![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Abadi M. Blanchet B.
Publisher: Elsevier
ISSN: 0304-3975
Source: Theoretical Computer Science, Vol.298, Iss.3, 2003-04, pp. : 387-415
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Protocols for Asymmetric Communication Channels
Journal of Computer and System Sciences, Vol. 63, Iss. 4, 2001-12 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Secrecy in Programming-Language Semantics
By Abadi M.
Electronic Notes in Theoretical Computer Science, Vol. 20, Iss. 1, 2004-01 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)