Author:
Bodei Chiara,Degano Pierpaolo,Nielson Flemming,Riis Nielson Hanne
Subject
Computational Theory and Mathematics,Computer Science Applications,Information Systems,Theoretical Computer Science
Reference44 articles.
1. Abadi, M.1999, Secrecy by typing in security protocols, J. ACM46, 749–786, September 1999. Extended Abstract, inProceedings of Theoretical Aspects of Computer Software 1997, pp. 611–638, Springer-Verlag, Berlin/New York. [Extended version to appear in J. ACM]
2. Protection in programming-language translations;Abadi,1998
3. A calculus for cryptographic protocols—The Spi calculus;Abadi;Inform. and Comput.,1999
4. An asynchronous model of locality failure, and process mobility;Amadio,1997
5. Bell, D. E, and, LaPadula, L. J. 1976, Secure Computer Systems: Unified Exposition and Multics Interpretation, Technical Report ESD-TR-75-306, Mitre C.
Cited by
60 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献