Essential systems analysis
Communicating sequential processes
Communicating sequential processes
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
Dependability: Basic Concepts and Terminology
Dependability: Basic Concepts and Terminology
Non Interference for the Analysis of Cryptographic Protocols
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Intensional specifications of security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Enforceable Security Policies
Using type enforcement to assure a configurable guard
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Enforcing well-formed and partially-formed transactions for Unix
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Believing the Integrity of a System
Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)
Authorisation subterfuge by delegation in decentralised networks
Proceedings of the 13th international conference on Security protocols
Hi-index | 0.00 |