Cited By
View all- Gancher JGibson SSingh PDharanikota SParno B(2023)Owl: Compositional Verification of Security Protocols via an Information-Flow Type System2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179477(1130-1147)Online publication date: May-2023
- Jia LVaughan JMazurak KZhao JZarko LSchorr JZdancewic SHook JThiemann P(2008)AURAProceedings of the 13th ACM SIGPLAN international conference on Functional programming10.1145/1411204.1411212(27-38)Online publication date: 20-Sep-2008
- Jia LVaughan JMazurak KZhao JZarko LSchorr JZdancewic S(2008)AURAACM SIGPLAN Notices10.1145/1411203.141121243:9(27-38)Online publication date: 20-Sep-2008
- Show More Cited By