Leendert van Doorn, Martín Abadi, Mike Burrows, and Edward Wobber
|Published in||Proceedings of the 1996 IEEE Symposium on Security and Privacy|
|Publisher||IEEE Computer Society|
Copyright © 1996 IEEE. Reprinted from IEEE Computer Society. This material is posted here with permission of the IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to firstname.lastname@example.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.