Author:
Backes Michael,Busenius Alex,Hriţcu Cătălin
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. CVE-2009-3555. Man-in-the-Middle Vulnerability in TLS via Session Renegotiation (2009)
2. The Coq proof assistant, Version 8.3, Home page (2010),
http://coq.inria.fr/
3. Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. Journal of the ACM 52(1), 102–146 (2005)
4. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The Spi calculus. Information and Computation 148(1), 1–70 (1999)
5. Aydemir, B.E., Charguéraud, A., Pierce, B.C., Pollack, R., Weirich, S.: Engineering formal metatheory. In: POPL 2008, pp. 3–15 (2008)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献