|
Journals in DBLP
- Dan S. Wallach, Andrew W. Appel, Edward W. Felten
SAFKASI: a security mechanism for language-based systems. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:341-378 [Journal]
- Philip W. L. Fong, Robert D. Cameron
Proof linking: modular verification of mobile programs in the presence of lazy, dynamic linking. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:379-409 [Journal]
- Andrew C. Myers, Barbara Liskov
Protecting privacy using the decentralized label model. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:410-442 [Journal]
- Edmund M. Clarke, Somesh Jha, Wilfredo R. Marrero
Verifying security protocols with Brutus. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:443-487 [Journal]
- Antonio Durante, Riccardo Focardi, Roberto Gorrieri
A compiler for analyzing cryptographic protocols using noninterference. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2000, v:9, n:4, pp:488-528 [Journal]
|