-
1
-
-
84958749546
-
-
Blanchet, B.: From Secrecy to Authenticity in Security Protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, 2477, pp. 342-359. Springer, Heidelberg (2002)
-
Blanchet, B.: From Secrecy to Authenticity in Security Protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 342-359. Springer, Heidelberg (2002)
-
-
-
-
2
-
-
35048865382
-
Computationally sound mechanized proofs of correspondence assertions. In: CSF
-
Los Alamitos
-
Blanchet, B.: Computationally sound mechanized proofs of correspondence assertions. In: CSF 2007, pp. 97-111. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
97-111. IEEE Computer Society Press
, pp. 2007
-
-
Blanchet, B.1
-
3
-
-
35248819194
-
-
Boyland, J.: Checking interference with fractional permissions. In: Cousot, R. (ed.) SAS 2003. LNCS, 2694, pp. 55-72. Springer, Heidelberg (2003)
-
Boyland, J.: Checking interference with fractional permissions. In: Cousot, R. (ed.) SAS 2003. LNCS, vol. 2694, pp. 55-72. Springer, Heidelberg (2003)
-
-
-
-
4
-
-
0034835462
-
Authenticity by typing for security protocols. In: CSFW
-
Los Alamitos
-
Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. In: CSFW 2001, pp. 145-159. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
145-159. IEEE Computer Society Press
, pp. 2001
-
-
Gordon, A.D.1
Jeffrey, A.2
-
5
-
-
84948759702
-
Types and effects for asymmetric cryptographic protocols. In: CSFW-15
-
Los Alamitos
-
Gordon, A.D., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. In: CSFW-15, pp. 77-91. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
IEEE Computer Society Press
, pp. 77-91
-
-
Gordon, A.D.1
Jeffrey, A.2
-
6
-
-
35248815623
-
-
Gordon, A.D., Jeffrey, A.: Typing one-to-one and one-to-many correspondences in security protocols. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, 2609, pp. 263-282. Springer, Heidelberg (2003)
-
Gordon, A.D., Jeffrey, A.: Typing one-to-one and one-to-many correspondences in security protocols. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 263-282. Springer, Heidelberg (2003)
-
-
-
-
7
-
-
0038414953
-
Typing correspondence assertions for communication protocols
-
Gordon, A.D., Jeffrey, A.: Typing correspondence assertions for communication protocols. Theoretical Computer Science 300, 379-409 (2003)
-
(2003)
Theoretical Computer Science
, vol.300
, pp. 379-409
-
-
Gordon, A.D.1
Jeffrey, A.2
-
8
-
-
0346969701
-
A generic type system for the pi-calculus
-
Igarashi, A., Kobayashi, N.: A generic type system for the pi-calculus. Theoretical Computer Science 311(1-3), 121-163 (2004)
-
(2004)
Theoretical Computer Science
, vol.311
, Issue.1-3
, pp. 121-163
-
-
Igarashi, A.1
Kobayashi, N.2
-
10
-
-
33749580034
-
A capability calculus for concurrency and determinism
-
Baier, C, Hermanns, H, eds, CONCUR 2006, Springer, Heidelberg
-
Terauchi, T., Aiken, A.: A capability calculus for concurrency and determinism. In: Baier, C., Hermanns, H. (eds.) CONCUR 2006. LNCS, vol. 4137, pp. 218-232. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4137
, pp. 218-232
-
-
Terauchi, T.1
Aiken, A.2
|