共 11 条
[2]
Alves Nuno, 2009, THESIS
[3]
Bejleri Andi, P ETAPS WORKSH PROGR, DOI [10.4204/EPTCS.17.2, DOI 10.4204/EPTCS.17.2]
[4]
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
[J].
PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM,
2009,
:124-+
[5]
Secure implementations for typed session abstractions
[J].
20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS,
2007,
:170-186
[6]
Multiparty Asynchronous Session Types
[J].
POPL'08: PROCEEDINGS OF THE 35TH ANNUAL ACM SIGPLAN-SIGACT SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES,
2008,
:273-284
[7]
Honda Kohei, 1998, ESOP 98, DOI [10.1016/j.entes.2007.02.056, DOI 10.1016/J.ENTES.2007.02.056]
[8]
Hu R, 2008, LECT NOTES COMPUT SC, V5142, P516, DOI 10.1007/978-3-540-70592-5_22
[9]
Mostrous D, 2009, LECT NOTES COMPUT SC, V5608, P203, DOI 10.1007/978-3-642-02273-9_16
[10]
Taylor D., 2007, 5054 RFC