Author:
Haack Christian,Jeffrey Alan
Subject
Computational Theory and Mathematics,Computer Science Applications,Information Systems,Theoretical Computer Science
Reference39 articles.
1. Secrecy by typing in security protocols;Abadi;Journal of the ACM,1999
2. Security protocols and their properties;Abadi;20th International Summer School on Foundations of Secure Computation,1999
3. Secrecy types for asymmetric communication;Abadi,2001
4. M. Abadi, B. Blanchet, Analyzing security protocols with secrecy types and logic programs, in: 29th ACM Symposium on Principles of Programming Languages, 2002, pp. 33–44.
5. M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in: 28th ACM Symposium on Principles of Programming Languages, 2001, pp. 104–115.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献