BibTeX records: Eike Ritter

download as .bib file

@article{DBLP:journals/corr/abs-2302-09031,
  author       = {David J. Pym and
                  Eike Ritter and
                  Edmund Robinson},
  title        = {Categorical Proof-Theoretic Semantics},
  journal      = {CoRR},
  volume       = {abs/2302.09031},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.09031},
  doi          = {10.48550/ARXIV.2302.09031},
  eprinttype    = {arXiv},
  eprint       = {2302.09031},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-09031.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/KhanABRR18,
  author       = {Imran Khan and
                  Zahid Anwar and
                  Behzad Bordbar and
                  Eike Ritter and
                  Habib{-}ur Rehman},
  title        = {A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service
                  Clouds},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {4},
  pages        = {942--954},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2016.2560161},
  doi          = {10.1109/TCC.2016.2560161},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/KhanABRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArapinisMRR17,
  author       = {Myrto Arapinis and
                  Loretta Ilaria Mancini and
                  Eike Ritter and
                  Mark Dermot Ryan},
  title        = {Analysis of privacy in mobile telephony systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {16},
  number       = {5},
  pages        = {491--523},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10207-016-0338-9},
  doi          = {10.1007/S10207-016-0338-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArapinisMRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/ArapinisLRR17,
  author       = {Myrto Arapinis and
                  Jia Liu and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Stateful applied pi calculus: Observational equivalence and labelled
                  bisimilarity},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {89},
  pages        = {95--149},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jlamp.2017.03.001},
  doi          = {10.1016/J.JLAMP.2017.03.001},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/ArapinisLRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DenzelRR17,
  author       = {Michael Denzel and
                  Mark Ryan and
                  Eike Ritter},
  editor       = {Sabrina De Capitani di Vimercati and
                  Fabio Martinelli},
  title        = {A Malware-Tolerant, Self-Healing Industrial Control System Framework},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11
                  International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {502},
  pages        = {46--60},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58469-0\_4},
  doi          = {10.1007/978-3-319-58469-0\_4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/DenzelRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/PaivaR16,
  author       = {Valeria de Paiva and
                  Eike Ritter},
  editor       = {Mario R. F. Benevides and
                  Ren{\'{e}} Thiemann},
  title        = {Fibrational Modal Type Theory},
  booktitle    = {Proceedings of the Tenth Workshop on Logical and Semantic Frameworks,
                  with Applications, {LSFA} 2015, Natal, Brazil, August 31 - September
                  1, 2015},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {323},
  pages        = {143--161},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.entcs.2016.06.010},
  doi          = {10.1016/J.ENTCS.2016.06.010},
  timestamp    = {Wed, 05 Feb 2020 13:51:47 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/PaivaR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YasminRW14,
  author       = {Rehana Yasmin and
                  Eike Ritter and
                  Guilin Wang},
  title        = {Provable security of a pairing-free one-pass authenticated key establishment
                  protocol for wireless sensor networks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {5},
  pages        = {453--465},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0224-7},
  doi          = {10.1007/S10207-013-0224-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/YasminRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArapinisPRR14,
  author       = {Myrto Arapinis and
                  Joshua Phillips and
                  Eike Ritter and
                  Mark Dermot Ryan},
  title        = {StatVerif: Verification of stateful processes},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {743--821},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140501},
  doi          = {10.3233/JCS-140501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArapinisPRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/PymRR14,
  author       = {David J. Pym and
                  Eike Ritter and
                  Edmund Robinson},
  title        = {A proof-theoretic analysis of the classical propositional matrix method},
  journal      = {J. Log. Comput.},
  volume       = {24},
  number       = {1},
  pages        = {283--301},
  year         = {2014},
  url          = {https://doi.org/10.1093/logcom/exs045},
  doi          = {10.1093/LOGCOM/EXS045},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/PymRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ArapinisMRR14,
  author       = {Myrto Arapinis and
