Author:
Abadi Martín,Blanchet Bruno
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. In 29th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’02), pages 33–44, Portland, OR, Jan. 2002. ACM Press.
2. M. Abadi, N. Glew, B. Horne, and B. Pinkas. Certified email with a light on-line trusted third party: Design and implementation. In 11th International World Wide Web Conference (WWW’02), Honolulu, Hawaii, USA, May 2002. ACM Press.
3. G. Bella, F. Massacci, and L. C. Paulson. The verification of an industrial payment protocol: The SET purchase phase. In V. Atluri, editor, 9th ACM Conference on Computer and Communications Security (CCS’02), pages 12–20, Washington, DC, Nov. 2002. ACM Press.
4. G. Bella and L. C. Paulson. Using Isabelle to prove properties of the Kerberos authentication system. In DIMACS Workshop on Design and Formal Verification of Security Protocols, Piscataway, NJ, Sept. 1997.
5. Lect Notes Comput Sci;G. Bella,1998
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献