David Cadé, Bruno Blanchet. Proved Generation of Implementations from Computationally Secure Protocol Specifications. In David A. Basin, John C. Mitchell, editors, Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Volume 7796 of Lecture Notes in Computer Science, pages 63-82, Springer, 2013. [doi]
@inproceedings{CadeB13, title = {Proved Generation of Implementations from Computationally Secure Protocol Specifications}, author = {David Cadé and Bruno Blanchet}, year = {2013}, doi = {10.1007/978-3-642-36830-1_4}, url = {http://dx.doi.org/10.1007/978-3-642-36830-1_4}, researchr = {https://researchr.org/publication/CadeB13}, cites = {0}, citedby = {0}, pages = {63-82}, booktitle = {Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings}, editor = {David A. Basin and John C. Mitchell}, volume = {7796}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-36829-5}, }