|
ComputingReviews.com
|
Private authentication Abadi M., Fournet C. Theoretical Computer Science322(3):427-476,2004.Type:Article |
|
|
|
Published By: Elsevier Science Publishers Ltd. |
|
|
|
|
|
|
|
|
Use your personal or institutional subscription to read the fulltext of the article.
|
|
|
|
|
|
|
|
|
|
|
|