Author:
Adão Pedro,Fournet Cédric
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Abadi, M., Fournet, C.: Private authentication. Theoretical Computer Science 322(3), 427–476 (2004).Special issue on Foundations of Wide Area Network Computing.
2. Abadi, M., Fournet, C., Gonthier, G.: Authentication primitives and their compilation. In: POPL 2000, pp. 302–315. ACM, New York (2000)
3. Abadi, M., Fournet, C., Gonthier, G.: Secure implementation of channel abstractions. Information and Computation 174(1), 37–83 (2002)
4. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The Spi Calculus. Information and Computation 148(1), 1–70 (1999)
5. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103–127 (2002)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献