Author:
Blanchet Bruno,Aziz Benjamin
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Abadi, M.: Security Protocols and their Properties. In: Foundations of Secure Computation. NATO Science Series, pp. 39???60. IOS Press, Amsterdam (2000);
2. Volume for the 20th International Summer School on Foundations of Secure Computation, held in Marktoberdorf, Germany (1999)
3. Lecture Notes in Computer Science;M. Abadi,2003
4. Abadi, M., Fournet, C.: Mobile Values, New Names, and Secure Communication. In: 28th ACM Symposium on Principles of Programming Languages (POPL 2001), pp. 104–115. ACM, New York (2001)
5. Abadi, M., Fournet, C., Gonthier, G.: Secure Implementation of Channel Abstractions. Information and Computation 174(1), 37–83 (2002)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Seal Calculus;Information and Computation;2005-08
2. Mobile Agents Security Protocols;Mobile Computing Techniques in Emerging Markets
3. Mobile Agents Security Protocols;Crisis Management