共 50 条
- [2] Proved Generation of Implementations from Computationally Secure Protocol Specifications PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 63 - 82
- [4] Refinement Types for Secure Implementations ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2011, 33 (02):
- [5] Secure Implementations for the Internet of Things SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 2 - 2
- [6] Refinement types for secure implementations CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 17 - +
- [7] Secure Boot Revisited: Challenges for Secure Implementations in the Automotive Domain SAE International Journal of Transportation Cybersecurity and Privacy, 2020, 2 (02):
- [8] Efficient and secure source authentication with packet passports USENIX ASSOCIATION PROCEEDINGS OF THE 2ND WORKSHOP ON STEPS TO REDUCING UNWANTED TRAFFIC ON THE INTERNET, 2006, : 7 - +
- [9] Noninterference specifications for secure systems Operating Systems Review (ACM), 2020, 54 (01): : 31 - 39