Journal: Science of Computer Programming

Volume 50, Issue 1-3

1 -- 0Pierpaolo Degano. Preface
3 -- 22Catherine Meadows. Ordering from Satan s menu: a survey of requirements specification for formal analysis of cryptographic protocols
23 -- 49Roberto Gorrieri, Fabio Martinelli. A simple framework for real-time cryptographic protocol analysis with compositional proof rules
51 -- 71Hubert Comon-Lundh, Véronique Cortier. Security properties: two agents are sufficient
73 -- 99Pablo Giambiagi, Mads Dam. On the secure implementation of security protocols
101 -- 127Dachuan Yu, Nadeem Abdul Hamid, Zhong Shao. Building certified libraries for PCC: dynamic storage allocation
129 -- 160Uday S. Reddy, Hongseok Yang. Correctness of data representations involving heap data structures
161 -- 187Atsushi Ohori. Register allocation by proof transformation
189 -- 224Christian Haack, Joe B. Wells. Type error slicing in implicitly typed higher-order languages
225 -- 251Cédric Lhoussaine. Type inference for a distributed /pi-calculus
253 -- 270Cormac Flanagan. Automatic software model checking via constraint logic