<--- Back to Details
First PageDocument Content
Cryptography / Formal methods / Theoretical computer science / Computing / Computer security / Logic in computer science / Public key infrastructure / Formal verification / Correctness / Proof-carrying code / Authentication / Code signing
Date: 2010-01-27 19:53:39
Cryptography
Formal methods
Theoretical computer science
Computing
Computer security
Logic in computer science
Public key infrastructure
Formal verification
Correctness
Proof-carrying code
Authentication
Code signing

Advances in Programming Languages Certifying correctness David Aspinall School of Informatics The University of Edinburgh

Add to Reading List

Source URL: www.inf.ed.ac.uk

Download Document from Source Website

File Size: 320,06 KB

Share Document on Facebook

Similar Documents

Alloy as an Introduction to Formal Methods

Alloy as an Introduction to Formal Methods

DocID: 1xVY1 - View Document

Integrated Formal Methods

Integrated Formal Methods

DocID: 1xVBb - View Document

Trust in Formal Methods Toolchains Arie Gurfinkel Software Engineering Institute Carnegie Mellon University

Trust in Formal Methods Toolchains Arie Gurfinkel Software Engineering Institute Carnegie Mellon University

DocID: 1xUHE - View Document

Formal Methods in System Design manuscript No. (will be inserted by the editor) Inferring Event Stream Abstractions Sean Kauffman · Klaus Havelund · Rajeev Joshi · Sebastian Fischmeister

Formal Methods in System Design manuscript No. (will be inserted by the editor) Inferring Event Stream Abstractions Sean Kauffman · Klaus Havelund · Rajeev Joshi · Sebastian Fischmeister

DocID: 1xUCm - View Document

Formal Methods in System Design manuscript No.  (will be inserted by the editor) Automatic Verification of Competitive Stochastic Systems Taolue Chen · Vojtˇ

Formal Methods in System Design manuscript No. (will be inserted by the editor) Automatic Verification of Competitive Stochastic Systems Taolue Chen · Vojtˇ

DocID: 1xUrV - View Document