The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Martín Abadi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Martín Abadi, Zohar Manna
    Temporal Logic Programming. [Citation Graph (5, 0)][DBLP]
    SLP, 1987, pp:4-16 [Conf]
  2. Martín Abadi, Zohar Manna
    Temporal Logic Programming. [Citation Graph (5, 0)][DBLP]
    J. Symb. Comput., 1989, v:8, n:3, pp:277-295 [Journal]
  3. Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin
    Dynamic Typing in a Statically-Typed Language. [Citation Graph (3, 0)][DBLP]
    POPL, 1989, pp:213-227 [Conf]
  4. Martín Abadi, Luca Cardelli
    On Subtyping and Matching. [Citation Graph (2, 0)][DBLP]
    ECOOP, 1995, pp:145-167 [Conf]
  5. Martín Abadi, Zohar Manna
    Nonclausal Deduction in First-Order Temporal Logic [Citation Graph (2, 0)][DBLP]
    J. ACM, 1990, v:37, n:2, pp:279-317 [Journal]
  6. Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
    A Calculus for Access Control in Distributed Systems. [Citation Graph (2, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1993, v:15, n:4, pp:706-734 [Journal]
  7. Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin
    Dynamic Typing in a Statically Typed Language. [Citation Graph (2, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1991, v:13, n:2, pp:237-268 [Journal]
  8. Luca Cardelli, Florian Matthes, Martín Abadi
    Extensible Grammars for Language Specialization. [Citation Graph (1, 13)][DBLP]
    DBPL, 1993, pp:11-31 [Conf]
  9. Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Didier Rémy
    Dynamic Typing in Polymorphic Languages. [Citation Graph (1, 0)][DBLP]
    J. Funct. Program., 1995, v:5, n:1, pp:111-130 [Journal]
  10. Michael Burrows, Martín Abadi, Roger M. Needham
    A Logic of Authentication. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Comput. Syst., 1990, v:8, n:1, pp:18-36 [Journal]
  11. Martín Abadi, Luca Cardelli
    On Subtyping and Matching. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1996, v:18, n:4, pp:401-423 [Journal]
  12. Martín Abadi, Ricardo Corin, Cédric Fournet
    Computational Secrecy by Typing for the Pi Calculus. [Citation Graph (0, 0)][DBLP]
    APLAS, 2006, pp:253-269 [Conf]
  13. Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber
    Bankable Postage for Network Services. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2003, pp:72-90 [Conf]
  14. Mihai Budiu, Úlfar Erlingsson, Martín Abadi
    Architectural support for software-based protection. [Citation Graph (0, 0)][DBLP]
    ASID, 2006, pp:42-51 [Conf]
  15. Martín Abadi, K. Rustan M. Leino
    A Logic of Object-Oriented Programs. [Citation Graph (0, 0)][DBLP]
    Verification: Theory and Practice, 2003, pp:11-41 [Conf]
  16. Martín Abadi, Zohar Manna
    Modal Theorem Proving. [Citation Graph (0, 0)][DBLP]
    CADE, 1986, pp:172-189 [Conf]
  17. Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
    Control-flow integrity. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:340-353 [Conf]
  18. Martín Abadi, Andrew D. Gordon
    A Calculus for Cryptographic Protocols: The Spi Calculus. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:36-47 [Conf]
  19. Avik Chaudhuri, Martín Abadi
    Formal security analysis of basic network-attached storage. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:43-52 [Conf]
  20. Martín Abadi
    An Axiomatization of Lamport's Temporal Logic of Actions. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1990, pp:57-69 [Conf]
  21. Martín Abadi, Andrew D. Gordon
    Reasoning about Cryptographic Protocols in the Spi Calculus. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1997, pp:59-73 [Conf]
  22. Cormac Flanagan, Martín Abadi
    Object Types against Races. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1999, pp:288-303 [Conf]
  23. Martín Abadi
    Taming the Adversary. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:353-358 [Conf]
  24. Martín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra
    On Generating Solved Instances of Computational Problems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:297-310 [Conf]
  25. Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin
    A Calculus for Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:1-23 [Conf]
  26. Martín Abadi
    On SDSI's Linked Local Name Spaces. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:98-108 [Conf]
  27. Martín Abadi
    Two Facets of Authentication. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:27-32 [Conf]
  28. Martín Abadi, Véronique Cortier
