Andre Scedrov April 3, 2017 Department of Mathematics, University of Pennsylvania 209 South 33rd Street, Philadelphia, PA 19104–6395, U.S.A. Web: http://www.cis.upenn.edu/~scedrov E-mail: [email protected] Telephone: +1 (215) 898–5983 Personal • Born August 1, 1955 in Zagreb, Croatia. United States Citizen since 1987. Married, with one child. Dissertation • Ph.D. Mathematics, State University of New York at Buffalo, 1981. Academic Positions • 2013 – 2018: Chair, Department of Mathematics, University of Pennsylvania • 1992 – present: Professor of Mathematics, University of Pennsylvania • 1988 – 1992: Associate Professor of Mathematics, University of Pennsylvania • 1988 – present: Secondary Appointment in Computer and Information Science, University of Pennsylvania • 1982 – 1988: Assistant Professor of Mathematics, University of Pennsylvania • 1981 – 1982: T.H. Hildebrandt Research Assistant Professor of Mathematics, University of Michigan, Ann Arbor Honors • 2013: Visiting Scientist, Dynasty Foundation, Moscow, Russia • 1997 – 1998: Japan Society for the Promotion of Science Senior Fellowship • 1993 – 1994: American Mathematical Society Centennial Research Fellowship Selected Visiting Positions • 2017 – 2019: Leading Research Fellow, International Laboratory for Intelligent Systems and Structural Analysis, Faculty of Computer Science, National Research University Higher School of Economics, Moscow, Russia (30 days per year) • 2014 – 2016: Leading Research Fellow, International Laboratory for Intelligent Systems and Structural Analysis, Faculty of Computer Science, National Research University Higher School of Economics, Moscow, Russia (30 days per year) • 2013 June: Faculty of Mathematics, National Research University Higher School of Economics, Moscow, Russia 1 Recent Invited Lectures at International Conferences • 2016 December: Dale Fest!60th , University Paris 7, Paris, France • 2016 September: 5th Conference on Logic and Applications, Inter-University Center, Dubrovnik, Croatia • 2016 May: Workshop on Computer Security, Logic, and Programming Languages In Honor of John Mitchell’s 60th Birthday, Stanford University, California, USA • 2016 March: 9th Winter School in Economics, Mathematics, and Computer Science “Baikal Readings”, Irkutsk, Russia • 2016 January: Opening Lecture. Symposium on Logical Foundations of Computer Science, LFCS 2016, Deerfield Beach, Florida, USA • 2015 December: Problems in Theoretical Computer Science, Joint Conference of Computer Science Faculty of Higher School of Economics and Laboratory of Mathematical Logic of the St. Petersburg Department of the Steklov Institute of Mathematics, Moscow, Russia • 2015 October: Opening Lecture. National Institute of Informatics Shonan Meeting on Logic and Verification Methods in Security and Privacy, Shonan Village Center, Japan • 2013 June: 2nd Franco-Russian Workshop on Algorithms, Complexity and Applications, Moscow, Russia • 2012 May: The Constructive in Logic and Applications: A Conference in Honor of the 60th Birthday of Sergei Artemov, New York, New York, USA • 2011 May: Cryptography Minisymposium, 3rd biennial Canadian Discrete and Algorithmic Mathematics Conference (CanaDAM), Victoria, Canada. • 2011 March: Colloquium on Computer Security, École Normale Supérieure Cachan, France. Graduate Students Supervised R. Blute (Ph.D. 1991, currently at Univ. of Ottawa), M. Alimohamed (Ph.D. 1994, deceased), P. Selinger (Ph.D. 1997, currently at Dalhousie Univ.), R. Chadha (Ph.D. 2003, Univ. of Missouri), R. Sharykin (M.A. 2004), G. Bana (Ph.D. 2004, INRIA, France), J. Strong (M.A. 2005), B. Mooney (M.A. 2006), P. Adão (Ph.D. IST Lisbon 2006), A. Mater (M.A. 2007), J.-K. Tsay (Ph.D. 2008, Deutsche Telekom/T-Systems), P. Rowe (Ph.D. 2009, MITRE Corp.), T. Ban Kirigin (Ph.D. 2011 Univ. of Zagreb, co-advised with Z. Šikić, currently at Univ. of Rijeka), A. Wang (CIS Ph.D. 2013, co-advised with B.T. Loo, currently at Temple), and E. Fagerholm (Ph.D. 2015, Google) Postdoctoral Researchers Supervised F. Lamarche (currently at INRIA-Lorraine), J. Lipton (Wesleyan Univ.), M. Bonet (Univ. Politécnica de Cataluña), B. Howard (Bridgewater), K. St.John (CUNY Lehman), S. Guerrini (Univ. di Roma 1), H. Hu (Cal State Monterey Bay), E. Haghverdi (Indiana), P. Mateus (IST Lisbon), B. Knutsson (KTH Stockholm), G. Bana (IST Lisbon), N. Ackerman (UC Berkeley), M. Lieberman (Kalamazoo), V. Nigam (Univ. Federal da Paraı́ba), M. Alvim (Univ. Federal de Minas Gerais), and Stepan L. Kuznetsov (Steklov Math. Institute) Undergraduate Research Supervised C. Walstad, Class of ’06, J. Rao, Class of ’08. Recent Professional Activities • Editor: Journal of Computer Security, IOS Press, 2004 – 2015 • Program Co-Chair: Tools and Methods of Program Analysis, TMPA-2017, Moscow, Russia 2 • Conference Chair: 27th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2012, Dubrovnik, Croatia; 18th Workshop on Logic, Language, Information and Computation, WoLLIC 2011, Philadelphia, Pennsylvania, USA • Steering Committee Member: Symposium on Logical Foundations of Computer Science (LFCS); Workshop on Foundations of Computer Security (FCS) • Board of Directors Member: Conference on Logic and Applications (LAP), Inter-University Center, Dubrovnik, Croatia • Advisory Board Member: Glasnik Matematički, Croatian Mathematical Society and Department of Mathematics, University of Zagreb • Organizing Committee Member: Workshop on Computer Security, Logic, and Programming Languages In Honor of John Mitchell’s 60th Birthday, Stanford University, California, USA, 2016 • Program Committee Member: The 13th International Conference on Concept Lattices and Their Applications, CLA 2016, Moscow, Russia; Fourth International Workshop on Linearity (Linearity 2016), Porto, Portugal; Mathematical Foundations of Programming Semantics XXXII, MFPS 2016, Pittsburgh, Pennsylvania, USA; The 10th International Computer Science Symposium in Russia, CSR 2015, Listvyanka, Russia; 26th International Conference on Rewriting Techniques and Applications, RTA 2015, Warsaw, Poland; 26th IEEE Computer Security Foundations Symposium, CSF 2013, New Orleans, Louisiana, USA; 31st Annual International Cryptology Conference, CRYPTO 2011, Santa Barbara, California, USA Andre Scedrov’s Publications 1. (with M.I. Kanovich, T. Ban Kirigin, V. Nigam, C.L. Talcott, and R. Perovic), A Rewriting Framework and Logic for Activities Subject to Regulations. Mathematical Structures in Computer Science 27(3) (2017) 332-375. Extended abstract under the title “A Rewriting Framework for Activities Subject to Regulations” in: A. Tiwari, ed., 23-rd International Conference on Rewriting Techniques and Applications (RTA 2012). Nagoya, Japan, May 28 -June 2, 2012. Leibniz International Proceedings in Informatics Volume 15, Schloss Dagstuhl - Leibniz Center for Informatics, 2012, pp. 305 - 322. 2. (with G. Barthe, E. Fagerholm, D. Fiore, B. Schmidt, and M. Tibouchi), Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. IET Information Security 10(6) (2016) 358-371. Extended abstract in: J. Katz, ed., IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2015), Gaithersburg, Maryland, USA, March 30 - April 1, 2015, Springer Lecture Notes in Computer Science, Volume 9020, 2015, pp. 355 - 376. 3. (with M. Kanovich, T. Ban Kirigin, V. Nigam, and C. Talcott), Timed Multiset Rewriting and the Verification of Time-Sensitive Distributed Systems. In: M. Fränzle and N. Markey, eds., Formal Modeling and Analysis of Timed Systems, 14th International Conference, FORMATS 2016, Quebec, QC, Canada, August 24-26, 2016, Springer Lecture Notes in Computer Science, Volume 9884, 2016, pp. 228 - 244. Technical report on arXiv:1606.07886. 4. (with Max Kanovich and Stepan Kuznetsov), Undecidability of the Lambek calculus with a relevant modality. In: A. Foret et al., eds., Formal Grammar, 20th and 21st International Conferences, FG 2015, Barcelona, Spain, August 2015, Revised Selected Papers. FG 2016, Bozen, Italy, August 2016, Proceedings, Springer Lecture Notes in Computer Science, Volume 9804, 2016, pp. 240 - 256. Preliminary version on arXiv:1601.06303. 5. (with Max Kanovich and Stepan Kuznetsov), On Lambek’s Restriction in the Presence of Exponential Modalities. In: S. Artemov and A. Nerode, eds., Logical Foundations of Computer Science (LFCS 2016), Deerfield Beach, Florida, U.S.A., January 2016, Springer Lecture Notes in Computer Science, Volume 9537, 2015, pp. 146-158. 3 6. (with M. Kanovich, T. Ban Kirigin, V. Nigam, and C. Talcott), Discrete vs. Dense Times in the Verification of Cyber-Physical Security Protocols. In: R. Focardi and A. Myers, eds., 4th Conference on Principles of Security and Trust (POST 2015), London, UK, April 2015, Springer Lecture Notes in Computer Science, Volume 9036, 2015, pp. 259 - 279. 