Author:
Bauer Matthew S.,Chadha Rohit,Viswanathan Mahesh
Publisher
Springer Berlin Heidelberg
Reference33 articles.
1. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: 28th ACM Symposium on Principles of Programming Languages (POPL 2001), pp. 104–115 (2001)
2. Andova, S., Cremers, C.J.F., Gjøsteen, K., Mauw, S., Mjølsnes, S.F., Radomirovic, S.: A framework for compositional verification of security protocols. Inform. Comput. 206(2–4), 425–459 (2008)
3. Arapinis, M., Cheval, V., Delaune, S.: Composing security protocols: from confidentiality to privacy.
http://arxiv.org/pdf/1407.5444v3.pdf
4. Arapinis, M., Cheval, V., Delaune, S.: Verifying privacy-type properties in a modular way. In: 25th IEEE Computer Security Foundations Symposium (CSF 2012), pp. 95–109. IEEE Computer Society Press, Cambridge (2012)
5. Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence);M Arapinis,2008
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献