynamic scheduling | 2022-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4992520 | 2021-06-09 | Paper |
| Slicing concurrent constraint programs | 2021-05-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4986260 | 2021-04-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5858725 | 2021-04-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5858727 | 2021-04-14 | Paper |
| Enhanced models for privacy and utility in continuous-time diffusion networks | 2019-12-12 | Paper |
| Leakage and protocol composition in a game-theoretic perspective | 2019-09-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4608688 | 2018-03-21 | Paper |
| Abstract interpretation of temporal concurrent constraint programs | 2017-11-09 | Paper |
| Information leakage games | 2017-10-27 | Paper |
| Slicing concurrent constraint programs | 2017-10-13 | Paper |
| On the Compositionality of Quantitative Information Flow | 2017-10-12 | Paper |
| Quantifying leakage in the presence of unreliable sources of information | 2017-06-30 | Paper |
| Compositional methods for information-hiding | 2017-04-04 | Paper |
| Preserving differential privacy under finite-precision semantics | 2017-02-06 | Paper |
| Quantitative Notions of Leakage for One-try Attacks | 2016-05-10 | Paper |
| On the generalized dining philosophers problem | 2016-03-04 | Paper |
| Location Privacy via Geo-Indistinguishability | 2016-02-25 | Paper |
| A Declarative View of Signaling Pathways | 2016-01-08 | Paper |
| Epistemic Strategies and Games on Concurrent Processes | 2015-09-17 | Paper |
| Generalized Bisimulation Metrics | 2014-09-15 | Paper |
| Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms | 2014-06-02 | Paper |
| Fair Π | 2013-12-13 | Paper |
| Weak Probabilistic Anonymity | 2013-12-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2852344 | 2013-10-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2852065 | 2013-10-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2852102 | 2013-10-07 | Paper |
| A Differentially Private Mechanism of Optimal Utility for a Region of Priors | 2013-08-06 | Paper |
| Spatial and Epistemic Modalities in Constraint-Based Process Calculi | 2012-09-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3224080 | 2012-03-29 | Paper |
| Quantitative Information Flow and Applications to Differential Privacy | 2011-09-16 | Paper |
| Information hiding in probabilistic concurrent systems | 2011-07-07 | Paper |
| On the Relation between Differential Privacy and Quantitative Information Flow | 2011-07-07 | Paper |
| Deriving Labels and Bisimilarity for Concurrent Constraint Programming | 2011-05-19 | Paper |
| Entropy and Attack Models in Information Flow | 2010-10-27 | Paper |
| Safe Equivalences for Security Properties | 2010-10-27 | Paper |
| Information Flow in Interactive Systems | 2010-08-31 | Paper |
| Concurrent and Reactive Constraint Programming | 2010-07-20 | Paper |
| Making random choices invisible to the scheduler | 2010-06-25 | Paper |
| A quantitative doxastic logic for probabilistic processes and applications to information-hiding | 2010-03-10 | Paper |
| Probabilistic and nondeterministic aspects of anonymity | 2009-09-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3396569 | 2009-09-19 | Paper |
| Explicit fairness in testing semantics | 2009-06-30 | Paper |
| Anonymity Protocols as Noisy Channels | 2009-03-05 | Paper |
| Declarative Diagnosis of Temporal Concurrent Constraint Programs | 2009-03-05 | Paper |
| Making Random Choices Invisible to the Scheduler | 2008-09-18 | Paper |
| On Recursion, Replication and Scope Mechanisms in Process Calculi | 2008-09-17 | Paper |
| On the Asynchronous Nature of the Asynchronous π-Calculus | 2008-06-19 | Paper |
| A Probabilistic Applied Pi–Calculus | 2008-05-15 | Paper |
| Anonymity protocols as noisy channels | 2008-04-16 | Paper |
| Compositional Methods for Information-Hiding | 2008-04-11 | Paper |
| A Declarative Framework for Security: Secure Concurrent Constraint Programming | 2008-03-11 | Paper |
| Separation of synchronous and asynchronous communication via testing | 2007-12-19 | Paper |
| Tutorial on separation results in process calculi via leader election problems | 2007-12-18 | Paper |
| A framework for analyzing probabilistic protocols and its application to the partial secrets exchange | 2007-12-14 | Paper |
| Separation Results Via Leader Election Problems | 2007-09-11 | Paper |
| Axiomatizations for probabilistic finite-state behaviors | 2007-04-13 | Paper |
| Probable innocence revisited | 2007-01-09 | Paper |
| Processes, Terms and Cycles: Steps on the Road to Infinity | 2006-11-13 | Paper |
| Trustworthy Global Computing | 2006-11-01 | Paper |
| CONCUR 2005 – Concurrency Theory | 2006-11-01 | Paper |
| Foundations of Software Science and Computational Structures | 2005-11-10 | Paper |
| A randomized encoding of the \(\pi\)-calculus with mixed choice | 2005-06-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4475640 | 2004-08-09 | Paper |
| Encoding transition systems in sequent calculus | 2003-07-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3150207 | 2002-12-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4537501 | 2002-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2767080 | 2002-01-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2736349 | 2001-08-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2723928 | 2001-07-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4508299 | 2000-10-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4222839 | 1998-12-14 | Paper |
| Weak relative pseudo-complements of closure operators | 1998-11-24 | Paper |
| Confluence in concurrent constraint programming | 1998-07-22 | Paper |
| Constraint logic programming with dynamic scheduling: A semantics based on closure operators | 1997-09-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4353603 | 1997-09-10 | Paper |
| An algebraic perspective of constraint logic programming | 1997-04-21 | Paper |
| Nondeterminism and infinite computations in constraint programming | 1997-02-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4878772 | 1996-05-14 | Paper |
| Negation as instantiation | 1996-04-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4858578 | 1995-12-17 | Paper |
| A declarative approach for first-order built-in's of Prolog | 1994-07-04 | Paper |
| Embedding as a tool for language comparison | 1994-03-10 | Paper |
| A model-theoretic reconstruction of the operational semantics of logic programs | 1993-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4038706 | 1993-05-18 | Paper |
| From failure to success: Comparing a denotational and a declarative semantics for Horn clause logic | 1992-09-27 | Paper |
| Semantic models for concurrent logic languages | 1992-06-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3975139 | 1992-06-26 | Paper |
| Kernel-LEAF: A logic plus functional language | 1991-01-01 | Paper |
| Comments on “logic programming with equations” | 1991-01-01 | Paper |
| Declarative modeling of the operational behavior of logic languages | 1989-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4205425 | 1989-01-01 | Paper |
| Contributions to the semantics of logic perpetual processes | 1988-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3742694 | 1986-01-01 | Paper |
| A synchronization logic: Axiomatics and formal semantics of generalized horn clauses | 1984-01-01 | Paper |