    Deciding Knowledge in Security Protocols under (Many More) Equational Theories. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:62-76 [Conf]
  29. Marcelo P. Fiore, Martín Abadi
    Computing Symbolic Models for Verifying Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:160-173 [Conf]
  30. Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows
    Panel Introduction: Varieties of Authentication. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:79-82 [Conf]
  31. Pankaj Kakkar, Carl A. Gunter, Martín Abadi
    Reasoning about Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:118-129 [Conf]
  32. Nathan Whitehead, Martín Abadi, George C. Necula
    By Reason and Authority: A System for Authorization of Proof-Carrying Code. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:236-250 [Conf]
  33. Avik Chaudhuri, Martín Abadi
    Secrecy by Typing and File-Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:112-123 [Conf]
  34. Martín Abadi, Leslie Lamport, Stephan Merz
    A TLA Solution to the RPC-Memory Specification Problem. [Citation Graph (0, 0)][DBLP]
    Formal Systems Specification, 1994, pp:21-66 [Conf]
  35. Martín Abadi
    Built-in Object Security. [Citation Graph (0, 0)][DBLP]
    ECOOP, 2003, pp:1- [Conf]
  36. John Lamping, Martín Abadi
    Methods as Assertions. [Citation Graph (0, 0)][DBLP]
    ECOOP, 1994, pp:60-80 [Conf]
  37. Martín Abadi
    Protection in Programming-Language Translations: Mobile Object Systems (Abstract). [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:291- [Conf]
  38. Martín Abadi
    Protection in Programming-Language Translations. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:19-34 [Conf]
  39. Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
    Secure Network Objects. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:395-412 [Conf]
  40. Martín Abadi, Bruno Blanchet, Cédric Fournet
    Just Fast Keying in the Pi Calculus. [Citation Graph (0, 0)][DBLP]
    ESOP, 2004, pp:340-354 [Conf]
  41. Martín Abadi, Luca Cardelli
    A Theory of Primitive Objects - Scond-Order Systems. [Citation Graph (0, 0)][DBLP]
    ESOP, 1994, pp:1-25 [Conf]
  42. Martín Abadi, Andrew D. Gordon
    A Bisimulation Method for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ESOP, 1998, pp:12-26 [Conf]
  43. Cormac Flanagan, Martín Abadi
    Types for Safe Locking. [Citation Graph (0, 0)][DBLP]
    ESOP, 1999, pp:91-108 [Conf]
  44. Martín Abadi, Joseph Y. Halpern
    Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1989, pp:148-153 [Conf]
  45. Avik Chaudhuri, Martín Abadi
    Formal Analysis of Dynamic, Distributed File-System Access Controls. [Citation Graph (0, 0)][DBLP]
    FORTE, 2006, pp:99-114 [Conf]
  46. Martín Abadi, Ted Wobber
    A Logical Account of NGSCB. [Citation Graph (0, 0)][DBLP]
    FORTE, 2004, pp:1-12 [Conf]
  47. Martín Abadi
    Security Protocols and Specifications. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 1999, pp:1-13 [Conf]
  48. Martín Abadi, Bruno Blanchet
    Secrecy Types for Asymmetric Communication. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2001, pp:25-41 [Conf]
  49. Martín Abadi, Mathieu Baudet, Bogdan Warinschi
    Guessing Attacks and the Computational Soundness of Static Equivalence. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2006, pp:398-412 [Conf]
  50. Martín Abadi, Georges Gonthier, Benjamin Werner
    Choice in Dynamic Linking. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2004, pp:12-26 [Conf]
  51. Martín Abadi, Cédric Fournet, Georges Gonthier
    A Top-Down Look at a Secure Message. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1999, pp:122-141 [Conf]
  52. Martín Abadi
    Protection in Programming-Language Translations. [Citation Graph (0, 0)][DBLP]
    ICALP, 1998, pp:868-883 [Conf]
  53. Martín Abadi, Véronique Cortier
    Deciding Knowledge in Security Protocols Under Equational Theories. [Citation Graph (0, 0)][DBLP]
    ICALP, 2004, pp:46-58 [Conf]
  54. Martín Abadi, Leslie Lamport, Pierre Wolper
    Realizable and Unrealizable Specifications of Reactive Systems. [Citation Graph (0, 0)][DBLP]
    ICALP, 1989, pp:1-17 [Conf]
  55. Martín Abadi, Bogdan Warinschi
    Password-Based Encryption Analyzed. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:664-676 [Conf]
  56. Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
    A Theory of Secure Control Flow. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2005, pp:111-124 [Conf]
  57. Martín Abadi
    Access control in a core calculus of dependency. [Citation Graph (0, 0)][DBLP]
