Author:
McIver Annabelle K.,Morgan Carroll C.
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Appendices are available at, www.cse.unsw.edu.au/~carrollm/probs/bibliographyBody.html#McIver:09
2. Černý, P.: Private communication (February 2009)
3. Lecture Notes in Computer Science;R. Alur,2006
4. Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live, http://eprint.iacr.org/2008/068
5. Lecture Notes in Computer Science;A. Coble,2008
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Case Study in Information Flow Refinement for Low Level Systems;The Logic of Software. A Tasting Menu of Formal Methods;2022
2. On Compositional Information Flow Aware Refinement;2021 IEEE 34th Computer Security Foundations Symposium (CSF);2021-06
3. Refining security protocols;Journal of Computer Security;2017-11-30
4. Program Refinement, Perfect Secrecy and Information Flow;Engineering Trustworthy Software Systems;2016
5. Security invariants in discrete transition systems;Formal Aspects of Computing;2013-01