共 30 条
[1]
Bettini L, 2008, LECT NOTES COMPUT SC, V5201, P418, DOI 10.1007/978-3-540-85361-9_33
[2]
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
[J].
PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM,
2009,
:124-+
[3]
Bocchi L, 2010, LECT NOTES COMPUT SC, V6269, P162, DOI 10.1007/978-3-642-15375-4_12
[4]
Access control for mobile agents: The calculus of boxed ambients
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
2004, 26 (01)
:57-124
[5]
Caires L, 2009, LECT NOTES COMPUT SC, V5502, P285, DOI 10.1007/978-3-642-00590-9_21
[6]
CAPECCHI S, 2010, 30 FSTTCS 1 IN PRESS
[7]
Capecchi S, 2010, LECT NOTES COMPUT SC, V6269, P237, DOI 10.1007/978-3-642-15375-4_17
[9]
Castagna G, 2009, LECT NOTES COMPUT SC, V5710, P211, DOI 10.1007/978-3-642-04081-8_15
[10]
Corin R, 2008, LECT NOTES COMPUT SC, V4912, P276