共 40 条
- [11] Backes M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P66
- [12] Backes Michael, LIB SOURCE CODE F7 T
- [13] Backes Michael, 2010, 2014416 IACR EPRINT
- [14] Basin D., 2004, INT J INFORM SECURIT
- [15] Baudet M, 2005, LECT NOTES COMPUT SC, V3580, P652
- [16] Refinement types for secure implementations [J]. CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 17 - +
- [17] Bhargavan K., 2010, P 37 S PRINC PROGR L
- [18] Bhargavan K., P 19 IEEE COMP SEC F, P139
- [19] Bhargavan K, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P459
- [20] An efficient cryptographic protocol verifier based on prolog rules [J]. 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 82 - 96