                  Loretta Ilaria Mancini and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Privacy through Pseudonymity in Mobile Telephony Systems},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/privacy-through-pseudonymity-mobile-telephony-systems},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ArapinisMRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/ArapinisLRR14,
  author       = {Myrto Arapinis and
                  Jia Liu and
                  Eike Ritter and
                  Mark Ryan},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Stateful Applied Pi Calculus},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {22--41},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_2},
  doi          = {10.1007/978-3-642-54792-8\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/post/ArapinisLRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KoleiniRR14,
  author       = {Masoud Koleini and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Verification of agent knowledge in dynamic access control policies},
  journal      = {CoRR},
  volume       = {abs/1401.4730},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.4730},
  eprinttype    = {arXiv},
  eprint       = {1401.4730},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KoleiniRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/KoleiniRR13,
  author       = {Masoud Koleini and
                  Eike Ritter and
                  Mark Ryan},
  editor       = {Nir Piterman and
                  Scott A. Smolka},
  title        = {Model Checking Agent Knowledge in Dynamic Access Control Policies},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 19th International Conference, {TACAS} 2013, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2013, Rome, Italy, March 16-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7795},
  pages        = {448--462},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36742-7\_31},
  doi          = {10.1007/978-3-642-36742-7\_31},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacas/KoleiniRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YasminRW12,
  author       = {Rehana Yasmin and
                  Eike Ritter and
                  Guilin Wang},
  title        = {An Authentication Framework for Wireless Sensor Networks Using Identity-Based
                  Signatures: Implementation and Evaluation},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {95-D},
  number       = {1},
  pages        = {126--133},
  year         = {2012},
  url          = {https://doi.org/10.1587/transinf.E95.D.126},
  doi          = {10.1587/TRANSINF.E95.D.126},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YasminRW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArapinisMRRGRB12,
  author       = {Myrto Arapinis and
                  Loretta Ilaria Mancini and
                  Eike Ritter and
                  Mark Ryan and
                  Nico Golde and
                  Kevin Redon and
                  Ravishankar Borgaonkar},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {New privacy issues in mobile telephony: fix and verification},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {205--216},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382221},
  doi          = {10.1145/2382196.2382221},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArapinisMRRGRB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SmartR12,
  author       = {Matt Smart and
                  Eike Ritter},
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing},
  booktitle    = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2\_2},
  doi          = {10.1007/978-3-642-30921-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SmartR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/SmartR11,
  author       = {Matt Smart and
                  Eike Ritter},
  editor       = {Jose M. Alcaraz Calero and
                  Laurence Tianruo Yang and
                  F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and
                  Luis Javier Garc{\'{\i}}a{-}Villalba and
                  Xiaolin Andy Li and
                  Yan Wang},
  title        = {True Trustworthy Elections: Remote Electronic Voting Using Trusted
                  Computing},
  booktitle    = {Autonomic and Trusted Computing - 8th International Conference, {ATC}
                  2011, Banff, Canada, September 2-4, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6906},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23496-5\_14},
  doi          = {10.1007/978-3-642-23496-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/atc/SmartR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArapinisRR11,
  author       = {Myrto Arapinis and
                  Eike Ritter and
                  Mark Dermot Ryan},
  title        = {StatVerif: Verification of Stateful Processes},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {33--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.10},
  doi          = {10.1109/CSF.2011.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArapinisRR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1109-2066,
  author       = {Myrto Arapinis and
                  Loretta Ilaria Mancini and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Formal Analysis of {UMTS} Privacy},
  journal      = {CoRR},
  volume       = {abs/1109.2066},
  year         = {2011},
  url          = {http://arxiv.org/abs/1109.2066},