    ICFP, 2006, pp:263-273 [Conf]
  58. Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy
    Analysis and Caching of Dependencies. [Citation Graph (0, 0)][DBLP]
    ICFP, 1996, pp:83-91 [Conf]
  59. Martín Abadi, Phillip Rogaway
    Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). [Citation Graph (0, 0)][DBLP]
    IFIP TCS, 2000, pp:3-22 [Conf]
  60. Cédric Fournet, Martín Abadi
    Hiding Names: Private Authentication in the Applied Pi Calculus. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:317-338 [Conf]
  61. Martín Abadi
    Logic in Access Control. [Citation Graph (0, 0)][DBLP]
    LICS, 2003, pp:228-0 [Conf]
  62. Martín Abadi
    The Power of Temporal Proofs [Citation Graph (0, 0)][DBLP]
    LICS, 1987, pp:123-130 [Conf]
  63. Martín Abadi, Luca Cardelli
    A Semantics of Object Types [Citation Graph (0, 0)][DBLP]
    LICS, 1994, pp:332-341 [Conf]
  64. Martín Abadi, Marcelo P. Fiore
    Syntactic Considerations on Recursive Types. [Citation Graph (0, 0)][DBLP]
    LICS, 1996, pp:242-252 [Conf]
  65. Martín Abadi, Cédric Fournet, Georges Gonthier
    Secure Implementation of Channel Abstractions. [Citation Graph (0, 0)][DBLP]
    LICS, 1998, pp:105-116 [Conf]
  66. Martín Abadi, Leslie Lamport
    The Existence of Refinement Mappings [Citation Graph (0, 0)][DBLP]
    LICS, 1988, pp:165-175 [Conf]
  67. Martín Abadi, Zohar Manna
    A Timely Resolution [Citation Graph (0, 0)][DBLP]
    LICS, 1986, pp:176-186 [Conf]
  68. Martín Abadi, Gordon D. Plotkin
    A Per Model of Polymorphism and Recursive Types [Citation Graph (0, 0)][DBLP]
    LICS, 1990, pp:355-365 [Conf]
  69. Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin
    Faithful Ideal Models for Recursive Polymorphic Types [Citation Graph (0, 0)][DBLP]
    LICS, 1989, pp:216-225 [Conf]
  70. Bruno Blanchet, Martín Abadi, Cédric Fournet
    Automated Verification of Selected Equivalences for Security Protocols. [Citation Graph (0, 0)][DBLP]
    LICS, 2005, pp:331-340 [Conf]
  71. Georges Gonthier, Martín Abadi, Jean-Jacques Lévy
    Linear Logic Without Boxes [Citation Graph (0, 0)][DBLP]
    LICS, 1992, pp:223-234 [Conf]
  72. Gordon D. Plotkin, Martín Abadi, Luca Cardelli
    Subtyping and Parametricity [Citation Graph (0, 0)][DBLP]
    LICS, 1994, pp:310-319 [Conf]
  73. Martín Abadi, Zohar Manna
    Nonclausal Temporal Deduction. [Citation Graph (0, 0)][DBLP]
    Logic of Programs, 1985, pp:1-15 [Conf]
  74. Nathan Whitehead, Martín Abadi
    BCiC: A System for Code Authentication and Verification. [Citation Graph (0, 0)][DBLP]
    LPAR, 2004, pp:110-124 [Conf]
  75. Martín Abadi, Stephan Merz
    An Abstract Account of Composition. [Citation Graph (0, 0)][DBLP]
    MFCS, 1995, pp:499-508 [Conf]
  76. Martín Abadi, Stephan Merz
    On TLA as a logic. [Citation Graph (0, 0)][DBLP]
    NATO ASI DPD, 1996, pp:235-271 [Conf]
  77. Martín Abadi, Michael Burrows, Ted Wobber
    Moderately Hard, Memory-Bound Functions. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  78. Martín Abadi, Cédric Fournet
    Access Control Based on Execution History. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  79. Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula
    XFI: Software Guards for System Address Spaces. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:75-88 [Conf]
  80. Martín Abadi
    Private Authentication. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:27-40 [Conf]
  81. Katia Hayati, Martín Abadi
    Language-Based Enforcement of Privacy Policies. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:302-313 [Conf]
  82. Martín Abadi
    Leslie Lamport's properties and actions. [Citation Graph (0, 0)][DBLP]
    PODC, 2001, pp:15- [Conf]
  83. Martín Abadi, Leslie Lamport
    Open Systems in TLA. [Citation Graph (0, 0)][DBLP]
    PODC, 1994, pp:81-90 [Conf]
  84. Martín Abadi, Mark R. Tuttle
    A Semantics for a Logic of Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 1991, pp:201-216 [Conf]
  85. Martín Abadi, Bogdan Warinschi
    Security analysis of cryptographically controlled access to XML documents. [Citation Graph (0, 0)][DBLP]
    PODS, 2005, pp:108-117 [Conf]
  86. Martín Abadi, Bruno Blanchet
    Analyzing security protocols with secrecy types and logic programs. [Citation Graph (0, 0)][DBLP]
    POPL, 2002, pp:33-44 [Conf]
  87. Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke
    A Core Calculus of Dependency. [Citation Graph (0, 0)][DBLP]
    POPL, 1999, pp:147-160 [Conf]
  88. Martín Abadi, Luca Cardelli, Pierre-Louis Curien