7. (with G. Barthe, E. Fagerholm, D. Fiore, J.C. Mitchell and B. Schmidt), Automated Analysis of Cryptographic Assumptions in Generic Group Models. In: J. Garay and R. Gennaro, eds., 34th International Cryptology Conference (CRYPTO 2014), Santa Barbara, California, USA, August 2014, Springer Lecture Notes in Computer Science, Volume 8616, 2014, pp. 95 - 112. 8. (with M. Kanovich, T. Ban Kirigin, and V. Nigam), Bounded Memory Protocols. Computer Languages, Systems and Structures 40(3-4) (2014) 137 - 154. Revised version of the extended abstract under the title “Bounded Memory Protocols and Progressing Collaborative Systems” in: J. Crampton and S. Jajodia, eds., The 18-th European Symposium on Research in Computer Security (ESORICS 2013), Egham, UK, September 2013, Springer Lecture Notes in Computer Science, Volume 8134, 2013, pp. 309 - 326. 9. (with M. Kanovich, T. Ban Kirigin, and V. Nigam), Bounded Memory Dolev-Yao Adversaries in Collaborative Systems. Information and Computation 238 (2014) 233 - 261. Extended abstract in: P. Degano et al., eds., The 7-th International Workshop on Formal Aspects of Security & Trust (FAST2010), Pisa, Italy, September 2010, Springer Lecture Notes in Computer Science, Volume 6561, 2011, pp. 18-33. 10. (with A. Wang, A.J.T. Gurney, X. Han, J. Cao, B. Thau Loo, and C. Talcott), A Reduction-based Approach Towards Scaling Up Formal Analysis of Internet Configurations. In: G. Bianchi, Y. Fang, and X. Shen, eds., 33rd Annual IEEE International Conference on Computer Communications (INFOCOM 2014), Toronto, Canada, April 27 - May 2, 2014, IEEE, 2014, pp. 637 - 645. 11. (with M.S. Alvim and F.B. Schneider), When Not All Bits Are Equal: Worth-Based Information Flow. In: M. Abadi and S. Kremer, eds., 3rd Conference on Principles of Security and Trust (POST 2014), Grenoble, France, April 2014, Springer Lecture Notes in Computer Science, Volume 8414, 2014, pp. 120 - 139. 12. (with A. Wang, S. Moarref, B. Thau Loo, and U. Topcu), Automated Synthesis of Reactive Controllers for Software-Defined Networks. In: 3rd International Workshop on Rigorous Protocol Engineering (WRiPE 2013), 21st IEEE International Conference on Network Protocols (ICNP 2013), Göttingen, Germany, October 2013, IEEE Xplore Digital Library 2013. DOI: 10.1109/ICNP.2013.6733666. 13. (with A. Wang, L. Jia, W. Zhou, Y. Ren, B. Thau Loo, J. Rexford, V. Nigam, and C. Talcott), FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing. IEEE/ACM Transactions on Networking 20(6) (2012) 1814-1827. 14. (with V. Nigam, L. Jia, and B. Thau Loo), Maintaining Distributed Logic Programs Incrementally. Computer Languages, Systems and Structures 38 (2012) 158-180. Extended abstract in: M. Hanus, ed., 13-th International ACM SIGPLAN Symposium on Principles and Practice of Declarative Programming (PPDP 2011). Odense, Denmark, July 2011. ACM Press, 2011, pp. 125-136. 15. (with A. Wang, A.J.T. Gurney, X. Han, J. Cao, C.L. Talcott, and B. Thau Loo), Reduction-based analysis of BGP systems with BGPVerif. Demo in: L. Eggert, J. Ott, V.N. Padmanabhan, G. Varghese, eds., ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. Helsinki, Finland, August 2012. ACM Press, 2012, pp. 89-90. 16. (with A. Wang, C.L. Talcott, A.J.T. Gurney, and B. Thau Loo), Brief Announcement: A Calculus of Policy-Based Routing Systems. In: A. Panconesi, ed., 31-st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2012). Madeira, Portugal, July 2012. ACM Press, 2012, pp. 343 - 344. 17. (with A. Wang, C.L. Talcott, A.J.T. Gurney, and B. Thau Loo), Reduction-based Formal Analysis BGP Instances. In: C. Flanagan and B. Koenig, eds., 18-th International Conference on Tools and 4 Algorithms for the Construction and Analysis of Systems (TACAS 2012). Tallinn, Estonia, March 2012. Springer Lecture Notes in Computer Science, Volume 7214, 2012, pp. 283 - 298. 18. (with P.E. Lam, J.C. Mitchell, S. Sundaram, and F. Wang), Declarative privacy policy: Finite models and attribute-based encryption. In: C.C. Yang, ed., 2-nd ACM SIGHIT International Health Informatics Symposium (IHI 2012). Miami, Florida, USA, January 2012. ACM Digital Library, 2012, pp. 323-332. 19. (with V. Nigam, T. Ban Kirigin, C. Talcott, M. Kanovich, and R. Perovic), Towards an Automated Assistant for Clinical Investigations. In: C.C. Yang, ed., 2-nd ACM SIGHIT International Health Informatics Symposium (IHI 2012). Miami, Florida, USA, January 2012. ACM Digital Library, 2012, pp. 773-778. 