共 63 条
[1]
Acciai L, 2008, LECT NOTES COMPUT SC, V5065, P642, DOI 10.1007/978-3-540-68679-8_40
[2]
[Anonymous], 2002, Types and Programming Languages
[3]
Bettini L, 2008, LECT NOTES COMPUT SC, V5201, P418, DOI 10.1007/978-3-540-85361-9_33
[4]
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
[J].
PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM,
2009,
:124-+
[5]
Bocchi L, 2010, LECT NOTES COMPUT SC, V6269, P162, DOI 10.1007/978-3-642-15375-4_12
[6]
Bocchi L, 2013, LECT NOTES COMPUT SC, V7892, P50
[7]
Bonelli E, 2008, LECT NOTES COMPUT SC, V4912, P240
[8]
Boreale M, 2008, LECT NOTES COMPUT SC, V5051, P19, DOI 10.1007/978-3-540-68863-1_3
[10]
Bruni R, 2008, LECT NOTES COMPUT SC, V5140, P100