Login / Signup
Secure implementations of typed channel abstractions.
Michele Bugliesi
Marco Giunti
Published in:
POPL (2007)
Keyphrases
</>
covert channel
multi channel
higher order
security requirements
multiple access
high level
key management
security analysis
authentication scheme
data encryption
databases
efficient implementation
security protocols
identity management
lambda calculus