Active Bibliography

518 A SOUND TYPE SYSTEM FOR SECURE FLOW ANALYSIS – Dennis Volpano, Geoffrey Smith, Cynthia Irvine - 1996
1436 Monads for functional programming – Philip Wadler - 1995
755 A Framework for Defining Logics – Robert Harper , Furio Honsell, Gordon Plotkin - 1993
522 Fully homomorphic encryption using ideal lattices – Craig Gentry - 2009
584 Data Security – Dorothy E. Denning, Peter J. Denning - 1979
587 Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems – Paul C. Kocher - 1996
1457 The Byzantine Generals Problem – Leslie Lamport, Robert Shostak, Marshall Pease - 1982
502 Authentication in distributed systems: Theory and practice – Butler Lampson, Martín Abadi, Michael Burrows, Edward Wobber - 1992
2263 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001