20. (with A. Wang, C.L. Talcott, L. Jia, and B. Thau Loo), Analyzing BGP Instances in Maude. In: R. Bruni and J. Dingel, eds., Formal Techniques for Distributed Systems. Joint 13-th IFIP International Conference on Formal Methods for Open Object-based Distributed Systems and 31-st IFIP International Conference on FORmal TEchniques for Networked and Distributed Systems (FMOODS & FORTE 2011), Reykjavik, Iceland, June 2011, Proceedings. Springer Lecture Notes in Computer Science, Volume 6722, 2011, pp. 334 - 348. 21. (with M. Backes, I. Cervesato, A. Jaggard, and J.-K. Tsay), Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. International Journal of Information Security 10(2) (2011) 107133. Extended abstract in: D. Gollmann, J. Meier, and A. Sabelfeld, eds., Computer Security ESORICS 2006, 11-th European Symposium On Research In Computer Security, Hamburg, Germany, September 2006, Springer Lecture Notes in Computer Science, Volume 4189, 2006, pp. 362 - 383. 22. (with M. Kanovich and P. Rowe), Collaborative Planning with Confidentiality. Journal of Automated Reasoning 46(3-4) (2011) 389-421. Extended abstract under the title “Collaborative Planning with Privacy” in: A. Sabelfeld, ed., 20-th IEEE Computer Security Foundations Symposium (CSF), Venice, Italy, July 2007, IEEE Computer Society Press, 2007, pp. 265-278. 23. (with M. Kanovich and P. Rowe), Policy Compliance in Collaborative Systems. In: J. Mitchell, ed., 22-nd IEEE Computer Security Foundations Symposium (CSF), Port Jefferson, New York, USA, July 2009, IEEE Computer Society Press, 2009, pp. 218-233. 24. (with I. Cervesato), Relating State-Based and Process-Based Concurrency through Linear Logic. Information and Computation 207(10) (2009) 1044-1077. Extended abstract in: R. de Queiroz and G. Mints, eds., 13-th Workshop on Logic, Language, Information and Computation, Stanford, California, July 2006, Electronic Notes in Theoretical Computer Science, Volume 165, Elsevier, 2006, pp. 145 176. 25. (with P. Adão, G. Bana, and J. Herzog), Soundness and completeness of formal encryption: The cases of key-cycles and partial information leakage. Journal of Computer Security 17(5) (2009) 737797. Extended abstract under the title “Soundness of formal encryption in the presence of key-cycles” in: S. De Capitani di Vimercati, P. Syverson, and D. Gollmann, eds., 10-th European Symposium on Research in Computer Security (ESORICS 2005), Milan, Italy, September 2005, Springer Lecture Notes in Computer Science, Volume 3679, 2005, pp. 374-396. 26. (with J.C. Mitchell, P. Rowe, and A. Roy), Analysis of EAP-GPSK Authentication Protocol. In: S. Bellovin and R. Gennaro, eds., 6-th International Conference on Applied Cryptography and Network Security (ACNS’08), New York, June 2008, Springer Lecture Notes in Computer Science, Volume 5037, 2008, pp. 309-327. 27. (with B. Blanchet, A.D. Jaggard, and J.-K. Tsay), Computationally Sound Mechanized Proofs for Basic and Public-Key Kerberos. In: V. Gligor and M. Abe, eds., ACM Symposium on Information, Computer and Communications Security (ASIACCS ’08), Tokyo, Japan, March 2008, ACM Press, 2008, pp. 87-99. 5 28. (with M. Backes and B. Pfitzmann), Key-dependent Message Security under Active Attacks - BRSIM/UCSoundness of Dolev-Yao-style Encryption with Key Cycles. Journal of Computer Security 16(5) (2008) 497-530. Extended abstract under the title “Key-dependent Message Security under Active Attacks – BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles” in: A. Sabelfeld, ed., 20-th IEEE Computer Security Foundations Symposium (CSF), Venice, Italy, July 2007, IEEE Computer Society Press, 2007, pp. 112-124. 29. (with I. Cervesato, A. Jaggard, J.-K. Tsay, and C. Walstad), Breaking and Fixing Public-Key Kerberos. Information and Computation 206(2-4) (2008) 402-424. Extended abstract in: M. Okada, I. Satoh, eds., Advances in Computer Science - ASIAN 2006, Tokyo, Japan, December 2006, Springer Lecture Notes in Computer Science, Volume 4435, 2008. 30. The work of Dean Rosenzweig: A Tribute to a Scientist and an Innovator. In: Foundations of Software Engineering. Proc. 6-th Joint Meeting of the European Software Engineering Conference and the 14-th ACM SIGSOFT Symposium on Foundations of Software Engineering (ESEC/FSE 2007), Dubrovnik, Croatia, September 2007, ACM Press, 2007, pp. 371-374. 