    Formal Parametric Polymorphism. [Citation Graph (0, 0)][DBLP]
    POPL, 1993, pp:157-170 [Conf]
  89. Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy
    Explicit Substitutions. [Citation Graph (0, 0)][DBLP]
    POPL, 1990, pp:31-46 [Conf]
  90. Martín Abadi, Luca Cardelli, Ramesh Viswanathan
    An Interpretation of Objects and Object Types. [Citation Graph (0, 0)][DBLP]
    POPL, 1996, pp:396-409 [Conf]
  91. Martín Abadi, Cédric Fournet
    Mobile values, new names, and secure communication. [Citation Graph (0, 0)][DBLP]
    POPL, 2001, pp:104-115 [Conf]
  92. Martín Abadi, Cédric Fournet, Georges Gonthier
    Authentication Primitives and Their Compilation. [Citation Graph (0, 0)][DBLP]
    POPL, 2000, pp:302-315 [Conf]
  93. Martín Abadi, Gordon D. Plotkin
    A Logical View of Composition and Refinement. [Citation Graph (0, 0)][DBLP]
    POPL, 1991, pp:323-332 [Conf]
  94. Georges Gonthier, Martín Abadi, Jean-Jacques Lévy
    The Geometry of Optimal Lambda Reduction. [Citation Graph (0, 0)][DBLP]
    POPL, 1992, pp:15-26 [Conf]
  95. Raymie Stata, Martín Abadi
    A Type System for Java Bytecode Subroutines. [Citation Graph (0, 0)][DBLP]
    POPL, 1998, pp:149-160 [Conf]
  96. Martín Abadi, Leslie Lamport
    Decomposing Specifications of Concurrent Systems. [Citation Graph (0, 0)][DBLP]
    PROCOMET, 1994, pp:327-340 [Conf]
  97. Martín Abadi, Leslie Lamport
    Composing Specifications. [Citation Graph (0, 0)][DBLP]
    REX Workshop, 1989, pp:1-41 [Conf]
  98. Martín Abadi, Leslie Lamport
    An Old-Fashioned Recipe for Real Time. [Citation Graph (0, 0)][DBLP]
    REX Workshop, 1991, pp:1-27 [Conf]
  99. Martín Abadi, Bruno Blanchet
    Computer-Assisted Verification of a Protocol for Certified Email. [Citation Graph (0, 0)][DBLP]
    SAS, 2003, pp:316-335 [Conf]
  100. Martín Abadi
    Trusted Computing, Trusted Third Parties, and Verified Communications. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:291-308 [Conf]
  101. Michael Burrows, Martín Abadi, Roger M. Needham
    A Logic of Authentication. [Citation Graph (0, 0)][DBLP]
    SOSP, 1989, pp:1-13 [Conf]
  102. Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
    Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP]
    SOSP, 1991, pp:165-182 [Conf]
  103. Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson
    Authentication in the Taos Operating System. [Citation Graph (0, 0)][DBLP]
    SOSP, 1993, pp:256-269 [Conf]
  104. Martín Abadi, Cédric Fournet, Georges Gonthier
    Secure Communications Processing for Distributed Languages. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:74-88 [Conf]
  105. Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
    Secure Network Objects. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:211-221 [Conf]
  106. Martín Abadi, Joan Feigenbaum
    A Simple Protocol for Secure Circuit Evaluation. [Citation Graph (0, 0)][DBLP]
    STACS, 1988, pp:264-272 [Conf]
  107. Martín Abadi, Joan Feigenbaum, Joe Kilian
    On Hiding Information from an Oracle (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    STOC, 1987, pp:195-203 [Conf]
  108. Martín Abadi
    Secrecy by Typing inSecurity Protocols. [Citation Graph (0, 0)][DBLP]
    TACS, 1997, pp:611-638 [Conf]
  109. Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson
    Authentication and Delegation with Smart-cards. [Citation Graph (0, 0)][DBLP]
    TACS, 1991, pp:326-345 [Conf]
  110. Martín Abadi, Luca Cardelli
    A Theory of Primitive Objects - Untyped and First-Order Systems. [Citation Graph (0, 0)][DBLP]
    TACS, 1994, pp:296-320 [Conf]
  111. Martín Abadi, Jan Jürjens
    Formal Eavesdropping and Its Computational Interpretation. [Citation Graph (0, 0)][DBLP]
    TACS, 2001, pp:82-94 [Conf]
  112. Martín Abadi, Luca Cardelli
    An Imperative Object Calculus. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1995, pp:471-485 [Conf]
  113. Martín Abadi, K. Rustan M. Leino
    A Logic of Object-Oriented Programs. [Citation Graph (0, 0)][DBLP]
    TAPSOFT, 1997, pp:682-696 [Conf]
  114. Michael Burrows, Martín Abadi, Roger M. Needham
    Authentication: A Practical Study in Belief and Action. [Citation Graph (0, 0)][DBLP]
    TARK, 1988, pp:325-342 [Conf]
  115. Roberto Bellucci, Martín Abadi, Pierre-Louis Curien
    A Model for Formal Parametric Polymorphism: A PER Interpretation for System R. [Citation Graph (0, 0)][DBLP]
    TLCA, 1995, pp:32-46 [Conf]
  116. Gordon D. Plotkin, Martín Abadi
    A Logic for Parametric Polymorphism. [Citation Graph (0, 0)][DBLP]
