Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Crafa, Silvia
and
Rossi, Sabina
2005.
Trustworthy Global Computing.
Vol. 3705,
Issue. ,
p.
2.
Bugliesi, Michele
and
Giunti, Marco
2005.
Trustworthy Global Computing.
Vol. 3705,
Issue. ,
p.
19.
Hennessy, Matthew
Rathke, Julian
and
Yoshida, Nobuko
2005.
safeDpi: a language for controlling mobile code.
Acta Informatica,
Vol. 42,
Issue. 4-5,
p.
227.
Francalanza, Adrian
and
Hennessy, Matthew
2005.
CONCUR 2005 – Concurrency Theory.
Vol. 3653,
Issue. ,
p.
368.
Francalanza, Adrian
and
Hennessy, Matthew
2006.
Foundations of Software Science and Computation Structures.
Vol. 3921,
Issue. ,
p.
16.
Deng, Yuxin
and
Sangiorgi, Davide
2006.
Towards an algebraic theory of typed mobile processes.
Theoretical Computer Science,
Vol. 350,
Issue. 2-3,
p.
188.
Crafa, Silvia
and
Rossi, Sabina
2006.
P-congruences as non-interference for the pi-calculus.
p.
13.
Bundgaard, Mikkel
and
Sassone, Vladimiro
2006.
Typed polyadic pi-calculus in bigraphs.
p.
1.
Francalanza, Adrian
and
Hennessy, Matthew
2007.
A theory for observational fault tolerance.
The Journal of Logic and Algebraic Programming,
Vol. 73,
Issue. 1-2,
p.
22.
Bugliesi, Michele
Macedonio, Damiano
and
Rossi, Sabina
2007.
Advances in Computer Science – ASIAN 2007. Computer and Network Security.
Vol. 4846,
Issue. ,
p.
282.
Bugliesi, Michele
and
Giunti, Marco
2007.
Secure implementations of typed channel abstractions.
p.
251.
Pous, Damien
2007.
Programming Languages and Systems.
Vol. 4807,
Issue. ,
p.
351.
Crafa, Silvia
and
Rossi, Sabina
2007.
Controlling information release in the π-calculus.
Information and Computation,
Vol. 205,
Issue. 8,
p.
1235.
Briais, Sébastien
and
Nestmann, Uwe
2007.
Open bisimulation, revisited.
Theoretical Computer Science,
Vol. 386,
Issue. 3,
p.
236.
Bugliesi, Michele
and
Giunti, Marco
2007.
Secure implementations of typed channel abstractions.
ACM SIGPLAN Notices,
Vol. 42,
Issue. 1,
p.
251.
Dezani-Ciancaglini, Mariangiola
Ghilezan, Silvia
Pantović, Jovanka
and
Varacca, Daniele
2008.
Security types for dynamic web data.
Theoretical Computer Science,
Vol. 402,
Issue. 2-3,
p.
156.
Francalanza, Adrian
and
Hennessy, Matthew
2008.
A theory of system behaviour in the presence of node and link failure.
Information and Computation,
Vol. 206,
Issue. 6,
p.
711.
Hennessy, Matthew
and
Gaur, Manish
2009.
Counting the Cost in the Picalculus (Extended Abstract).
Electronic Notes in Theoretical Computer Science,
Vol. 229,
Issue. 3,
p.
117.
Bugliesi, Michele
Calzavara, Stefano
and
Macedonio, Damiano
2010.
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security.
Vol. 6186,
Issue. ,
p.
23.
Cristescu, Ioana
and
Hirschkoff, Daniel
2011.
Termination in a Pi-calculus with Subtyping.
Electronic Proceedings in Theoretical Computer Science,
Vol. 64,
Issue. ,
p.
44.