Proved Generation of Implementations from Computationally Secure Protocol Specifications

David Cadé, Bruno Blanchet. Proved Generation of Implementations from Computationally Secure Protocol Specifications. In David A. Basin, John C. Mitchell, editors, Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Volume 7796 of Lecture Notes in Computer Science, pages 63-82, Springer, 2013. [doi]

Abstract

Abstract is missing.