Documents Related by Co-Citation

70 Subtyping Dependent Types – David Aspinall, Adriana Compagnoni - 2000
696 A Framework for Defining Logics – Robert Harper , Furio Honsell, Gordon Plotkin - 1993
172 Refinement types for ML – Tim Freeman - 1994
520 Lambda Calculi with Types – Henk Barendregt, S. Abramsky, D. M. Gabbay, T. S. E. Maibaum, H. P. Barendregt - 1992
217 A Linear Logical Framework – Iliano Cervesato, Frank Pfenning - 1996
33 CAPSL Intermediate Language – G. Denker, J. Millen - 1999
142 A meta-notation for protocol analysis – I. Cervesato, N. A. Durgin, P. D. Lincoln, J. C. Mitchell, A. Scedrov - 1999
862 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
1044 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
87 A modest model of records, inheritance, and bounded quantification – Kim B Bruce, Giuseppe Longo
260 Programming in Martin-Löf’s Type Theory. An Introduction – B Nordström, K Petersson, J M Smith - 1990
68 The Theory of LEGO - A Proof Checker for the Extended Calculus of Constructions – Robert Pollack - 1994
291 A logic programming language with lambda-abstraction, function variables, and simple unification – Dale Miller - 1990
8 and Adriana Compagnoni. Subtyping dependent types – David Aspinall - 1996
783 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
354 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
12 Typed Multiset Rewriting Specifications of Security Protocols – Iliano Cervesato - 2001
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
236 The NRL Protocol Analyzer: An Overview – Catherine Meadows - 1996