    TLCA, 1993, pp:361-375 [Conf]
  117. Martín Abadi, Neal Glew
    Certified email with a light on-line trusted third party: design and implementation. [Citation Graph (0, 0)][DBLP]
    WWW, 2002, pp:387-395 [Conf]
  118. Martín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber
    Secure Web Tunneling. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1998, v:30, n:1-7, pp:531-539 [Journal]
  119. Martín Abadi
    Secrecy in Programming-Language Semantics. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal]
  120. Martín Abadi, Cédric Fournet, Georges Gonthier
    Secure Implementation of Channel Abstractions. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1997, v:10, n:, pp:- [Journal]
  121. Martín Abadi
    Access Control in a Core Calculus of Dependency. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:172, n:, pp:5-31 [Journal]
  122. Martín Abadi
    A Semantics for Static Type Inference in a Nondeterministic Language [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1994, v:109, n:1/2, pp:300-306 [Journal]
  123. Martín Abadi, Luca Cardelli
    A Theory of Primitive Objects: Untyped and First-Order Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1996, v:125, n:2, pp:78-102 [Journal]
  124. Martín Abadi, Cédric Fournet, Georges Gonthier
    Secure Implementation of Channel Abstractions. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2002, v:174, n:1, pp:37-83 [Journal]
  125. Martín Abadi, Andrew D. Gordon
    A Calculus for Cryptographic Protocols: The spi Calculus. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1999, v:148, n:1, pp:1-70 [Journal]
  126. Martín Abadi, Joseph Y. Halpern
    Decidability and Expressiveness for First-Order Logics of Probability [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1994, v:112, n:1, pp:1-36 [Journal]
  127. Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin
    Faithful Ideal Models for Recursive Polymorphic Types. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 1991, v:2, n:1, pp:1-21 [Journal]
  128. Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider
    Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1991, v:40, n:3, pp:141-142 [Journal]
  129. Martín Abadi, Bruno Blanchet
    Analyzing security protocols with secrecy types and logic programs. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2005, v:52, n:1, pp:102-146 [Journal]
  130. Martín Abadi
    On SDSI's Linked Local Name Spaces. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:1-2, pp:3-22 [Journal]
  131. Pankaj Kakkar, Carl A. Gunter, Martín Abadi
    Reasoning About Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:2, pp:245-287 [Journal]
  132. Martín Abadi, Joan Feigenbaum, Joe Kilian
    On Hiding Information from an Oracle. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1989, v:39, n:1, pp:21-50 [Journal]
  133. Martín Abadi
    Baby Modula-3 and a Theory of Objects. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 1994, v:4, n:2, pp:249-283 [Journal]
  134. Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy
    Explicit Substitutions. [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 1991, v:1, n:4, pp:375-416 [Journal]
  135. Martín Abadi, Greg Morrisett, Andrei Sabelfeld
    "Language-Based Security". [Citation Graph (0, 0)][DBLP]
    J. Funct. Program., 2005, v:15, n:2, pp:129- [Journal]
  136. Martín Abadi, Joan Feigenbaum
    Secure Circuit Evaluation. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1990, v:2, n:1, pp:1-12 [Journal]
  137. Martín Abadi, Phillip Rogaway
    Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2002, v:15, n:2, pp:103-127 [Journal]
  138. Martín Abadi
    top-top-closed relations and admissibility. [Citation Graph (0, 0)][DBLP]
    Mathematical Structures in Computer Science, 2000, v:10, n:3, pp:313-320 [Journal]
  139. Martín Abadi, Andrew D. Gordon
    A Bisimulation Method for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    Nord. J. Comput., 1998, v:5, n:4, pp:267-0 [Journal]
  140. Martín Abadi, Bruno Blanchet
    Computer-assisted verification of a protocol for certified email. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2005, v:58, n:1-2, pp:3-27 [Journal]
  141. Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson
    Authentification and Delegation with Smart-Cards. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1993, v:21, n:2, pp:93-113 [Journal]
  142. Martín Abadi, Luca Cardelli
    A Theory of Primitive Objects: Second-Order Systems. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1995, v:25, n:2-3, pp:81-116 [Journal]
