Ðð Blockinøöóòò Aeóøø× Ò Ìììóööøø Blockin Blockinð Óñôùøøö Ë Blockin
暂无分享,去创建一个
[1] Andrew D. Gordon,et al. A Concurrent Object Calculus: Reduction and Typing , 1998, HLCL.
[2] Gérard Berry,et al. The chemical abstract machine , 1989, POPL '90.
[3] Naoki Kobayashi. A partially deadlock-free typed process calculus , 1998, TOPL.
[4] Scott F. Smith,et al. Static enforcement of security with types , 2000, ICFP '00.
[5] Vasco Thudichum Vasconcelos,et al. Language Primitives and Type Discipline for Structured Communication-Based Programming Revisited: Two Systems for Higher-Order Session Communication , 1998, SecReT@ICALP.
[6] Bengt Nordström,et al. Programming in Martin-Lo¨f's type theory: an introduction , 1990 .
[7] Nobuko Yoshida,et al. Secure Information Flow as Typed Process Behaviour , 2000, ESOP.
[8] David K. Gifford,et al. Integrating functional and imperative programming , 1986, LFP '86.
[9] Simon S. Lam,et al. A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[10] Kohei Honda,et al. An Interaction-based Language and its Typing System , 1994, PARLE.
[11] Somesh Jha,et al. Model Checking for Security Protocols , 1997 .
[12] F. Nielson,et al. From CML to process Algebras , 1993 .
[13] Martín Abadi,et al. Object Types against Races , 1999, CONCUR.
[14] James Riely,et al. Resource Access Control in Systems of Mobile Agents , 2002, Inf. Comput..
[15] Atsushi Igarashi,et al. A generic type system for the Pi-calculus , 2001, POPL '01.
[16] Gene Tsudik,et al. Di e-hellman key distribution extended to groups , 1996, CCS 1996.
[17] Sagar Chaki,et al. Types as models: model checking message-passing programs , 2002, POPL '02.
[18] Robin Milner,et al. Communicating and mobile systems - the Pi-calculus , 1999 .
[19] Andrew D. Gordon,et al. Typing correspondence assertions for communication protocols , 2003, Theor. Comput. Sci..
[20] Dal ZilioSilvano,et al. Region analysis and a -calculus with groups , 2002 .
[21] Davide Sangiorgi,et al. Communicating and Mobile Systems: the π-calculus, , 2000 .
[22] Gene Tsudik,et al. CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[23] Davide Sangiorgi,et al. Typing and subtyping for mobile processes , 1993, [1993] Proceedings Eighth Annual IEEE Symposium on Logic in Computer Science.
[24] Flemming Nielson,et al. Higher-order concurrent programs with finite communication topology (extended abstract) , 1994, POPL '94.
[25] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[26] Joannes M. Lucassen. Types and Effects Towards the Integration of Functional and Imperative Programming. , 1987 .
[27] Mads Tofte,et al. Region-based Memory Management , 1997, Inf. Comput..
[28] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[29] David Walker,et al. Typed memory management in a calculus of capabilities , 1999, POPL '99.
[30] James Riely,et al. Resource Access Control in Systems of Mobile Agents , 2002, HLCL.
[31] Andrew D. Gordon,et al. Authenticity by typing for security protocols , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[32] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[33] Andrew D. Gordon,et al. Region analysis and a pi-calculus with groups , 2002, J. Funct. Program..
[34] Andrew D. Gordon,et al. Types and effects for asymmetric cryptographic protocols , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.