DMCA
Refinement types for secure implementations (2008)
Cached
Download Links
- [www.doc.ic.ac.uk]
- [research.microsoft.com]
- [research.microsoft.com]
- [www.research.microsoft.com]
- [research.microsoft.com]
- [research.microsoft.com]
- [wwwhomes.doc.ic.ac.uk]
- [moscova.inria.fr]
- [research.microsoft.com]
- [pubs.doc.ic.ac.uk]
- [dev.pubs.doc.ic.ac.uk]
- [research.microsoft.com]
- [research.microsoft.com]
- [research.microsoft.com]
- [www.doc.ic.ac.uk]
- [prosecco.gforge.inria.fr]
- [research.microsoft.com]
- [research.microsoft.com]
- [www.research.microsoft.com]
- [research.microsoft.com]
- [research.microsoft.com]
- [research.microsoft.com]
- [www.research.microsoft.com]
- [research.microsoft.com]
- [research.microsoft.com]
- [research.microsoft.com]
- [research.microsoft.com]
- [www.research.microsoft.com]
- [research.microsoft.com]
- [research.microsoft.com]
- [research.microsoft.com]
- [research.microsoft.com]
- [www.doc.ic.ac.uk]
- [wwwhomes.doc.ic.ac.uk]
- [wwwhomes.doc.ic.ac.uk]
- [www.doc.ic.ac.uk]
- [wwwhomes.doc.ic.ac.uk]
- [www.doc.ic.ac.uk]
- [wwwhomes.doc.ic.ac.uk]
- [www.doc.ic.ac.uk]
- [uu.diva-portal.org]
- [uu.diva-portal.org]
- DBLP
Other Repositories/Bibliography
by
Jesper Bengtson
,
Karthikeyan Bhargavan
,
Cédric Fournet
,
Andrew D. Gordon
,
Sergio Maffeis
Venue: | IN 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF’08 |
Citations: | 114 - 25 self |