swMATH11482MaRDI QIDQ23424FDOQ23424
Author name not available (Why is that?)
Official website: http://dl.acm.org/citation.cfm?doid=1411204.1411212
Cited In (17)
- Logic in Access Control (Tutorial Notes)
- The locally nameless representation
- A Classical Realizability Model for a Semantical Value Restriction
- Cayenne
- Ynot
- Aglet
- Security-typed programming within dependently typed programming
- DKAL
- Fable
- G2C
- Binder
- F*
- Secure distributed programming with value-dependent types
- Secure distributed programming with value-dependent types
- Noninterference in a predicative polymorphic calculus for access control
- G2C: cryptographic protocols from goal-driven specifications
- Combining proofs and programs in a dependently typed language
This page was built for software: AURA