Author:
Meredith L. G.,Radestock Matthias
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. In: POPL, pp. 33–44 (2002)
2. Abadi, M., Blanchet, B.: Secrecy types for asymmetric communication. Theor. Comput. Sci. 3(298), 387–415 (2003)
3. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. In: ACM Conference on Computer and Communications Security, pp. 36–47 (1997)
4. Studies in Logic and the Foundations of Mathematics;H.P. Barendregt,1984
5. Lecture Notes in Computer Science;L. Caires,2004
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Native Type Theory;Electronic Proceedings in Theoretical Computer Science;2022-11-03