Author:
Capecchi Sara,Castellani Ilaria,Dezani-Ciancaglini Mariangiola,Rezk Tamara
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Almeida Matos, A., Boudol, G.: On Declassification and the Non-Disclosure Policy. Journal of Computer Security 17, 549–597 (2009)
2. Lecture Notes in Computer Science;L. Bettini,2008
3. Bhargavan, K., Corin, R., Deniélou, P.-M., Fournet, C., Leifer, J.J.: Cryptographic Protocol Synthesis and Verification for Multiparty Sessions. In: Proc. CSF 2009, pp. 124–140. IEEE Computer Society, Los Alamitos (2009)
4. Lecture Notes in Computer Science;M. Boreale,2008
5. CCIS;G. Boudol,2007
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards Gradual Multiparty Session Typing;Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering;2022-10-10
2. The Discourje project: run-time verification of communication protocols in Clojure;International Journal on Software Tools for Technology Transfer;2022-09-20
3. Analysis of specifications of multiparty sessions with dcj-lint;Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2021-08-18
4. Session Logical Relations for Noninterference;2021 36th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS);2021-06-29
5. A Language-based Approach to Analysing Flow Security Properties in Virtualised Computing Systems;2020 International Symposium on Theoretical Aspects of Software Engineering (TASE);2020-12