Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             14 results found
no title author magazine year volume issue page(s) type
1 A simple framework for real-time cryptographic protocol analysis with compositional proof rules Gorrieri, Roberto
2004
50 1-3 p. 23-49
27 p.
article
2 Author Index 2004
50 1-3 p. 273-
1 p.
article
3 Automatic software model checking via constraint logic Flanagan, Cormac
2004
50 1-3 p. 253-270
18 p.
article
4 Building certified libraries for PCC: dynamic storage allocation Yu, Dachuan
2004
50 1-3 p. 101-127
27 p.
article
5 Correctness of data representations involving heap data structures Reddy, Uday S.
2004
50 1-3 p. 129-160
32 p.
article
6 Editorial Board 2004
50 1-3 p. ii-
1 p.
article
7 On the secure implementation of security protocols Giambiagi, Pablo
2004
50 1-3 p. 73-99
27 p.
article
8 Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols Meadows, Catherine
2004
50 1-3 p. 3-22
20 p.
article
9 Preface Degano, Pierpaolo
2004
50 1-3 p. 1-
1 p.
article
10 Publisher's note 2004
50 1-3 p. 271-
1 p.
article
11 Register allocation by proof transformation Ohori, Atsushi
2004
50 1-3 p. 161-187
27 p.
article
12 Security properties: two agents are sufficient Comon-Lundh, Hubert
2004
50 1-3 p. 51-71
21 p.
article
13 Type error slicing in implicitly typed higher-order languages Haack, Christian
2004
50 1-3 p. 189-224
36 p.
article
14 Type inference for a distributed π-calculus Lhoussaine, Cédric
2004
50 1-3 p. 225-251
27 p.
article
                             14 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands