Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference10 articles.
1. B. Blanchet, An efficient cryptographic protocol verifier based on Prolog rules, in: 14th IEEE Computer Security Foundations Workshop (CSFW-14), June 2001, pp. 82–96
2. I. Cervesato, N. Durgin, M. Kanovich, A. Scedrov, Interpreting strands in linear logic, in: 2000 Workshop on Formal Methods and Computer Security, CAV 2000 Satellite Workshop, July 2000
3. I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, A. Scedrov, A meta-notation for protocol analysis, in: 12th IEEE Computer Security Foundation Workshop (CSFW-12), June 1999, pp. 55–69
4. P. Cousot, R. Cousot, Systematic design of program analysis frameworks, in: Proc. 6th Annual ACM Symposium on Principles of Programming Languages, 29–31 January 1979, pp. 269–282
5. G. Denker, J. Meseguer, C. Talcott, Protocol specification and analysis in maude, in: Workshop on Formal Methods and Security Protocols (FMSP'98), 25 June 1998
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献