Author:
Hofmann Martin,Karbyshev Aleksandr,Seidl Helmut
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Backes, M., Laud, P.: Computationally sound secrecy proofs by mechanized flow analysis. In: ACM Conference on Computer and Communications Security, pp. 370–379 (2006)
2. Lecture Notes in Computer Science;D. Cachera,2004
3. Le Charlier, B., Van Hentenryck, P.: A universal top-down fixpoint algorithm. Technical Report CS-92-25, Brown University, Providence, RI 02912 (1992)
4. Lecture Notes in Computer Science;S. Coupet-Grimal,2006
5. Lecture Notes in Computer Science;C. Fecht,1995
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献