Cited By
View all- Bhargavan KFournet CGordon ATse S(2008)Verified interoperable implementations of security protocolsACM Transactions on Programming Languages and Systems10.1145/1452044.145204931:1(1-61)Online publication date: 12-Dec-2008
- Bhargavan KFournet CGordon ASwamy NAbe MGligor V(2008)Verified implementations of the information card federated identity-management protocolProceedings of the 2008 ACM symposium on Information, computer and communications security10.1145/1368310.1368330(123-135)Online publication date: 18-Mar-2008
- Jürjens J(2008)Model-Based Run-Time Checking of Security Permissions Using Guarded ObjectsRuntime Verification10.1007/978-3-540-89247-2_3(36-50)Online publication date: 30-Mar-2008
- Show More Cited By