Secrecy by typing in security protocols
Journal of the ACM (JACM)
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Mobile values, new names, and secure communication
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Secure implementation of channel abstractions
Information and Computation
Building secure file systems out of byzantine storage
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers
Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers
Authenticating Network-Attached Storage
IEEE Micro
Strong Security for Network-Attached Storage
FAST '02 Proceedings of the Conference on File and Storage Technologies
Protection in Programming-Language Translations
ICALP '98 Proceedings of the 25th International Colloquium on Automata, Languages and Programming
Typing correspondence assertions for communication protocols
Theoretical Computer Science
Security for a high performance commodity storage subsystem
Security for a high performance commodity storage subsystem
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Formal analysis of dynamic, distributed file-system access controls
FORTE'06 Proceedings of the 26th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Formal approaches to location management in mobile communications
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Hi-index | 0.00 |