  143. Michael Burrows, Martín Abadi, Roger M. Needham
    Rejoinder to Nessett. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1990, v:24, n:2, pp:39-40 [Journal]
  144. Martín Abadi, Luca Cardelli
    An Imperative Object Calculus (Invited Paper). [Citation Graph (0, 0)][DBLP]
    TAPOS, 1995, v:1, n:3, pp:151-166 [Journal]
  145. John Lamping, Martín Abadi
    Methods as Assertions. [Citation Graph (0, 0)][DBLP]
    TAPOS, 1995, v:1, n:1, pp:5-18 [Journal]
  146. Martín Abadi
    The Power of Temporal Proofs. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1989, v:65, n:1, pp:35-83 [Journal]
  147. Martín Abadi
    Corrigendum: The Power of Temporal Proofs. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1990, v:70, n:2, pp:275- [Journal]
  148. Martín Abadi, Bruno Blanchet
    Secrecy types for asymmetric communication. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:3, n:298, pp:387-415 [Journal]
  149. Martín Abadi, Véronique Cortier
    Deciding knowledge in security protocols under equational theories. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:2-32 [Journal]
  150. Martín Abadi, Luca Cardelli, Pierre-Louis Curien
    Formal Parametric Polymorphism. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1993, v:121, n:1&2, pp:9-58 [Journal]
  151. Martín Abadi, Cédric Fournet
    Private authentication. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:322, n:3, pp:427-476 [Journal]
  152. Martín Abadi, Leslie Lamport
    The Existence of Refinement Mappings. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1991, v:82, n:2, pp:253-284 [Journal]
  153. Martín Abadi, Gordon D. Plotkin
    A Logical View of Composition. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1993, v:114, n:1, pp:3-30 [Journal]
  154. Martín Abadi, Leonid Libkin, Frank Pfenning
    Editorial. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Log., 2002, v:3, n:3, pp:335-335 [Journal]
  155. Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber
    Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1992, v:10, n:4, pp:265-310 [Journal]
  156. Edward Wobber, Martín Abadi, Michael Burrows
    Authentication in the Taos Operating System. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1994, v:12, n:1, pp:3-32 [Journal]
  157. Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber
    Moderately hard, memory-bound functions. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2005, v:5, n:2, pp:299-327 [Journal]
  158. Martín Abadi, Cormac Flanagan, Stephen N. Freund
    Types for safe locking: Static race detection for Java. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2006, v:28, n:2, pp:207-255 [Journal]
  159. Martín Abadi, Leslie Lamport
    Composing Specifications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1993, v:15, n:1, pp:73-132 [Journal]
  160. Martín Abadi, Leslie Lamport
    An Old-Fashined Recipe for Real-Time. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1994, v:16, n:5, pp:1543-1571 [Journal]
  161. Martín Abadi, Leslie Lamport
    Conjoining Specifications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1995, v:17, n:3, pp:507-534 [Journal]
  162. Raymie Stata, Martín Abadi
    A Type System for Java Bytecode Subroutines. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1999, v:21, n:1, pp:90-137 [Journal]
  163. Martín Abadi
    Explicit Communication Revisited: Two New Attacks on Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1997, v:23, n:3, pp:185-186 [Journal]
  164. Martín Abadi, Roger M. Needham
    Prudent Engineering Practice for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:1, pp:6-15 [Journal]
  165. Nathan Whitehead, Jordan Johnson, Martín Abadi
    Policies and Proofs for Code Auditing. [Citation Graph (0, 0)][DBLP]
    ATVA, 2007, pp:1-14 [Conf]
  166. Martín Abadi
    Security Protocols: Principles and Calculi. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:1-23 [Conf]
  167. Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon
    Authorizing applications in singularity. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2007, pp:355-368 [Conf]
  168. Martín Abadi, Phillip Rogaway
    Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:395- [Journal]
  169. Martín Abadi, Bruno Blanchet, Cédric Fournet
    Just fast keying in the pi calculus. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal]
  170. Martín Abadi, Jens Palsberg
    Editorial. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2007, v:29, n:3, pp:- [Journal]

