Proved Generation of Implementations from Computationally Secure Protocol Specifications

David Cadé, Bruno Blanchet. Proved Generation of Implementations from Computationally Secure Protocol Specifications. In David A. Basin, John C. Mitchell, editors, Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Volume 7796 of Lecture Notes in Computer Science, pages 63-82, Springer, 2013. [doi]

@inproceedings{CadeB13,
  title = {Proved Generation of Implementations from Computationally Secure Protocol Specifications},
  author = {David Cadé and Bruno Blanchet},
  year = {2013},
  doi = {10.1007/978-3-642-36830-1_4},
  url = {http://dx.doi.org/10.1007/978-3-642-36830-1_4},
  researchr = {https://researchr.org/publication/CadeB13},
  cites = {0},
  citedby = {0},
  pages = {63-82},
  booktitle = {Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings},
  editor = {David A. Basin and John C. Mitchell},
  volume = {7796},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-36829-5},
}