


default search action
Science of Computer Programming, Volume 50
Volume 50, Number 1-3, March 2004
- Pierpaolo Degano:

Preface. 1 - Catherine Meadows:

Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols. 3-22 - Roberto Gorrieri

, Fabio Martinelli:
A simple framework for real-time cryptographic protocol analysis with compositional proof rules. 23-49 - Hubert Comon-Lundh, Véronique Cortier:

Security properties: two agents are sufficient. 51-71 - Pablo Giambiagi, Mads Dam:

On the secure implementation of security protocols. 73-99 - Dachuan Yu, Nadeem Abdul Hamid

, Zhong Shao
:
Building certified libraries for PCC: dynamic storage allocation. 101-127 - Uday S. Reddy, Hongseok Yang:

Correctness of data representations involving heap data structures. 129-160 - Atsushi Ohori:

Register allocation by proof transformation. 161-187 - Christian Haack, Joe B. Wells:

Type error slicing in implicitly typed higher-order languages. 189-224 - Cédric Lhoussaine:

Type inference for a distributed \pi-calculus. 225-251 - Cormac Flanagan:

Automatic software model checking via constraint logic. 253-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