31. (with F. Butler, I. Cervesato, A. Jaggard, and C. Walstad), Formal Analysis of Kerberos 5. Theoretical Computer Science 367(1-2) (2006) 57-87. 32. (with A. Datta, A. Derek, J.C. Mitchell, and A. Ramanathan), Games and the Impossibility of Realizable Ideal Functionality. In: S. Halevi and T. Rabin, eds., 3-rd Theory of Cryptography Conference (TCC 2006), New York, NY, March 2006, Springer Lecture Notes in Computer Science, Volume 3876, 2006, pp. 360-379. 33. (with J.C. Mitchell, A. Ramanathan, and V. Teague), A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theoretical Computer Science 353 (2006) 118-164. 34. (with P. Adão and G. Bana), Computational and Information-Theoretic Soundness and Completeness of Formal Encryption. in: J. Guttman, ed., 18-th IEEE Computer Security Foundations Workshop, CSFW, Aix-en-Provence, France, June, 2005, IEEE Computer Society Press, 2005, pp. 170-184. 35. (with I. Cervesato, A. Jaggard, and C. Walstad), Specifying Kerberos 5 Cross-Realm Authentication. In: C. Meadows, ed., Proceedings of the 2005 workshop on Issues in the theory of security (WITS’05), Long Beach, California, January 2005. ACM Digital Library, ACM Press, New York, 2005, pp. 12-26. 36. (with F. Butler, I. Cervesato, and A. Jaggard), Verifying Confidentiality and Authentication in Kerberos 5. In: K. Futatsugi, F. Mizoguchi, N. Yonezaki, eds., Software Security - Theories and Systems Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003. Springer Lecture Notes in Computer Science, Vol. 3233, 2004, pp. 1-24. 37. (with R. Chadha and S. Kremer), Formal analysis of multi-party contract signing. Journal of Automated Reasoning 36(1-2), 2006, pp. 39-83. Preliminary report in: R. Focardi, ed., 17-th IEEE Computer Security Foundations Workshop, CSFW, Pacific Grove, California, June, 2004, IEEE Computer Society Press, 2004, pp. 266-279. 38. (with A. Ramanathan, J. Mitchell, and V. Teague), Probabilistic bisimulation and equivalence for security analysis of network protocols. In: I. Walukiewicz, ed., Foundations of Software Science and Computation Structures, 7-th International Conference, FOSSACS 2004, Barcelona, Spain, March, 2004. Springer Lecture Notes in Computer Science, Vol. 2987, 2004, pp. 468-483. 39. (with P. Mateus and J.C. Mitchell), Composition of cryptographic protocols in a probabilistic polynomialtime process calculus. In: R. Amadio and D. Lugiez, eds., CONCUR 2003 – Concurrency Theory, 14-th International Conference, Marseille, France, September, 2003. Springer Lecture Notes in Computer Science, Vol. 2761, 2003, pp. 327-349. 40. (with R. Chadha, J.C. Mitchell, and V. Shmatikov), Contract signing, optimism, and advantage. Journal of Logic and Algebraic Programming, Special issue on Modelling and Verification of Cryptographic Protocols, R.M. Amadio, ed., 64(2), 2005, pp. 189-218. Extended abstract in: R. Amadio and 6 D. Lugiez, eds., CONCUR 2003 – Concurrency Theory, 14-th International Conference, Marseille, France, September, 2003. Springer Lecture Notes in Computer Science, Vol. 2761, 2003, pp. 366-382. 41. (with I. Cervesato, N.A. Durgin, P.D. Lincoln, and J.C. Mitchell), A revised comparison between strand spaces and multiset rewriting for security protocol analysis. Journal of Computer Security 13(2), 2005, pp. 265-316. Extended abstract in: M. Okada, B. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, eds., Software Security - Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers, Springer Lecture Notes in Computer Science, Vol. 2609, 2003, pp. 356-383. 42. (with N. Durgin, P. Lincoln, and J. Mitchell), Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security 12, 2004, pp. 247-311. 43. (with F. Butler, I. Cervesato, and A. Jaggard), A formal analysis of some properties of Kerberos 5 using MSR. In: S. Schneider, ed., 15-th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June, 2002, IEEE Computer Society Press, 2002, pp. 175-190. 44. (with R. Chadha and M.I. Kanovich), Inductive methods and contract-signing protocols. In: P. Samarati, ed., 8-th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, November, 2001, ACM Press, 2001, pp. 176-185. 