Publisher
Springer International Publishing
Reference15 articles.
1. Lecture Notes in Computer Science;M Abadi,1997
2. Abadi, M.: Secrecy by typing in security protocols. J. ACM 46(5), 749–786 (1999)
3. Bartoletti, M., Degano, P., Ferrari, G.L., Zunino, R.: Local policies for resource usage analysis. ACM Trans. Program. Lang. Syst. 31(6), 23:1–23:43 (2009)
4. Busi, M., Degano, P., Galletta, L.: Using standard typing algorithms incrementally. In: 11th NASA Formal Methods, Proceedings. To appear in LNCS. Springer (2019).
https://arxiv.org/abs/1808.00225
5. Lecture Notes in Computer Science;C Calcagno,2015