  171. Automatic Mutual Exclusion and Atomicity Checks. [Citation Graph (, )][DBLP]


  172. Models and Proofs of Protocol Security: A Progress Report. [Citation Graph (, )][DBLP]


  173. Implementation and Use of Transactional Memory with Dynamic Separation. [Citation Graph (, )][DBLP]


  174. The good, the bad, and the provable. [Citation Graph (, )][DBLP]


  175. A Model of Dynamic Separation for Transactional Memory. [Citation Graph (, )][DBLP]


  176. Perspectives on Transactional Memory. [Citation Graph (, )][DBLP]


  177. On Protection by Layout Randomization. [Citation Graph (, )][DBLP]


  178. Variations in Access Control Logic. [Citation Graph (, )][DBLP]


  179. Code-Carrying Authorization. [Citation Graph (, )][DBLP]


  180. Logic in Access Control (Tutorial Notes). [Citation Graph (, )][DBLP]


  181. A Modal Deconstruction of Access Control Logics. [Citation Graph (, )][DBLP]


  182. Access Control in a World of Software Diversity. [Citation Graph (, )][DBLP]


  183. Unified Declarative Platform for Secure Netwoked Information Systems. [Citation Graph (, )][DBLP]


  184. The Fine Print of Security. [Citation Graph (, )][DBLP]


  185. Semantics of transactional memory and automatic mutual exclusion. [Citation Graph (, )][DBLP]


  186. A model of cooperative threads. [Citation Graph (, )][DBLP]


  187. Transactional memory with strong atomicity using off-the-shelf memory protection hardware. [Citation Graph (, )][DBLP]


  188. De-anonymizing the internet using unreliable IDs. [Citation Graph (, )][DBLP]


Search in 0.196secs, Finished in 0.206secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002