| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
Sci. Comput. Program.
|
| 2025 | A | conf |
DISC
|
| 2024 | J | jnl |
Softw. Syst. Model.
|
| 2024 | — | conf |
The Application of Formal Methods
|
| 2024 | — | conf |
FACS
|
| 2024 | B | conf |
NCA
|
| 2024 | — | conf |
SBMF
|
| 2023 | — | conf |
ESORICS (1)
|
| 2023 | — | conf |
Theories of Programming and Formal Methods
|
| 2022 | J | jnl |
Int. J. Softw. Tools Technol. Transf.
|
| 2022 | C | conf |
ICBC
|
| 2022 | J | jnl |
CoRR
|
| 2022 | B | conf |
SEFM
|
| 2022 | J | jnl |
CoRR
|
| 2021 | — | ch. |
Theories of Programming
|
| 2021 | — | conf |
CCSW
|
| 2021 | J | jnl |
CoRR
|
| 2021 | Misc | conf |
ACISP
|
| 2021 | Misc | conf |
SAC
|
| 2021 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | C | conf |
ICISSP
|
| 2020 | J | jnl |
Acta Informatica
|
| 2019 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2019 | J | jnl |
Formal Aspects Comput.
|
| 2019 | J | jnl |
Sci. Comput. Program.
|
| 2019 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
CoRR
|
| 2018 | — | ch. |
Handbook of Model Checking
|
| 2017 | — | conf |
Security Protocols Workshop
|
| 2017 | — | conf |
SBMF
|
| 2017 | C | conf |
CW
|
| 2017 | — | conf |
TACAS (2)
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
Formal Aspects Comput.
|
| 2016 | — | conf |
Security Protocols Workshop
|
| 2016 | — | conf |
Security Protocols Workshop
|
| 2016 | B | conf |
IFM
|
| 2016 | J | jnl |
Int. J. Softw. Tools Technol. Transf.
|
| 2016 | B | conf |
MFPS
|
| 2016 | J | jnl |
Formal Aspects Comput.
|
| 2016 | B | conf |
FM
|
| 2015 | — | conf |
Security Protocols Workshop
|
| 2015 | — | conf |
NFM
|
| 2015 | B | conf |
MFPS
|
| 2014 | C | conf |
ICFEM
|
| 2014 | A | conf |
TACAS
|
| 2013 | J | jnl |
Log. Methods Comput. Sci.
|
| 2013 | J | jnl |
Formal Aspects Comput.
|
| 2013 | J | jnl |
IET Inf. Secur.
|
| 2013 | J | jnl |
Mob. Networks Appl.
|
| 2013 | — | conf |
Theories of Programming and Formal Methods
|
| 2012 | — | conf |
ICITST
|
| 2012 | A* | conf |
CAV
|
| 2012 | J | jnl |
Sci. Comput. Program.
|
| 2012 | A* | conf |
FSE
|
| 2012 | — | conf |
Monterey Workshop
|
| 2012 | — | conf |
ICITST
|
| 2011 | J | jnl |
J. Comput. Secur.
|
| 2011 | — | conf |
ISABEL
|
| 2011 | — | ch. |
Encyclopedia of Parallel Computing
|
| 2011 | C | conf |
WISTP
|
| 2011 | B | conf |
CONCUR
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | — | ch. |
Reflections on the Work of C. A. R. Hoare
|
| 2010 | — | ch. |
Reflections on the Work of C. A. R. Hoare
|
| 2010 | — | book |
|
| 2010 | C | conf |
WISTP
|
| 2010 | B | conf |
ARES
|
| 2010 | — | conf |
IWSEC (Short Papers)
|
| 2010 | A | conf |
SOUPS
|
| 2010 | — | book |
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | B | conf |
ATVA
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
J. Log. Algebraic Methods Program.
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | A | conf |
SOUPS
|
| 2008 | J | jnl |
Inf. Comput.
|
| 2008 | J | jnl |
Fundam. Informaticae
|
| 2008 | C | conf |
ICTAC
|
| 2007 | — | conf |
ICATPN
|
| 2007 | J | jnl |
Formal Aspects Comput.
|
| 2006 | Misc | conf |
SAC
|
| 2006 | C | conf |
ICFEM
|
| 2005 | — | conf |
WLFM@FM
|
| 2005 | — | conf |
APC 25
|
| 2005 | — | conf |
AVoCS
|
| 2005 | B | conf |
MFPS
|
| 2005 | J | jnl |
Formal Aspects Comput.
|
| 2004 | J | jnl |
J. Comput. Secur.
|
| 2004 | — | conf |
25 Years Communicating Sequential Processes
|
| 2004 | J | jnl |
Theory Pract. Log. Program.
|
| 2004 | B | conf |
IFM
|
| 2004 | J | jnl |
Formal Aspects Comput.
|
| 2004 | — | conf |
25 Years Communicating Sequential Processes
|
| 2002 | — | conf |
CSFW
|
| 2000 | A | conf |
ESORICS
|
| 2000 | Misc | conf |
PDPTA
|
| 2000 | — | conf |
MFCSIT
|
| 2000 | — | conf |
SPIN
|
| 1999 | Misc | conf |
PDPTA
|
| 1999 | J | jnl |
J. Comput. Secur.
|
| 1999 | J | jnl |
Theor. Comput. Sci.
|
| 1999 | C | conf |
FORTE
|
| 1999 | — | conf |
CSFW
|
| 1998 | — | conf |
CSFW
|
| 1997 | J | jnl |
IEEE Trans. Software Eng.
|
| 1996 | — | conf |
CSFW
|
| 1996 | J | jnl |
J. Comput. Secur.
|
| 1995 | — | conf |
S&P
|
| 1995 | — | conf |
CSFW
|
| 1995 | J | jnl |
Theor. Comput. Sci.
|
| 1995 | A | conf |
TACAS
|
| 1995 | — | conf |
CSFW
|
| 1994 | A | conf |
ESORICS
|
| 1993 | J | jnl |
J. Log. Comput.
|
| 1992 | J | jnl |
J. Log. Comput.
|
| 1991 | J | jnl |
Distributed Comput.
|
| 1991 | — | conf |
REX Workshop
|
| 1989 | — | conf |
Concurrency: Theory, Language, And Architecture
|
| 1989 | B | conf |
Mathematical Foundations of Programming Semantics
|
| 1988 | J | jnl |
Theor. Comput. Sci.
|
| 1988 | J | jnl |
SIAM J. Comput.
|
| 1988 | J | jnl |
Theor. Comput. Sci.
|
| 1987 | J | jnl |
Commun. ACM
|
| 1987 | B | conf |
MFPS
|
| 1987 | J | jnl |
Inf. Comput.
|
| 1986 | A* | conf |
ICALP
|
| 1985 | J | jnl |
Comput. Vis. Graph. Image Process.
|
| 1985 | J | jnl |
Comput. Vis. Graph. Image Process.
|
| 1985 | — | ed. |
Seminar on Concurrency
|
| 1984 | J | jnl |
J. ACM
|
| 1984 | — | conf |
Seminar on Concurrency
|
| 1984 | — | conf |
Logics and Models of Concurrent Systems
|
| 1984 | — | conf |
Seminar on Concurrency
|
| 1984 | — | conf |
FGCS
|
| 1983 | — | conf |
The Analysis of Concurrent Systems
|
| 1983 | — | conf |
The Analysis of Concurrent Systems
|