Author:
López Hugo A.,Palamidessi Catuscia,Pérez Jorge A.,Rueda Camilo,Valencia Frank D.
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Amadio, R., Lugiez, D., Vanackere, V.: On the symbolic reduction of processes with cryptographic functions. TCS: Theoretical Computer Science 290 (2003)
2. Lecture Notes in Computer Science;M. Boreale,2002
3. Crazzolara, F., Winskel, G.: Events in security protocols. In: Samarati, P. (ed.) Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, pp. 96–105. ACM Press, New York (2001)
4. Fiore, M., Abadi, M.: Computing symbolic models for verifying cryptographic protocols. In: 14th IEEE Computer Security Foundations Workshop, pp. 160–173. IEEE Computer Society Press, Los Alamitos (2001)
5. Nielsen, M., Palamidessi, C., Valencia, F.: Temporal concurrent constraint programming: Denotation, logic and applications. Nordic Journal of Computing 9(2), 145–188 (2002)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献