Documents Related by Co-Citation

68 Subtyping Dependent Types – David Aspinall, Adriana Compagnoni - 2000
696 A Framework for Defining Logics – Robert Harper , Furio Honsell, Gordon Plotkin - 1993
172 Refinement types for ML – Tim Freeman - 1994
518 Lambda Calculi with Types – Henk Barendregt, S. Abramsky, D. M. Gabbay, T. S. E. Maibaum, H. P. Barendregt - 1992
215 A Linear Logical Framework – Iliano Cervesato, Frank Pfenning - 1996
33 CAPSL Intermediate Language – G. Denker, J. Millen - 1999
864 Using encryption for authentication in large networks of computers – R M Needham, M D Schroeder
143 A meta-notation for protocol analysis – I. Cervesato, N. A. Durgin, P. D. Lincoln, J. C. Mitchell, A. Scedrov - 1999
1047 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
87 A modest model of records, inheritance, and bounded quantification – Kim B Bruce, Giuseppe Longo
261 Programming in Martin-Löf’s Type Theory: An Introduction – B Nordstrom, K Petersson, J M Smith - 1990
68 The Theory of LEGO - A Proof Checker for the Extended Calculus of Constructions – Robert Pollack - 1994
287 A logic programming language with lambda-abstraction, function variables, and simple unification – Dale Miller - 1990
8 and Adriana Compagnoni. Subtyping dependent types – David Aspinall - 1996
12 Typed Multiset Rewriting Specifications of Security Protocols – Iliano Cervesato - 2001
236 The NRL Protocol Analyzer: An Overview – Catherine Meadows - 1996
1138 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
785 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
357 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994