Login / Signup

Refinement types for secure implementations.

Jesper BengtsonKarthikeyan BhargavanCédric FournetAndrew D. GordonSergio Maffeis
Published in: ACM Trans. Program. Lang. Syst. (2011)
Keyphrases
  • genetic algorithm
  • artificial intelligence
  • real time
  • data mining
  • key management
  • authentication scheme