45. (with J. Mitchell, A. Ramanathan, and V. Teague), A probabilistic polynomial-time calculus for analysis of cryptographic protocols (Preliminary report). In: S. Brookes, M. Mislove, eds., 17-th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, May, 2001, Electronic Notes in Theoretical Computer Science, Vol. 45, 2001. [31 pp.] 46. (with P.D. Lincoln, J.C. Mitchell, and M. Mitchell), Probabilistic polynomial-time equivalence and security protocols. In: J.M. Wing, J. Woodcock, J. Davies (Eds.), FM’99 - Formal Methods World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 1999. Proceedings, Volume I, Springer Lecture Notes in Computer Science, vol. 1708, 1999, pp. 776-793. 47. (with I. Cervesato, N.A. Durgin, P.D. Lincoln, and J.C. Mitchell), A meta-notation for protocol analysis. In: P. Syverson, ed., 12-th IEEE Computer Security Foundations Workshop, Mordano, Italy, June, 1999, IEEE Computer Society Press, 1999, pp. 55-69. 48. (with P.D. Lincoln, J.C. Mitchell, and M. Mitchell), A probabilistic poly-time framework for protocol analysis. In: M. Reiter, ed., 5-th ACM Conference on Computer and Communications Security, San Francisco, California, November, 1998, ACM Press, 1998, pp. 112-121. 49. (with J.C. Mitchell and M. Mitchell), A linguistic characterization of bounded oracle computation and probabilistic polynomial time. In: 39-th Annual IEEE Symposium on Foundations of Computer Science (FOCS), Palo Alto, California, November, 1998. IEEE Computer Society Press, 1998, pp. 725-733. 50. (with M.I. Kanovich and M. Okada), Specifying real-time finite-state systems in linear logic. In: 2-nd International Workshop on Constraint Programming for Time-Critical Applications and Multi-Agent Systems (COTIC), Nice, France, September, 1998. Electronic Notes in Theoretical Computer Science, Vol. 16 Issue 1, 1998. [15 pp.] 51. (with M.I. Kanovich and M. Okada), Phase semantics for light linear logic. Theoretical Computer Science 294(3), 2003, pp. 525-549. Extended abstract in: “Proc. 13-th Annual Conference on the Mathematical Foundations of Programming Semantics, Pittsburgh, Pennsylvania, March, 1997”, Electronic Notes in Theoretical Computer Science, Volume 6, 1997. 52. (with P.D. Lincoln and J.C. Mitchell), Optimization Complexity of Linear Logic Proof Games. Theoretical Computer Science 227 (1999) pp. 299 – 331. Extended abstract under the title “The complexity of local proof search in linear logic” in: “Proceedings Linear Logic ’96, Tokyo Meeting”, Electronic Notes in Theoretical Computer Science, Volume 3, 1996. [10 pp.] 7 53. (with P.D. Lincoln and J.C. Mitchell), Linear Logic Proof Games and Optimization. Bulletin of Symbolic Logic 2 (1996) pp. 322–338. 54. (with Y. Lafont), The Undecidability of Second Order Multiplicative Linear Logic. Information and Computation 125 (1996) pp. 46–51. 55. (with P.D. Lincoln and N. Shankar), Decision Problems for Second Order Linear Logic. In: “Logic and Scientific Methods”, ed. by M.L. Dalla Chiara et al., Kluwer Academic Publishers, 1997, pp. 127–143. Extended abstract in: Proc. 10th Annual IEEE Symposium on Logic in Computer Science, San Diego, California, June, 1995, IEEE Computer Society Press, 1995, pp. 476–485. 56. (with P.D. Lincoln and J.C. Mitchell), Stochastic Interaction and Linear Logic. In: “Advances in Linear Logic”, ed. by J.-Y. Girard, Y. Lafont, and L. Regnier, London Mathematical Society Lecture Notes Series, Volume 222, Cambridge University Press, 1995, pp. 147–166. 57. Linear Logic and Computation: A Survey. In: “Proof and Computation”, ed. by H. Schwichtenberg, NATO Advanced Science Institutes, Series F, Volume 139, Springer-Verlag, Berlin, 1995, pp. 379–395. 58. (with P.D. Lincoln), First Order Linear Logic Without Modalities is NEXPTIME-Hard. Theoretical Computer Science 135 (1994) pp. 139–154. 59. (with L. Cardelli, J.C. Mitchell, and S. Martini), An Extension of System F with Subtyping. Information and Computation 109 (1994) pp. 4–56. Extended abstract in: Theoretical Aspects of Computer Software, ed. by T. Ito and A.R. Meyer, Springer LNCS 526, 1991, pp. 750–770. 60. (with J.C. Mitchell), Notes on Sconing and Relators. In: Computer Science Logic ’92, Selected Papers, ed. by E. Börger et al., Springer LNCS 702, 1993, pp. 352-378. 61. A Brief Guide to Linear Logic. In: “Current Trends in Theoretical Computer Science”, ed. by G. Rozenberg and A. Salomaa, World Scientific Publishing Co., 1993, pp. 377-394. 62. (with P.D. Lincoln and N. Shankar), Linearizing Intuitionistic Implication. Annals Pure Appl. Logic 60 (1993) pp. 151–177. Extended abstract in: Proc. 6th Annual IEEE Symposium on Logic in Computer Science, Amsterdam, July, 1991, IEEE Computer Society Press, 1991, pp. 51–62. 63. (with A. Blass), Grothendieck Topoi Representing Models of Set Theory. Annals Pure Appl. Logic 57 (1992) pp. 1–26. 64. (with P.D. Lincoln, J.C. Mitchell, and N. Shankar), Decision Problems for Propositional Linear Logic. Annals Pure Appl. Logic 56 (1992) pp. 239–311, Special Volume dedicated to the memory of John Myhill. Extended abstract in: Proc. 31st Annual IEEE Symposium on Foundations of Computer Science, Volume 2, St. Louis, Missouri, October, 1990, IEEE Computer Society Press, 1990, pp. 662–671. 65. (with J.-Y. Girard and P.J. Scott), Bounded Linear Logic: A Modular Approach to Polynomial Time Computability. Theoretical Computer Science 97 (1992) pp. 1–66. Extended abstract in: “Feasible Mathematics, Proc. Math. Sciences Institute Workshop, Cornell Univ., June, 1989”, ed. by S.R. Buss and P.J. Scott, Birkhäuser, Boston, 1990, pp. 195–209. 66. (with J.-Y. Girard and P.J. Scott), Normal Forms and Cut-Free Proofs as Natural Transformations. In: “Logic From Computer Science, Mathematical Sciences Research Institute Workshop, Berkeley, November, 1989”, ed. by Y.N. Moschovakis, MSRI Publications, Vol. 21, Springer-Verlag, 1992, pp. 217–241. 67. (with V. Breazu-Tannen, T. Coquand, and C.A. Gunter), Inheritance as Implicit Coercion. Information and Computation 93 (1991) pp. 172–221. Extended abstract in: Proc. 4th Annual IEEE Symposium on Logic in Computer Science, Pacific Grove, California, June, 1989, IEEE Computer Society Press, 1989, pp. 112–129. 8 68. (with D. Miller, G. Nadathur, and F. Pfenning), Uniform Proofs as a Foundation for Logic Programming. Annals Pure Appl. Logic 51 (1991) pp. 125–157. Extended abstract in: Proc. 2nd Annual IEEE Symposium on Logic in Computer Science, Ithaca, NY, June, 1987, IEEE Computer Society Press, 1987, pp. 98–105. 69. (with P.J. Freyd), “Categories, Allegories”. North-Holland Mathematical Library, North-Holland, Amsterdam, 1990, xviii + 296 pp. 70. (with E.S. Bainbridge, P.J. Freyd, P.J. Scott), Functorial Polymorphism. Theoretical Computer Science 70 (1990) pp. 35–64. Extended abstract in: “Logical Foundations of Functional Programming, Proc. Year of Programming, Univ. of Texas, Austin, June, 1987”, ed. by G. Huet. Addison-Wesley, 1990, pp. 315–327. 71. (with V. Breazu-Tannen and C.A. Gunter), Computing with Coercions. Extended abstract in: Proc. ACM Symposium on Lisp and Functional Programming, Nice, France, June, 1990, ACM Press, 1990, pp. 44–60. 72. A Guide to Polymorphic Types. In: “Logic and Computer Science”, ed. by P. Odifreddi, Academic Press, 1990, pp. 387–420. Preliminary versions in: “Logical Foundations of Functional Programming, Proc. Year of Programming, Univ. of Texas, Austin, June, 1987”, ed. by G. Huet. Addison-Wesley, 1990, pp. 419–430; see also: “Logic and Computer Science”, ed. by P. Odifreddi, Lecture Notes in Mathematics, Vol. 1429, Springer-Verlag, Berlin, 1990, pp. 111–150. 73. (with A. Nerode and J.B. Remmel), Polynomially Graded Logic I: A Graded Version of System T. Extended abstract in: Proc. 4th IEEE Annual Symposium on Logic in Computer Science, Pacific Grove, California, June, 1989, IEEE Computer Society Press, 1989, pp. 375–385. 74. (with A. Blass), “Freyd’s Models for the Independence of the Axiom of Choice”. Memoirs Amer. Math. Soc., vol. 404, Providence, RI, 1989, viii + 134 pp. 75. Normalization Revisited. In: “Categories in Computer Science and Logic, Proc. Research Conference, Boulder, Colorado, June, 1987”, ed. by J.W. Gray and A. Scedrov. Contemporary Math., vol. 92, Amer. Math. Soc., Providence, RI, 1989, pp. 357–369. 76. (with P.J. Freyd, J.-Y. Girard, P.J. Scott), Semantic Parametricity in Polymorphic Lambda Calculus. Extended abstract in: Proc. 3rd Annual IEEE Symposium on Logic in Computer Science, Edinburgh, Scotland, July, 1988, IEEE Computer Society Press, 1988, pp. 274–279. 77. The Rule of Computable Choice for Constructively Provable Functionals of Finite Type. Rendiconti Seminario Matem. Univ. Politec. Torino, Special issue, 1987, dedicated to the conference “Logic and Computer Science: New Trends and Applications, Torino, Italy, October, 1986”, pp. 35–39. 78. (with P.J. Freyd), Some Semantic Aspects of Polymorphic Lambda Calculus. Extended abstract in: Proc. 2nd Annual IEEE Symposium on Logic in Computer Science, Ithaca, NY, June, 1987, IEEE Computer Society Press, 1987, pp. 315–319. 79. (with A. Carboni and P.J. Freyd), A Categorical Approach to Realizability and Polymorphic Types. In: “3rd ACM Workshop on Mathematical Foundations of Programming Language Semantics, New Orleans, April, 1987”, ed. by M. Main et al. . Lecture Notes in Computer Science, vol. 298, SpringerVerlag, Berlin, 1988, pp. 23–42. 80. Kleene Computable Functionals and The Higher-Order Existence Property. J. Pure Appl. Algebra 52 (1988) pp. 313–320. 81. (with P. Scowcroft), Decompositions of Finitely Generated Modules over C(X): Sheaf Semantics and a Decision Procedure. Math. Proc. Cambridge Philos. Soc. 103 (1988) pp. 257–268. 82. Some Aspects of Categorical Semantics: Sheaves and Glueing. In: “Logic Colloquium ’85”, ed. by The Paris Logic Group. Studies in Logic and the Foundations of Mathematics, North-Holland, Amsterdam, 1987, pp. 281–301. 9 83. (with P.J. Freyd and H. Friedman), Lindenbaum Algebras of Intuitionistic Theories and Free Categories. Annals Pure Appl. Logic 35 (1987) pp. 167–172. 84. (with H. Friedman), On the Quantificational Logic of Intuitionistic Set Theory. Math. Proc. Cambridge Philos. Soc. 99 (1986) pp. 5–10. 85. Some Properties of Epistemic Set Theory with Collection. J. Symbolic Logic 51 (1986) pp. 748–754. 86. (with A. Blass), Small Decidable Sheaves. ibid. pp. 726–731. 87. On the Impossibility of Explicit Upper Bounds on Lengths of Some Provably Finite Algorithms of Computable Analysis. Annals Pure Appl. Logic 32 (1986) pp. 291–297. 88. Embedding Sheaf Models for Set Theory into Boolean-Valued Permutation Models with an Interior Operator. ibid. pp. 103–109. 89. Diagonalization of Continuous Matrices as a Representation of Intuitionistic Reals. ibid. 30 (1986) pp. 201–206. 90. (with H. Friedman), Intuitionistically Provable Recursive Well-Orderings. ibid. pp. 165–172. 91. (with H. Friedman), The Lack of Definable Witnesses and Provably Recursive Functions in Intuitionistic Set Theories. Advances in Mathematics 57 (1985) pp. 1–13. 92. (with H. Friedman), Arithmetic Transfinite Induction and Recursive Well-Orderings. ibid. 56 (1985) pp. 283–294. 93. Intuitionistic Set Theory. In: “Harvey Friedman’s Research on the Foundations of Mathematics”, ed. by. L.A. Harrington, M.D. Morley, A. Scedrov, and S.G. Simpson. Studies in Logic and the Foundations of Mathematics, North-Holland, Amsterdam, 1985, pp. 257–284. 94. Extending Gödel’s Modal Interpretation to Type Theory and Set Theory. In: “Intensional Mathematics”, ed. by S. Shapiro. Studies in Logic and the Foundations of Mathematics, North-Holland, Amsterdam, 1985, pp. 81–119. 95. (with M. Beeson), Church’s Thesis, Continuity, and Set Theory. J. Symbolic Logic 49 (1984) pp. 630–643. 96. Differential Equations in Constructive Analysis and in Recursive Realizability Topos. J. Pure Appl. Algebra 33 (1984) pp. 69–80. 97. On Some Non-Classical Extensions of Second-Order Intuitionistic Propositional Calculus. Annals Pure Appl. Logic 27 (1984) pp. 155–164. 98. (with H. Friedman), Large Sets in Intuitionistic Set Theory. ibid. pp. 1–24. 99. (with H. Friedman), Set Existence Property for Intuitionistic Theories with Dependent Choice. ibid. 25 (1983) pp. 129–140; Corrigendum ibid. 26 (1984) p. 101. 100. (with R.E. Vesley), On a Weakening of Markov’s Principle. Archiv math. Logik 23 (1983) pp. 153–160. 101. (with A. Blass), Classifying Topoi and Finite Forcing. J. Pure Appl. Algebra 28 (1983) pp. 111–140. 102. (with A. Blass), Boolean Classifying Topoi. ibid. pp. 15–30. 103. “Forcing and Classifying Topoi”. Memoirs Amer. Math. Soc., vol. 295, Providence, RI, 1984, x + 93 pp. 104. (with M.P. Fourman), The “World’s Simplest Axiom of Choice” Fails. Manuscripta Math. 38 (1982) pp. 325–332. 10 105. The Independence of the Fan Theorem in the Presence of Continuity Principles. In: “The L.E.J. Brouwer Centenary Symposium”, ed. by A.S. Troelstra and D. van Dalen. Studies in Logic and the Foundations of Mathematics, North-Holland, Amsterdam, 1982, pp. 435–442. 106. (with P.J. Scott), A Note on the Friedman Slash and Freyd Covers. ibid. pp. 443–452. 107. Consistency and Independence Results in Intuitionistic Set Theory. In: “Constructive Mathematics, Proceedings New Mexico 1980”, ed. by F. Richman. Lecture Notes in Mathematics, vol. 873, SpringerVerlag, Berlin, 1981, pp. 54–86. 11
© Copyright 2026 Paperzz