共 47 条
[2]
Aizatulin M., 2012, P 2012 ACM C COMPUTE, P712
[3]
Almeida J. B., CRYPTOLOGY EPRINT AR
[4]
Almeida J.B., 2013, ACM CCS
[5]
[Anonymous], 2001, Handbook of Process Algebra, DOI DOI 10.1016/B978-044482830-9/50029-1
[6]
[Anonymous], 2011, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, DOI DOI 10.1145/2046556.2046564
[7]
An indexed model of recursive types for foundational proof-carrying code
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
2001, 23 (05)
:657-683
[8]
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus
[J].
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2010,
:107-121
[10]
Barthe G, 2011, LECT NOTES COMPUT SC, V6841, P71, DOI 10.1007/978-3-642-22792-9_5