Science of Computer Programming
, Volume 50
Volume 50, Number 1-3, March 2004
Pierpaolo Degano
:
Preface.
1
Electronic Edition
(link)
BibTeX
Catherine Meadows
:
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols.
3-22
Electronic Edition
(link)
BibTeX
Roberto Gorrieri
,
Fabio Martinelli
:
A simple framework for real-time cryptographic protocol analysis with compositional proof rules.
23-49
Electronic Edition
(link)
BibTeX
Hubert Comon-Lundh
,
Véronique Cortier
:
Security properties: two agents are sufficient.
51-71
Electronic Edition
(link)
BibTeX
Pablo Giambiagi
,
Mads Dam
:
On the secure implementation of security protocols.
73-99
Electronic Edition
(link)
BibTeX
Dachuan Yu
,
Nadeem Abdul Hamid
,
Zhong Shao
:
Building certified libraries for PCC: dynamic storage allocation.
101-127
Electronic Edition
(link)
BibTeX
Uday S. Reddy
,
Hongseok Yang
:
Correctness of data representations involving heap data structures.
129-160
Electronic Edition
(link)
BibTeX
Atsushi Ohori
:
Register allocation by proof transformation.
161-187
Electronic Edition
(link)
BibTeX
Christian Haack
,
Joe B. Wells
:
Type error slicing in implicitly typed higher-order languages.
189-224
Electronic Edition
(link)
BibTeX
Cédric Lhoussaine
:
Type inference for a distributed \pi-calculus.
225-251
Electronic Edition
(link)
BibTeX
Cormac Flanagan
:
Automatic software model checking via constraint logic.
253-270
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:18:41 2009 by
Michael Ley
(
ley@uni-trier.de
)