AURA
From MaRDI portal
Software:23424
No author found.
Related Items (9)
G2C: Cryptographic Protocols from Goal-Driven Specifications ⋮ Logic in Access Control (Tutorial Notes) ⋮ The locally nameless representation ⋮ Secure distributed programming with value-dependent types ⋮ Combining proofs and programs in a dependently typed language ⋮ Security-typed programming within dependently typed programming ⋮ Secure distributed programming with value-dependent types ⋮ A Classical Realizability Model for a Semantical Value Restriction ⋮ Noninterference in a predicative polymorphic calculus for access control
This page was built for software: AURA