@article{MauwWW04, title = {Language-Driven System Design}, author = {Sjouke Mauw and Wouter T. Wiersma and Tim A. C. Willemse}, year = {2004}, doi = {10.1142/S0218194004001828}, url = {http://dx.doi.org/10.1142/S0218194004001828}, tags = {language design, C++, design}, researchr = {https://researchr.org/publication/MauwWW04}, cites = {0}, citedby = {0}, journal = {ijseke}, volume = {14}, number = {6}, pages = {625-663}, } @article{MassacciPM08, title = {Preface}, author = {Fabio Massacci and Frank Piessens and Sjouke Mauw}, year = {2008}, doi = {10.1016/j.scico.2008.09.002}, url = {http://dx.doi.org/10.1016/j.scico.2008.09.002}, researchr = {https://researchr.org/publication/MassacciPM08}, cites = {0}, citedby = {0}, journal = {SCP}, volume = {74}, number = {1-2}, pages = {1}, } @inproceedings{KordyMRS10, title = {Foundations of Attack-Defense Trees}, author = {Barbara Kordy and Sjouke Mauw and Sasa Radomirovic and Patrick Schweitzer}, year = {2010}, doi = {10.1007/978-3-642-19751-2_6}, url = {http://dx.doi.org/10.1007/978-3-642-19751-2_6}, researchr = {https://researchr.org/publication/KordyMRS10}, cites = {0}, citedby = {0}, pages = {80-95}, booktitle = {ifip1-7}, } @inproceedings{JonkerMP09, title = {Measuring Voter-Controlled Privacy}, author = {Hugo L. Jonker and Sjouke Mauw and Jun Pang}, year = {2009}, doi = {10.1109/ARES.2009.81}, url = {http://dx.doi.org/10.1109/ARES.2009.81}, researchr = {https://researchr.org/publication/JonkerMP09}, cites = {0}, citedby = {0}, pages = {289-298}, booktitle = {IEEEares}, } @inproceedings{ZhangZPM09, title = {Game-Based Verification of Multi-Party Contract Signing Protocols}, author = {Ying Zhang and Chenyi Zhang and Jun Pang and Sjouke Mauw}, year = {2009}, doi = {10.1007/978-3-642-12459-4_14}, url = {http://dx.doi.org/10.1007/978-3-642-12459-4_14}, tags = {rule-based, contracts, protocol}, researchr = {https://researchr.org/publication/ZhangZPM09}, cites = {0}, citedby = {0}, pages = {186-200}, booktitle = {ifip1-7}, } @inproceedings{MauwR97, title = {High-level message sequence charts}, author = {Sjouke Mauw and Michel A. Reniers}, year = {1997}, researchr = {https://researchr.org/publication/MauwR97}, cites = {0}, citedby = {0}, pages = {291-306}, booktitle = {sdl}, } @article{MauwVV07, title = {Data Anonymity in the FOO Voting Scheme}, author = {Sjouke Mauw and Jan Verschuren and Erik P. de Vink}, year = {2007}, doi = {10.1016/j.entcs.2006.11.001}, url = {http://dx.doi.org/10.1016/j.entcs.2006.11.001}, tags = {data-flow}, researchr = {https://researchr.org/publication/MauwVV07}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {168}, pages = {5-28}, } @inproceedings{MauwV91, title = {A Proof Assistant for PSF}, author = {Sjouke Mauw and Gert J. Veltink}, year = {1991}, tags = {proof assistant}, researchr = {https://researchr.org/publication/MauwV91}, cites = {0}, citedby = {0}, pages = {158-168}, booktitle = {cav}, } @article{JonkerMP09-0, title = {A formal framework for quantifying voter-controlled privacy}, author = {Hugo L. Jonker and Sjouke Mauw and Jun Pang}, year = {2009}, doi = {10.1016/j.jalgor.2009.02.007}, url = {http://dx.doi.org/10.1016/j.jalgor.2009.02.007}, researchr = {https://researchr.org/publication/JonkerMP09-0}, cites = {0}, citedby = {0}, journal = {jal}, volume = {64}, number = {2-3}, pages = {89-105}, } @inproceedings{MauwRD09, title = {Minimal Message Complexity of Asynchronous Multi-party Contract Signing}, author = {Sjouke Mauw and Sasa Radomirovic and Mohammad Torabi Dashti}, year = {2009}, doi = {10.1109/CSF.2009.15}, url = {http://doi.ieeecomputersociety.org/10.1109/CSF.2009.15}, tags = {contracts}, researchr = {https://researchr.org/publication/MauwRD09}, cites = {0}, citedby = {0}, pages = {13-25}, booktitle = {csfw}, } @inproceedings{BaetenBM01, title = {Specifying internet applications with DiCons}, author = {Jos C. M. Baeten and Harm M. A. van Beek and Sjouke Mauw}, year = {2001}, doi = {10.1145/372202.372466}, url = {http://doi.acm.org/10.1145/372202.372466}, tags = {C++}, researchr = {https://researchr.org/publication/BaetenBM01}, cites = {0}, citedby = {0}, pages = {576-584}, booktitle = {SAC}, } @inproceedings{MauwW89, title = {Specification of the Transit Node in PSF::d::}, author = {Sjouke Mauw and Freek Wiedijk}, year = {1989}, researchr = {https://researchr.org/publication/MauwW89}, cites = {0}, citedby = {0}, pages = {341-361}, booktitle = {am}, } @article{BorstBGM03, title = {Task Allocation in a Multi-Server System}, author = {Sem C. Borst and Onno J. Boxma and Jan Friso Groote and Sjouke Mauw}, year = {2003}, tags = {C++}, researchr = {https://researchr.org/publication/BorstBGM03}, cites = {0}, citedby = {0}, journal = {scheduling}, volume = {6}, number = {5}, pages = {423-436}, } @inproceedings{MauwV89, title = {An Introduction to PSFd}, author = {Sjouke Mauw and Gert J. Veltink}, year = {1989}, researchr = {https://researchr.org/publication/MauwV89}, cites = {0}, citedby = {0}, pages = {272-285}, booktitle = {tapsoft}, } @inproceedings{MauwM94, title = {Regularity of BPA-Systems is Decidable}, author = {Sjouke Mauw and Hans Mulder}, year = {1994}, researchr = {https://researchr.org/publication/MauwM94}, cites = {0}, citedby = {0}, pages = {34-47}, booktitle = {concur}, } @inproceedings{BaetenBMV89, title = {A Process Specification Formalism Based on Static COLD}, author = {Jos C. M. Baeten and Jan A. Bergstra and Sjouke Mauw and Gert J. Veltink}, year = {1989}, tags = {rule-based, C++}, researchr = {https://researchr.org/publication/BaetenBMV89}, cites = {0}, citedby = {0}, pages = {303-335}, booktitle = {am}, } @inproceedings{FeijsGMT02, title = {Test Selection, Trace Distance and Heuristics}, author = {Loe M. G. Feijs and Nicolae Goga and Sjouke Mauw and Jan Tretmans}, year = {2002}, tags = {testing}, researchr = {https://researchr.org/publication/FeijsGMT02}, cites = {0}, citedby = {0}, pages = {267-282}, booktitle = {pts}, } @inproceedings{DeursenMR08, title = {Untraceability of RFID Protocols}, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic}, year = {2008}, doi = {10.1007/978-3-540-79966-5_1}, url = {http://dx.doi.org/10.1007/978-3-540-79966-5_1}, tags = {protocol}, researchr = {https://researchr.org/publication/DeursenMR08}, cites = {0}, citedby = {0}, pages = {1-15}, booktitle = {WISTP}, } @article{Mauw01, title = {Introduction by the guest editor}, author = {Sjouke Mauw}, year = {2001}, researchr = {https://researchr.org/publication/Mauw01}, cites = {0}, citedby = {0}, journal = {Comp. Lang., Syst. \& Struct.}, volume = {27}, number = {1/3}, pages = {1-2}, } @inproceedings{DArgenioM95, title = {Delayed choice for process algebra with abstraction}, author = {Pedro R. D Argenio and Sjouke Mauw}, year = {1995}, tags = {process algebra, algebra, abstraction}, researchr = {https://researchr.org/publication/DArgenioM95}, cites = {0}, citedby = {0}, pages = {501-515}, booktitle = {concur}, } @inproceedings{CremersM03, title = {Operational Semantics of Security Protocols}, author = {Cas J. F. Cremers and Sjouke Mauw}, year = {2003}, doi = {10.1007/11495628_4}, url = {http://dx.doi.org/10.1007/11495628_4}, tags = {semantics, protocol, security, operational semantics}, researchr = {https://researchr.org/publication/CremersM03}, cites = {0}, citedby = {0}, pages = {66-89}, booktitle = {Dagstuhl}, } @article{GrooteHMV01, title = {An algorithm for the asynchronous Write-All problem based