Active Bibliography

1111 Proof-Carrying Code – George C. Necula - 1997
595 From System F to Typed Assembly Language – Greg Morrisett, David Walker, Karl Crary, Neal Glew - 1998
802 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
685 Ariadne: A secure on-demand routing protocol for ad hoc networks – Yih-chun Hu - 2002
615 Exokernel: An Operating System Architecture for Application-Level Resource Management – Dawson R. Engler, M. Frans Kaashoek, James O’toole - 1995
1344 Xen and the art of virtualization – Paul Barham, Boris Dragovic, Keir Fraser, Steven H, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield
590 Language-Based Information-Flow Security – Andrei Sabelfeld , Andrew C. Myers - 2003
726 Proof verification and hardness of approximation problems – Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, Mario Szegedy - 1992
649 Some optimal inapproximability results – Johan Håstad - 2002