  eprinttype    = {arXiv},
  eprint       = {1109.2066},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1109-2066.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/YasminRW10,
  author       = {Rehana Yasmin and
                  Eike Ritter and
                  Guilin Wang},
  title        = {An Authentication Framework for Wireless Sensor Networks using Identity-Based
                  Signatures},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {882--889},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.165},
  doi          = {10.1109/CIT.2010.165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/YasminRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArapinisCRR10,
  author       = {Myrto Arapinis and
                  Tom Chothia and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Analysing Unlinkability and Anonymity Using the Applied Pi Calculus},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {107--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.15},
  doi          = {10.1109/CSF.2010.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArapinisCRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/ArapinisCDFGKMRRSUY09,
  author       = {Myrto Arapinis and
                  Muffy Calder and
                  Louise A. Dennis and
                  Michael Fisher and
                  Philip D. Gray and
                  Savas Konur and
                  Alice Miller and
                  Eike Ritter and
                  Mark Ryan and
                  Sven Schewe and
                  Chris Unsworth and
                  Rehana Yasmin},
  title        = {Towards the Verification of Pervasive Systems},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {22},
  year         = {2009},
  url          = {https://doi.org/10.14279/tuj.eceasst.22.315},
  doi          = {10.14279/TUJ.ECEASST.22.315},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/ArapinisCDFGKMRRSUY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SmartR09,
  author       = {Matt Smart and
                  Eike Ritter},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Remote Electronic Voting with Revocable Anonymity},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {39--54},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_5},
  doi          = {10.1007/978-3-642-10772-6\_5},
  timestamp    = {Wed, 12 May 2021 16:44:21 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/SmartR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArapinisCRR09,
  author       = {Myrto Arapinis and
                  Tom Chothia and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Untraceability in the applied pi-calculus},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402514},
  doi          = {10.1109/ICITST.2009.5402514},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ArapinisCRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acs/MaiettiMPR05,
  author       = {Maria Emilia Maietti and
                  Paola Maneggia and
                  Valeria de Paiva and
                  Eike Ritter},
  title        = {Relating Categorical Semantics for Intuitionistic Linear Logic},
  journal      = {Appl. Categorical Struct.},
  volume       = {13},
  number       = {1},
  pages        = {1--36},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10485-004-3134-z},
  doi          = {10.1007/S10485-004-3134-Z},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acs/MaiettiMPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MukhamedovKR05,
  author       = {Aybek Mukhamedov and
                  Steve Kremer and
                  Eike Ritter},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Analysis of a Multi-party Fair Exchange Protocol and Formal Proof
                  of Correctness in the Strand Space Model},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {255--269},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_23},
  doi          = {10.1007/11507840\_23},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MukhamedovKR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/galop/PymR05,
  author       = {David J. Pym and
                  Eike Ritter},
  editor       = {Dan R. Ghica and
                  Guy McCusker},
  title        = {A games semantics for reductive logic and proof-search},
  booktitle    = {1st Workshop on Games for Logic and Programming Languages, GALOP@ETAPS
                  2005, Edinburgh, UK, 2-3 April 2005},
  pages        = {107--123},
  year         = {2005},
  timestamp    = {Thu, 25 Jun 2020 16:30:03 +0200},
  biburl       = {https://dblp.org/rec/conf/galop/PymR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0010820,
  author       = {David J. Pym and
                  Eike Ritter},
  title        = {Reductive logic and proof-search - proof theory, semantics, and control},
  series       = {Oxford logic guides},
  volume       = {45},
  publisher    = {Oxford University Press},
  year         = {2004},
  isbn         = {978-0-19-852633-9},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0010820.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/AlechinaMPR01,
  author       = {Natasha Alechina and
                  Michael Mendler and
                  Valeria de Paiva and
                  Eike Ritter},
  editor       = {Laurent Fribourg},
  title        = {Categorical and Kripke Semantics for Constructive {S4} Modal Logic},
  booktitle    = {Computer Science Logic, 15th International Workshop, {CSL} 2001. 10th
