no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A simple framework for real-time cryptographic protocol analysis with compositional proof rules
|
Gorrieri, Roberto |
|
2004 |
50 |
1-3 |
p. 23-49 27 p. |
article |
2 |
Author Index
|
|
|
2004 |
50 |
1-3 |
p. 273- 1 p. |
article |
3 |
Automatic software model checking via constraint logic
|
Flanagan, Cormac |
|
2004 |
50 |
1-3 |
p. 253-270 18 p. |
article |
4 |
Building certified libraries for PCC: dynamic storage allocation
|
Yu, Dachuan |
|
2004 |
50 |
1-3 |
p. 101-127 27 p. |
article |
5 |
Correctness of data representations involving heap data structures
|
Reddy, Uday S. |
|
2004 |
50 |
1-3 |
p. 129-160 32 p. |
article |
6 |
Editorial Board
|
|
|
2004 |
50 |
1-3 |
p. ii- 1 p. |
article |
7 |
On the secure implementation of security protocols
|
Giambiagi, Pablo |
|
2004 |
50 |
1-3 |
p. 73-99 27 p. |
article |
8 |
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols
|
Meadows, Catherine |
|
2004 |
50 |
1-3 |
p. 3-22 20 p. |
article |
9 |
Preface
|
Degano, Pierpaolo |
|
2004 |
50 |
1-3 |
p. 1- 1 p. |
article |
10 |
Publisher's note
|
|
|
2004 |
50 |
1-3 |
p. 271- 1 p. |
article |
11 |
Register allocation by proof transformation
|
Ohori, Atsushi |
|
2004 |
50 |
1-3 |
p. 161-187 27 p. |
article |
12 |
Security properties: two agents are sufficient
|
Comon-Lundh, Hubert |
|
2004 |
50 |
1-3 |
p. 51-71 21 p. |
article |
13 |
Type error slicing in implicitly typed higher-order languages
|
Haack, Christian |
|
2004 |
50 |
1-3 |
p. 189-224 36 p. |
article |
14 |
Type inference for a distributed π-calculus
|
Lhoussaine, Cédric |
|
2004 |
50 |
1-3 |
p. 225-251 27 p. |
article |