


default search action
Eugen Zalinescu
Person information
- affiliation: Nomadic Labs, Paris, France
- affiliation (former): TU München, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c20]Lacramioara Astefanoaei, Pierre Chambart, Antonella Del Pozzo, Thibault Rieutord, Sara Tucci Piergiovanni, Eugen Zalinescu:
Tenderbake - A Solution to Dynamic Repeated Consensus for Blockchains. FAB 2021: 1:1-1:23 - 2020
- [j14]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Runtime Verification over Out-of-order Streams. ACM Trans. Comput. Log. 21(1): 5:1-5:43 (2020) - [i7]Lacramioara Astefanoaei, Pierre Chambart, Antonella Del Pozzo, Edward Tate, Sara Tucci Piergiovanni, Eugen Zalinescu:
Tenderbake - Classical BFT Style Consensus for Public Blockchains. CoRR abs/2001.11965 (2020)
2010 – 2019
- 2019
- [j13]Ezio Bartocci
, Yliès Falcone, Borzoo Bonakdarpour, Christian Colombo
, Normann Decker, Klaus Havelund, Yogi Joshi, Felix Klaedtke, Reed Milewicz, Giles Reger
, Grigore Rosu, Julien Signoles
, Daniel Thoma, Eugen Zalinescu, Yi Zhang:
First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014. Int. J. Softw. Tools Technol. Transf. 21(1): 31-70 (2019) - [i6]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Runtime Verification over Out-of-order Streams. CoRR abs/1909.11593 (2019) - 2018
- [j12]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Algorithms for monitoring real-time properties. Acta Informatica 55(4): 309-338 (2018) - [c19]Christian Müller
, Helmut Seidl, Eugen Zalinescu:
Inductive Invariants for Noninterference in Multi-agent Workflows. CSF 2018: 247-261 - [p1]Klaus Havelund, Giles Reger
, Daniel Thoma, Eugen Zalinescu
:
Monitoring Events that Carry Data. Lectures on Runtime Verification 2018: 61-102 - [i5]Serdar Erbatur, Martin Hofmann, Eugen Zalinescu:
Enforcing Programming Guidelines with Region Types and Effects. CoRR abs/1801.07647 (2018) - 2017
- [c18]Serdar Erbatur, Martin Hofmann, Eugen Zalinescu:
Enforcing Programming Guidelines with Region Types and Effects. APLAS 2017: 85-104 - [c17]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Runtime Verification of Temporal Properties over Out-of-Order Data Streams. CAV (1) 2017: 356-376 - [c16]Bernd Finkbeiner, Christian Müller
, Helmut Seidl, Eugen Zalinescu:
Verifying Security Policies in Multi-agent Workflows with Loops. CCS 2017: 633-645 - [c15]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
The MonPoly Monitoring Tool. RV-CuBES 2017: 19-28 - [i4]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Runtime Verification of Temporal Properties over Out-of-order Data Streams. CoRR abs/1707.05555 (2017) - [i3]Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zalinescu:
Verifying Security Policies in Multi-agent Workflows with Loops. CoRR abs/1708.09013 (2017) - 2015
- [j11]David A. Basin, Felix Klaedtke, Srdjan Marinovic, Eugen Zalinescu:
Monitoring of temporal first-order properties with aggregations. Formal Methods Syst. Des. 46(3): 262-285 (2015) - [j10]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Greedily computing associative aggregations on sliding windows. Inf. Process. Lett. 115(2): 186-192 (2015) - [j9]David A. Basin
, Felix Klaedtke, Samuel Müller, Eugen Zalinescu:
Monitoring Metric First-Order Temporal Properties. J. ACM 62(2): 15:1-15:45 (2015) - [c14]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Failure-aware Runtime Verification of Distributed Systems. FSTTCS 2015: 590-603 - 2014
- [j8]David A. Basin, Carlos Cotrini Jiménez, Felix Klaedtke, Eugen Zalinescu:
Deciding safety and liveness in TPTL. Inf. Process. Lett. 114(12): 680-688 (2014) - [c13]David A. Basin, Felix Klaedtke, Srdjan Marinovic, Eugen Zalinescu:
On Real-Time Monitoring with Imprecise Timestamps. RV 2014: 193-198 - 2013
- [j7]David A. Basin, Vincent Jugé, Felix Klaedtke, Eugen Zalinescu:
Enforceable Security Policies Revisited. ACM Trans. Inf. Syst. Secur. 16(1): 3 (2013) - [j6]David A. Basin, Matús Harvan, Felix Klaedtke, Eugen Zalinescu:
Monitoring Data Usage in Distributed Systems. IEEE Trans. Software Eng. 39(10): 1403-1426 (2013) - [c12]David A. Basin, Felix Klaedtke, Srdjan Marinovic, Eugen Zalinescu:
Monitoring of Temporal First-Order Properties with Aggregations. RV 2013: 40-58 - 2012
- [j5]Tom Hvitved, Felix Klaedtke, Eugen Zalinescu:
A trace-based model for multiparty contracts. J. Log. Algebraic Methods Program. 81(2): 72-98 (2012) - [j4]Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu:
Verified Cryptographic Implementations for TLS. ACM Trans. Inf. Syst. Secur. 15(1): 3:1-3:32 (2012) - [c11]David A. Basin, Vincent Jugé, Felix Klaedtke, Eugen Zalinescu:
Enforceable Security Policies Revisited. POST 2012: 309-328 - [c10]David A. Basin, Felix Klaedtke, Srdjan Marinovic, Eugen Zalinescu:
Monitoring Compliance Policies over Incomplete and Disagreeing Logs. RV 2012: 151-167 - 2011
- [j3]Eugen Zalinescu:
Shorter strings containing all k-element permutations. Inf. Process. Lett. 111(12): 605-608 (2011) - [c9]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Algorithms for Monitoring Real-Time Properties. RV 2011: 260-275 - [c8]David A. Basin, Matús Harvan, Felix Klaedtke, Eugen Zalinescu:
MONPOLY: Monitoring Usage-Control Policies. RV 2011: 360-364 - [c7]David A. Basin, Matús Harvan, Felix Klaedtke, Eugen Zalinescu:
Monitoring Usage-Control Policies in Distributed Systems. TIME 2011: 88-95 - 2010
- [j2]Hubert Comon-Lundh, Véronique Cortier, Eugen Zalinescu:
Deciding security properties for cryptographic protocols. application to key cycles. ACM Trans. Comput. Log. 11(2): 9:1-9:42 (2010)
2000 – 2009
- 2008
- [c6]Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu:
Cryptographically verified implementations for TLS. CCS 2008: 459-468 - 2007
- [b1]Eugen Zalinescu:
Sécurité des protocoles cryptographiques : décidabilité et résultats de transfert. (Security of cryptographic protocols: decidability and transfer resultats). Henri Poincaré University, Nancy, France, 2007 - [j1]Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu:
Relating two standard notions of secrecy. Log. Methods Comput. Sci. 3(3) (2007) - [c5]Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu:
Synthesizing Secure Protocols. ESORICS 2007: 406-421 - [i2]Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu:
Relating two standard notions of secrecy. CoRR abs/0706.0502 (2007) - [i1]Hubert Comon-Lundh, Véronique Cortier, Eugen Zalinescu:
Deciding security properties for cryptographic protocols. Application to key cycles. CoRR abs/0708.3564 (2007) - 2006
- [c4]Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu:
Relating Two Standard Notions of Secrecy. CSL 2006: 303-318 - [c3]Eugen Zalinescu, Véronique Cortier, Michaël Rusinowitch:
Relating two standard notions of secrecy. Trustworthy Software 2006 - [c2]Véronique Cortier, Eugen Zalinescu:
Deciding Key Cycles for Security Protocols. LPAR 2006: 317-331 - 2005
- [c1]Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu:
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. PPDP 2005: 12-22
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint