default search action
Science of Computer Programming, Volume 50
Volume 50, Number 1-3, March 2004
- Pierpaolo Degano:
Preface. 1 - Catherine Meadows:
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols. 3-22 - Roberto Gorrieri, Fabio Martinelli:
A simple framework for real-time cryptographic protocol analysis with compositional proof rules. 23-49 - Hubert Comon-Lundh, Véronique Cortier:
Security properties: two agents are sufficient. 51-71 - Pablo Giambiagi, Mads Dam:
On the secure implementation of security protocols. 73-99 - Dachuan Yu, Nadeem Abdul Hamid, Zhong Shao:
Building certified libraries for PCC: dynamic storage allocation. 101-127 - Uday S. Reddy, Hongseok Yang:
Correctness of data representations involving heap data structures. 129-160 - Atsushi Ohori:
Register allocation by proof transformation. 161-187 - Christian Haack, Joe B. Wells:
Type error slicing in implicitly typed higher-order languages. 189-224 - Cédric Lhoussaine:
Type inference for a distributed \pi-calculus. 225-251 - Cormac Flanagan:
Automatic software model checking via constraint logic. 253-270
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.