                  Annual Conference of the EACSL, Paris, France, September 10-13, 2001,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2142},
  pages        = {292--307},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44802-0\_21},
  doi          = {10.1007/3-540-44802-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/AlechinaMPR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igpl/GhaniPR00,
  author       = {Neil Ghani and
                  Valeria de Paiva and
                  Eike Ritter},
  title        = {Linear Explicit Substitutions},
  journal      = {Log. J. {IGPL}},
  volume       = {8},
  number       = {1},
  pages        = {7--31},
  year         = {2000},
  url          = {https://doi.org/10.1093/jigpal/8.1.7},
  doi          = {10.1093/JIGPAL/8.1.7},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/igpl/GhaniPR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/RitterPW00,
  author       = {Eike Ritter and
                  David J. Pym and
                  Lincoln A. Wallen},
  title        = {Proof-terms for classical and intuitionistic resolution},
  journal      = {J. Log. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {173--207},
  year         = {2000},
  url          = {https://doi.org/10.1093/logcom/10.2.173},
  doi          = {10.1093/LOGCOM/10.2.173},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/RitterPW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/RitterPW00,
  author       = {Eike Ritter and
                  David J. Pym and
                  Lincoln A. Wallen},
  title        = {On the intuitionistic force of classical search},
  journal      = {Theor. Comput. Sci.},
  volume       = {232},
  number       = {1-2},
  pages        = {299--333},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0304-3975(99)00178-4},
  doi          = {10.1016/S0304-3975(99)00178-4},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/RitterPW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/MaiettiPR00,
  author       = {Maria Emilia Maietti and
                  Valeria de Paiva and
                  Eike Ritter},
  editor       = {Jerzy Tiuryn},
  title        = {Categorical Models for Intuitionistic and Linear Type Theory},
  booktitle    = {Foundations of Software Science and Computation Structures, Third
                  International Conference, {FOSSACS} 2000, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software,ETAPS 2000,
                  Berlin, Germany, March 25 - April 2, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1784},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-46432-8\_15},
  doi          = {10.1007/3-540-46432-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/MaiettiPR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/GhaniPR99,
  author       = {Neil Ghani and
                  Valeria de Paiva and
                  Eike Ritter},
  editor       = {Wolfgang Thomas},
  title        = {Categorical Models of Explicit Substitutions},
  booktitle    = {Foundations of Software Science and Computation Structure, Second
                  International Conference, FoSSaCS'99, Held as Part of the European
                  Joint Conferences on the Theory and Practice of Software, ETAPS'99,
                  Amsterdam, The Netherlands, March 22-28, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1578},
  pages        = {197--211},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49019-1\_14},
  doi          = {10.1007/3-540-49019-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/GhaniPR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tlca/Ritter99,
  author       = {Eike Ritter},
  editor       = {Jean{-}Yves Girard},
  title        = {Characterising Explicit Substitutions which Preserve Termination},
  booktitle    = {Typed Lambda Calculi and Applications, 4th International Conference,
                  TLCA'99, L'Aquila, Italy, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1581},
  pages        = {325--339},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48959-2\_23},
  doi          = {10.1007/3-540-48959-2\_23},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/tlca/Ritter99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GhaniPR98,
  author       = {Neil Ghani and
                  Valeria de Paiva and
                  Eike Ritter},
  editor       = {Kim Guldstrand Larsen and
                  Sven Skyum and
                  Glynn Winskel},
  title        = {Explicit Substitutions for Constructive Necessity},
  booktitle    = {Automata, Languages and Programming, 25th International Colloquium,
                  ICALP'98, Aalborg, Denmark, July 13-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1443},
  pages        = {743--754},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055098},
  doi          = {10.1007/BFB0055098},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/GhaniPR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/RitterP97,
  author       = {Eike Ritter and
                  Valeria de Paiva},
  editor       = {Pierpaolo Degano and
                  Roberto Gorrieri and
                  Alberto Marchetti{-}Spaccamela},
  title        = {On Explicit Substitution and Names (Extended Abstract)},
  booktitle    = {Automata, Languages and Programming, 24th International Colloquium,
                  ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1256},
