Subtyping Dependent Types (2000)

by David Aspinall , Adriana Compagnoni
Citations:68 - 6 self

Documents Related by Co-Citation

42 Refinement Types for Logical Frameworks – Frank Pfenning - 1993
891 A Theory of Objects – Luca Cardelli, Martín Abadi - 1996
782 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
860 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
1043 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
695 A Framework for Defining Logics – Robert Harper , Furio Honsell, Gordon Plotkin - 1993
354 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
142 A meta-notation for protocol analysis – I. Cervesato, N. A. Durgin, P. D. Lincoln, J. C. Mitchell, A. Scedrov - 1999
33 CAPSL Intermediate Language – G. Denker, J. Millen - 1999
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
226 A survey of authentication protocol literature – John Clark, Jeremy Jacob - 1997
107 Spaces: Why is a Security Protocol Correct – Strand - 1998
32 Typed MSR: Syntax and Examples – Iliano Cervesato - 2001
12 Typed Multiset Rewriting Specifications of Security Protocols – Iliano Cervesato - 2001
236 The NRL Protocol Analyzer: An Overview – Catherine Meadows - 1996
49 Relating Strands and Multiset Rewriting for Security Protocol Analysis (Extended Abstract) – I. Cervesato, N. Durgin, J. Mitchell, P. Lincoln, A. Scedrov - 2000
21 Interpreting Strands in Linear Logic – I. Cervesato, N. Durgin, M. Kanovich, A. Scedrov - 2000
125 A.: Undecidability of bounded security protocols – N A Durgin, P D Lincoln, J C Mitchell, Scedrov - 1999
99 Key management for large dynamic groups: One-way function trees and amortized initialization – D. Balenson, D. McGrew, A. Sherman - 2000