Cited By
View all- Skalka CSmith S(2018)Static use-based object confinementInternational Journal of Information Security10.1007/s10207-004-0049-54:1-2(87-104)Online publication date: 24-Dec-2018
- Soni PBudianto ESaxena PRay ILi NKruegel C(2015)The SICILIAN DefenseProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security10.1145/2810103.2813710(1542-1557)Online publication date: 12-Oct-2015
- Kolundžija M(2009)Security Types for Sessions and PipelinesWeb Services and Formal Methods10.1007/978-3-642-01364-5_11(175-190)Online publication date: 30-Apr-2009
- Show More Cited By