  pages        = {248--258},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63165-8\_182},
  doi          = {10.1007/3-540-63165-8\_182},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/RitterP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/RitterPW96,
  author       = {Eike Ritter and
                  David J. Pym and
                  Lincoln A. Wallen},
  editor       = {Michael A. McRobbie and
                  John K. Slaney},
  title        = {Proof-Terms for Classical and Intuitionistic Resolution (Extended
                  Abstract)},
  booktitle    = {Automated Deduction - CADE-13, 13th International Conference on Automated
                  Deduction, New Brunswick, NJ, USA, July 30 - August 3, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1104},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61511-3\_66},
  doi          = {10.1007/3-540-61511-3\_66},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/RitterPW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tableaux/RitterPW96,
  author       = {Eike Ritter and
                  David J. Pym and
                  Lincoln A. Wallen},
  editor       = {Pierangelo Miglioli and
                  Ugo Moscato and
                  Daniele Mundici and
                  Mario Ornaghi},
  title        = {On the Intuitionistic Force of Classical Search (Extended Abstract)},
  booktitle    = {Theorem Proving with Analytic Tableaux and Related Methods, 5th International
                  Workshop, {TABLEAUX} '96, Terrasini, Palermo, Italy, May 15-17, 1996,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1071},
  pages        = {295--311},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61208-4\_19},
  doi          = {10.1007/3-540-61208-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/tableaux/RitterPW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tlca/RitterP95,
  author       = {Eike Ritter and
                  Andrew M. Pitts},
  editor       = {Mariangiola Dezani{-}Ciancaglini and
                  Gordon D. Plotkin},
  title        = {A Fully Abstract Translation between a Lambda-Calculus with Reference
                  Types and Standard {ML}},
  booktitle    = {Typed Lambda Calculi and Applications, Second International Conference
                  on Typed Lambda Calculi and Applications, {TLCA} '95, Edinburgh, UK,
                  April 10-12, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {902},
  pages        = {397--413},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0014067},
  doi          = {10.1007/BFB0014067},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/tlca/RitterP95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Ritter94,
  author       = {Eike Ritter},
  title        = {Categorical Abstract Machines for Higher-Order Typed lambda-Calculi},
  journal      = {Theor. Comput. Sci.},
  volume       = {136},
  number       = {1},
  pages        = {125--162},
  year         = {1994},
  url          = {https://doi.org/10.1016/0304-3975(94)00125-3},
  doi          = {10.1016/0304-3975(94)00125-3},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Ritter94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/OngR93,
  author       = {C.{-}H. Luke Ong and
                  Eike Ritter},
  editor       = {Egon B{\"{o}}rger and
                  Yuri Gurevich and
                  Karl Meinke},
  title        = {A Generic Strong Normalization Argument: Application to the Calculus
                  of Constructions},
  booktitle    = {Computer Science Logic, 7th Workshop, {CSL} '93, Swansea, United Kingdom,
                  September 13-17, 1993, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {832},
  pages        = {261--279},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/BFb0049336},
  doi          = {10.1007/BFB0049336},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/OngR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/Ritter93,
  author       = {Eike Ritter},
  editor       = {Egon B{\"{o}}rger and
                  Yuri Gurevich and
                  Karl Meinke},
  title        = {Normalization for Typed Lambda Calculi with Explicit Substitution},
  booktitle    = {Computer Science Logic, 7th Workshop, {CSL} '93, Swansea, United Kingdom,
                  September 13-17, 1993, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {832},
  pages        = {295--304},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/BFb0049338},
  doi          = {10.1007/BFB0049338},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/Ritter93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hoa/NesiPR93,
  author       = {Monica Nesi and
                  Valeria de Paiva and
                  Eike Ritter},
  editor       = {Jan Heering and
                  Karl Meinke and
                  Bernhard M{\"{o}}ller and
                  Tobias Nipkow},
  title        = {Rewriting Properties of Combinators for Rudimentary Linear Logic},
  booktitle    = {Higher-Order Algebra, Logic, and Term Rewriting, First International
                  Workshop, {HOA} '93, Amsterdam, The Netherlands, September 23-24,
                  1993, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {816},
  pages        = {256--275},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58233-9\_12},
  doi          = {10.1007/3-540-58233-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/hoa/NesiPR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics