Verified Interoperable Implementations of Security Protocols (English)
- New search for: Bhargavan, K.
- New search for: Fournet, C.
- New search for: Gordon, A.D.
- New search for: Tse, S.
- New search for: Bhargavan, K.
- New search for: Fournet, C.
- New search for: Gordon, A.D.
- New search for: Tse, S.
In:
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS
;
31
, 1
;
(57 pages)
;
2009
-
ISSN:
- Article (Journal) / Print
-
Title:Verified Interoperable Implementations of Security Protocols
-
Contributors:
-
Published in:ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS ; 31, 1 ; (57 pages)
-
Publisher:
- New search for: ACM ASSOCIATION FOR COMPUTING MACHINERY
-
Publication date:2009-01-01
-
Size:(57 pages)
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 005.1
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 005.1 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 31, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- (43pages)
-
Efficient Constraint Propagation EnginesSchulte, C. / Stuckey, P.J. et al. | 2009
- (46pages)
-
A Probabilistic Language Based on Sampling FunctionsPark, S. / Pfenning, F. / Thrun, S. et al. | 2009
-
Article 5 (57 pages) - Verified Interoperable Implementations of Security ProtocolsBhargavan, K. et al. | 2009
-
Article 3 (63 pages) - Decomposing Bytecode Verification by Abstract InterpretationBernardeschi, C. et al. | 2009
-
Verified Interoperable Implementations of Security ProtocolsBhargavan, K. / Fournet, C. / Gordon, A.D. / Tse, S. et al. | 2009
-
Article 1 (48 pages) - A Programming Model for Concurrent Object-Oriented ProgramsJacobs, B. et al. | 2009
-
A Programming Model for Concurrent Object-Oriented ProgramsJacobs, B. / Piessens, F. / Smans, J. / Leino, K.R.M. / Schulte, W. et al. | 2009
-
Decomposing Bytecode Verification by Abstract InterpretationBernardeschi, C. / De Francesco, N. / Lettieri, G. / Martini, L. / Masci, P. et al. | 2009
-
Article 2 (43 pages) - Efficient Constraint Propagation EnginesSchulte, C. et al. | 2009
-
Article 4 (46 pages) - A Probabilistic Language Based on Sampling FunctionsPark, S. et al. | 2009