Author:
Sattarzadeh Behnam,Fallah Mehran S.
Subject
Software,Theoretical Computer Science,Computational Theory and Mathematics,Logic
Reference71 articles.
1. Secrecy by typing in security protocols;Abadi;J. ACM,1999
2. Authenticity by typing for security protocols;Gordon;J. Comput. Secur.,2003
3. Dynamic types for authentication;Bugliesi;J. Comput. Secur.,2007
4. Achieving security despite compromise using zero-knowledge;Backes,2009
5. Refinement types for secure implementations;Bengtson;ACM Trans. Program. Lang. Syst.,2011