Peeter Laud. Secrecy types for a simulatable cryptographic library. In Vijay Atluri, Catherine Meadows, Ari Juels, editors, Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005. pages 26-35, ACM, 2005. [doi]
@inproceedings{Laud05, title = {Secrecy types for a simulatable cryptographic library}, author = {Peeter Laud}, year = {2005}, doi = {10.1145/1102120.1102126}, url = {http://doi.acm.org/10.1145/1102120.1102126}, researchr = {https://researchr.org/publication/Laud05}, cites = {0}, citedby = {0}, pages = {26-35}, booktitle = {Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, publisher = {ACM}, isbn = {1-59593-226-7}, }