An overview of JML tools and applications
Publication year
2003Author(s)
Publisher
Springer-Verlag
Source
Electronic Notes in Theoretical Computer Science, 80, (2003), pp. 75-91ISSN
Publication type
Article / Letter to editor
Display more detailsDisplay less details
Organization
Security of Systems
Digital Security
Journal title
Electronic Notes in Theoretical Computer Science
Volume
vol. 80
Page start
p. 75
Page end
p. 91
Subject
Security of SystemsThis item appears in the following Collection(s)
- Academic publications [246515]
- Electronic publications [134157]
- Faculty of Science [38028]
- Open Access publications [107690]
Upload full text
Use your RU credentials (u/z-number and password) to log in with SURFconext to upload a file for processing by the repository team.