Author:
Chothia Tom,Duggan Dominic,Wu Ye
Subject
General Computer Science,Theoretical Computer Science
Reference43 articles.
1. Abadi, M., Secrecy by typing in security protocols, in: Theoretical Aspects of Computer Science, 1997, pp. 611–638
2. Abadi, M. and B. Blanchet, Analyzing security protocols with secrecy types and logic programs, in: Proceedings of ACM Symposium on Principles of Programming Languages, 2002, pp. 33–44
3. Appel, A. and E. Felten, Proof-carrying authentication, in: ACM Symposium on Security, 2000
4. Appel, A. W., Foundational proof-carrying code, in: Proceedings of IEEE Symposium on Logic in Computer Science, 2001
5. Bauer, L., “Access Control for the Web via Proof-carrying Authorization,” Ph.D. thesis, Princeton University (2003)