Author:
Baldan Paolo,Bracciali Andrea,Bruni Roberto
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. M. Abadi and M. P. Fiore. Computing symbolic models for verifying cryptographic protocols. In Proc. 14th IEEE Computer Security Foundations Workshop, pp. 160–173. IEEE, 2001.
2. R. Allen and D. Garlan. A Formal Basis for Architectural Connectors. ACM TOSEM, 6(3), pp. 213–249, 1997.
3. L. F. Andrade, J. L. Fiadeiro, J. Gouveia, G. Koutsoukos and M. Wermelinger. Coordination for Orchestration. In Coordination Models and Languages, 5th Int. Conference COORDINATION. Lect. Notes in Comput. Sci. 2315 pp. 5–13. Springer 2002.
4. F. Baader and W. Snyder. Unification theory. In Handbook of Automated Reasoning. Elsevier Science, 2000.
5. M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proc. ICALP’01, Lect. Notes in Comput. Sci. 2076, pp. 667–681. Springer, 2001.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献