Program synthesis for interactive-security systems
From MaRDI portal
Recommendations
Cites work
- A lattice model of secure information flow
- Computer Aided Verification
- Efficient secure two-party protocols. Techniques and constructions
- Laminar
- Modular strategies for recursive game graphs
- Probabilistic relational verification for cryptographic implementations
- Secure distributed programming with value-dependent types
- Towards fully automatic placement of security sanitizers and declassifiers
- Visibly pushdown languages
This page was built for publication: Program synthesis for interactive-security systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1696589)