on process collision}, author = {Jan Friso Groote and Wim H. Hesselink and Sjouke Mauw and Rogier Vermeulen}, year = {2001}, url = {http://link.springer.de/link/service/journals/00446/bibs/1014002/10140075.htm}, tags = {rule-based}, researchr = {https://researchr.org/publication/GrooteHMV01}, cites = {0}, citedby = {0}, journal = {dc}, volume = {14}, number = {2}, pages = {75-81}, } @inproceedings{JanssenMMFS99, title = {Model Checking for Managers}, author = {Wil Janssen and Radu Mateescu and Sjouke Mauw and Peter Fennema and Petra van der Stappen}, year = {1999}, url = {http://link.springer.de/link/service/series/0558/bibs/1680/16800092.htm}, tags = {model checking, meta-model, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/JanssenMMFS99}, cites = {0}, citedby = {0}, pages = {92-107}, booktitle = {spin}, } @article{CremersMV06, title = {Injective synchronisation: An extension of the authentication hierarchy}, author = {Cas J. F. Cremers and Sjouke Mauw and Erik P. de Vink}, year = {2006}, doi = {10.1016/j.tcs.2006.08.034}, url = {http://dx.doi.org/10.1016/j.tcs.2006.08.034}, researchr = {https://researchr.org/publication/CremersMV06}, cites = {0}, citedby = {0}, journal = {TCS}, volume = {367}, number = {1-2}, pages = {139-161}, } @inproceedings{CremersM04, title = {Checking Secrecy by Means of Partial Order Reduction}, author = {Cas J. F. Cremers and Sjouke Mauw}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3319&spage=171}, researchr = {https://researchr.org/publication/CremersM04}, cites = {0}, citedby = {0}, pages = {171-188}, booktitle = {sam}, } @article{BrunekreefKKM96, title = {Design and Analysis of Dynamic Leader Election Protocols in Broadcast Networks}, author = {Jacob Brunekreef and Joost-Pieter Katoen and Ron Koymans and Sjouke Mauw}, year = {1996}, tags = {protocol, analysis, design}, researchr = {https://researchr.org/publication/BrunekreefKKM96}, cites = {0}, citedby = {0}, journal = {dc}, volume = {9}, number = {4}, pages = {157-171}, } @inproceedings{DeursenMRV09, title = {Secure Ownership and Ownership Transfer in RFID Systems}, author = {Ton van Deursen and Sjouke Mauw and Sasa Radomirovic and Pim Vullers}, year = {2009}, doi = {10.1007/978-3-642-04444-1_39}, url = {http://dx.doi.org/10.1007/978-3-642-04444-1_39}, researchr = {https://researchr.org/publication/DeursenMRV09}, cites = {0}, citedby = {0}, pages = {637-654}, booktitle = {esorics}, } @article{BergstraMW91, title = {Uniform Algebraic Specifications of Finite Sets with Equality}, author = {Jan A. Bergstra and Sjouke Mauw and Freek Wiedijk}, year = {1991}, tags = {algebraic specification, algebra}, researchr = {https://researchr.org/publication/BergstraMW91}, cites = {0}, citedby = {0}, journal = {ijfcs}, volume = {2}, number = {1}, pages = {43-65}, } @article{MauwR94, title = {An Algebraic Semantics of Basic Message Sequence Charts}, author = {Sjouke Mauw and Michel A. Reniers}, year = {1994}, tags = {semantics, algebra}, researchr = {https://researchr.org/publication/MauwR94}, cites = {0}, citedby = {0}, journal = {cj}, volume = {37}, number = {4}, pages = {269-278}, } @inproceedings{MauwVV04, title = {A Formalization of Anonymity and Onion Routing}, author = {Sjouke Mauw and Jan Verschuren and Erik P. de Vink}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3193&spage=109}, tags = {routing}, researchr = {https://researchr.org/publication/MauwVV04}, cites = {0}, citedby = {0}, pages = {109-124}, booktitle = {esorics}, } @inproceedings{Mauw87, title = {An Algebraic Specification of Process Algebra, Including Two Examples}, author = {Sjouke Mauw}, year = {1987}, tags = {process algebra, algebraic specification, algebra}, researchr = {https://researchr.org/publication/Mauw87}, cites = {0}, citedby = {0}, pages = {507-554}, booktitle = {am}, } @inproceedings{EngelsMR97, title = {A Hierarchy of Communication Models for Message Sequence Charts}, author = {André Engels and Sjouke Mauw and Michel A. Reniers}, year = {1997}, researchr = {https://researchr.org/publication/EngelsMR97}, cites = {0}, citedby = {0}, pages = {75-90}, booktitle = {forte}, } @article{AndovaCGMMR08, title = {A framework for compositional verification of security protocols}, author = {Suzana Andova and Cas J. F. Cremers and Kristian Gjøsteen and Sjouke Mauw and Stig Fr. Mjølsnes and Sasa Radomirovic}, year = {2008}, doi = {10.1016/j.ic.2007.07.002}, url = {http://dx.doi.org/10.1016/j.ic.2007.07.002}, tags = {protocol, composition, security}, researchr = {https://researchr.org/publication/AndovaCGMMR08}, cites = {0}, citedby = {0}, journal = {iandc}, volume = {206}, number = {2-4}, pages = {425-459}, } @inproceedings{VrankenGMF00, title = {IC Design Validation Using Message Sequence Charts}, author = {Harald P. E. Vranken and Tomás Garciá Garciá and Sjouke Mauw and Loe M. G. Feijs}, year = {2000}, url = {http://csdl.computer.org/comp/proceedings/euromicro/2000/0780/01/07811220abs.htm}, tags = {design}, researchr = {https://researchr.org/publication/VrankenGMF00}, cites = {0}, citedby = {0}, pages = {1122}, booktitle = {euromicro}, } @inproceedings{MauwR96, title = {Refinement in Interworkings}, author = {Sjouke Mauw and Michel A. Reniers}, year = {1996}, tags = {refinement}, researchr = {https://researchr.org/publication/MauwR96}, cites = {0}, citedby = {0}, pages = {671-686}, booktitle = {concur}, } @inproceedings{BelinfanteFVTGFMH99, title = {Formal Test Automation: A Simple Experiment}, author = {Axel Belinfante and Jan Feenstra and René G. de Vries and Jan Tretmans and Nicolae Goga and Loe M. G. Feijs and Sjouke Mauw and Lex Heerink}, year = {1999}, tags = {testing}, researchr = {https://researchr.org/publication/BelinfanteFVTGFMH99}, cites = {0}, citedby = {0}, pages = {179-196}, booktitle = {pts}, } @inproceedings{AlcaldeM09, title = {An Algebra for Trust Dilution and Trust Fusion}, author = {Baptiste Alcalde and Sjouke Mauw}, year = {2009}, doi = {10.1007/978-3-642-12459-4_2}, url = {http://dx.doi.org/10.1007/978-3-642-12459-4_2}, tags = { algebra}, researchr = {https://researchr.org/publication/AlcaldeM09}, cites = {0}, citedby = {0}, pages = {4-20}, booktitle = {ifip1-7}, } @inproceedings{MauwWW02, title = {Language Driven System Design}, author = {Sjouke Mauw and Wouter T. Wiersma and Tim A. C. Willemse}, year = {2002}, url = {http://dlib2.computer.org/conferen/hicss/1435/pdf/14350280b.pdf?}, tags = {language design, C++, design}, researchr = {https://researchr.org/publication/MauwWW02}, cites = {0}, citedby = {0}, pages = {280}, booktitle = {hicss}, } @inproceedings{EngelsFM97, title = {Test Generation for Intelligent Networks Using Model Checking}, author = {André Engels and Loe M. G. Feijs and Sjouke Mauw}, year = {1997}, tags = {model checking, meta-model, testing, Meta-Environment}, researchr = {https://researchr.org/publication/EngelsFM97}, cites = {0}, citedby = {0}, pages = {384-398}, booktitle = {TACAS}, } @article{MauwR99, title = {Operational Semantics for MSC 96}, author = {Sjouke Mauw and Michel A. Reniers}, year = {1999}, doi = {10.1016/S1389-1286(99)00060-2}, url = {http://dx.doi.org/10.1016/S1389-1286(99)00060-2}, tags = {semantics, operational semantics}, researchr = {https://researchr.org/publication/MauwR99}, cites = {0}, citedby = {0}, journal = {cn}, volume = {31}, number = {17}, pages = {1785-1799}, } @article{MauwIC06, title = {Preface}, author = {Sjouke Mauw and Valérie Issarny and Cas J. F. Cremers}, year = {2006}, doi = {10.1016/j.entcs.2005.09.045}, url = {http://dx.doi.org/10.1016/j.entcs.2005.09.045}, researchr = {https://researchr.org/publication/MauwIC06}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {157}, number = {3}, pages = {1-2}, } @article{BlomGMS05, title = {Analysing the BKE-security Protocol with ::::µ::::CRL}, author = {Stefan Blom and Jan Friso Groote and Sjouke Mauw and Alexander Serebrenik}, year = {2005}, doi = {10.1016/j.entcs.2005.09.005}, url = {http://dx.doi.org/10.1016/j.entcs.2005.09.005}, tags = {protocol, security}, researchr = {https://researchr.org/publication/BlomGMS05}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {139}, number = {1}, pages = {49-90}, } @article{Mauw96, title = {The Formalization of Message Sequence Charts}, author = {Sjouke Mauw}, year = {1996}, doi = {10.1016/0169-7552(95)00123-9}, url = {http://dx.doi.org/10.1016/0169-7552(95)00123-9}, researchr = {https://researchr.org/publication/Mauw96}, cites = {0}, citedby = {0}, journal = {cn}, volume = {28}, number = {12}, pages = {1643-1657}, } @inproceedings{BeekM03, title = {Automatic Conformance Testing of Internet Applications}, author = {Harm M. A. van Beek and Sjouke Mauw}, year = {2003}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2931&spage=205}, tags = {testing}, researchr = {https://researchr.org/publication/BeekM03}, cites = {0}, citedby = {0}, pages = {205-222}, booktitle = {fates}, } @article{CeelenMR08, title = {Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks}, author = {Pieter Ceelen and Sjouke Mauw and Sasa Radomirovic}, year = {2008}, doi = {10.1016/j.entcs.2007.12.015}, url = {http://dx.doi.org/10.1016/j.entcs.2007.12.015}, researchr = {https://researchr.org/publication/CeelenMR08}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {197}, number = {2}, pages = {31-43}, } @article{VoorhoeveM01, title = {Impossible futures and determinism}, author = {Marc Voorhoeve and Sjouke Mauw}, year = {2001}, doi = {10.1016/S0020-0190(01)00217-4}, url = {http://dx.doi.org/10.1016/S0020-0190(01)00217-4}, researchr = {https://researchr.org/publication/VoorhoeveM01}, cites = {0}, citedby = {0}, journal = {ipl}, volume = {80}, number = {1}, pages = {51-58}, } @inproceedings{EngelsFM99, title = {MSC and data: dynamic variables}, author = {André Engels and Loe M. G. Feijs and Sjouke Mauw}, year = {1999}, tags = {data-flow}, researchr = {https://researchr.org/publication/EngelsFM99}, cites = {0}, citedby = {0}, pages = {105}, booktitle = {sdl}, } @inproceedings{CederquistDM07, title = {A Certified Email Protocol Using Key Chains}, author = {Jan Cederquist and Muhammad Torabi Dashti and Sjouke Mauw}, year = {2007}, doi = {10.1109/AINAW.2007.10}, url = {http://doi.ieeecomputersociety.org/10.1109/AINAW.2007.10}, tags = {protocol}, researchr = {https://researchr.org/publication/CederquistDM07}, cites = {0}, citedby = {0}, pages = {525-530}, booktitle = {aina}, } @article{CremersMV05, title = {A Syntactic Criterion for Injectivity of Authentication Protocols}, author = {Cas J. F. Cremers and Sjouke Mauw and Erik P. de Vink}, year = {2005}, doi = {10.1016/j.entcs.2005.06.006}, url = {http://dx.doi.org/10.1016/j.entcs.2005.06.006}, tags = {protocol}, researchr = {https://researchr.org/publication/CremersMV05}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {135}, number = {1}, pages = {23-38}, } @inproceedings{BaetenBM01:0, title = {An MSC Based Representation of DiCons}, author = {Jos C. M. Baeten and Harm M. A. van Beek and Sjouke Mauw}, year = {2001}, url = {http://link.springer.de/link/service/series/0558/bibs/2078/20780328.htm}, tags = {rule-based, C++}, researchr = {https://researchr.org/publication/BaetenBM01%3A0}, cites = {0}, citedby = {0}, pages = {328-347}, booktitle = {sdl}, } @inproceedings{MauwO05, title = {Foundations of Attack Trees}, author = {Sjouke Mauw and Martijn Oostdijk}, year = {2005}, doi = {10.1007/11734727_17}, url = {http://dx.doi.org/10.1007/11734727_17}, researchr = {https://researchr.org/publication/MauwO05}, cites = {0}, citedby = {0}, pages = {186-198}, booktitle = {icisc}, } @inproceedings{NairGMM05, title = {XML Security in the Next Generation Optical Disc Context}, author = {Gopakumar Nair and Ajeesh Gopalakrishnan and Sjouke Mauw and Erik Moll}, year = {2005}, doi = {10.1007/11552338_15}, url = {http://dx.doi.org/10.1007/11552338_15}, tags = {XML, XML Schema, security, context-aware}, researchr = {https://researchr.org/publication/NairGMM05}, cites = {0}, citedby = {0}, pages = {217-233}, booktitle = {sdmw}, } @inproceedings{MauwVB06, title = {Forward Secure Communication in Wireless Sensor Networks}, author = {Sjouke Mauw and Ivo van Vessem and Bert Bos}, year = {2006}, doi = {10.1007/11734666_4}, url = {http://dx.doi.org/10.1007/11734666_4}, tags = {wireless sensor networks}, researchr = {https://researchr.org/publication/MauwVB06}, cites = {0}, citedby = {0}, pages = {32-42}, booktitle = {spc}, } @inproceedings{FeijsGM00, title = {Probabilities In The Torx Test Derivation Algorithm}, author = {Loe M. G. Feijs and Nicolae Goga and Sjouke Mauw}, year = {2000}, tags = {testing}, researchr = {https://researchr.org/publication/FeijsGM00}, cites = {0}, citedby = {0}, pages = {173-188}, booktitle = {sam}, } @inproceedings{KordyMMS10, title = {Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent}, author = {Barbara Kordy and Sjouke Mauw and Matthijs Melissen and Patrick Schweitzer}, year = {2010}, doi = {10.1007/978-3-642-17197-0_17}, url = {http://dx.doi.org/10.1007/978-3-642-17197-0_17}, researchr = {https://researchr.org/publication/KordyMMS10}, cites = {0}, citedby = {0}, pages = {245-256}, booktitle = {GameSec}, } @article{EngelsMR02, title = {A hierarchy of communication models for Message Sequence Charts}, author = {André Engels and Sjouke Mauw and Michel A. Reniers}, year = {2002}, doi = {10.1016/S0167-6423(02)00022-9}, url = {http://dx.doi.org/10.1016/S0167-6423(02)00022-9}, researchr = {https://researchr.org/publication/EngelsMR02}, cites = {0}, citedby = {0}, journal = {SCP}, volume = {44}, number = {3}, pages = {253-292}, } @inproceedings{BaetenM94, title = {Delayed choice: an operator for joining Message Sequence Charts}, author = {Jos C. M. Baeten and Sjouke Mauw}, year = {1994}, tags = {C++}, researchr = {https://researchr.org/publication/BaetenM94}, cites = {0}, citedby = {0}, pages = {340-354}, booktitle = {forte}, } @proceedings{concur:1999, title = {CONCUR 99: Concurrency Theory, 10th International Conference, Eindhoven, The Netherlands, August 24-27, 1999, Proceedings}, year = {1999}, researchr = {https://researchr.org/publication/concur%3A1999}, cites = {0}, citedby = {0}, booktitle = {CONCUR 99: Concurrency Theory, 10th International Conference, Eindhoven, The Netherlands, August 24-27, 1999, Proceedings}, conference = {concur}, editor = {Jos C. M. Baeten and Sjouke Mauw}, volume = {1664}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-66425-4}, } @proceedings{europki:2008, title = {Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings}, year = {2008}, researchr = {https://researchr.org/publication/europki%3A2008}, cites = {0}, citedby = {0}, booktitle = {Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings}, conference = {europki}, editor = {Stig Fr. Mjølsnes and Sjouke Mauw and Sokratis K. Katsikas}, volume = {5057}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-69484-7}, }