Login / Signup

Combining Different Proof Techniques for Verifying Information Flow Security.

Heiko MantelHenning SudbrockTina Kraußer
Published in: LOPSTR (2006)
Keyphrases