Search the dblp DataBase
Martín Abadi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Martín Abadi , Zohar Manna Temporal Logic Programming. [Citation Graph (5, 0)][DBLP ] SLP, 1987, pp:4-16 [Conf ] Martín Abadi , Zohar Manna Temporal Logic Programming. [Citation Graph (5, 0)][DBLP ] J. Symb. Comput., 1989, v:8, n:3, pp:277-295 [Journal ] Martín Abadi , Luca Cardelli , Benjamin C. Pierce , Gordon D. Plotkin Dynamic Typing in a Statically-Typed Language. [Citation Graph (3, 0)][DBLP ] POPL, 1989, pp:213-227 [Conf ] Martín Abadi , Luca Cardelli On Subtyping and Matching. [Citation Graph (2, 0)][DBLP ] ECOOP, 1995, pp:145-167 [Conf ] Martín Abadi , Zohar Manna Nonclausal Deduction in First-Order Temporal Logic [Citation Graph (2, 0)][DBLP ] J. ACM, 1990, v:37, n:2, pp:279-317 [Journal ] Martín Abadi , Michael Burrows , Butler W. Lampson , Gordon D. Plotkin A Calculus for Access Control in Distributed Systems. [Citation Graph (2, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1993, v:15, n:4, pp:706-734 [Journal ] Martín Abadi , Luca Cardelli , Benjamin C. Pierce , Gordon D. Plotkin Dynamic Typing in a Statically Typed Language. [Citation Graph (2, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1991, v:13, n:2, pp:237-268 [Journal ] Luca Cardelli , Florian Matthes , Martín Abadi Extensible Grammars for Language Specialization. [Citation Graph (1, 13)][DBLP ] DBPL, 1993, pp:11-31 [Conf ] Martín Abadi , Luca Cardelli , Benjamin C. Pierce , Didier Rémy Dynamic Typing in Polymorphic Languages. [Citation Graph (1, 0)][DBLP ] J. Funct. Program., 1995, v:5, n:1, pp:111-130 [Journal ] Michael Burrows , Martín Abadi , Roger M. Needham A Logic of Authentication. [Citation Graph (1, 0)][DBLP ] ACM Trans. Comput. Syst., 1990, v:8, n:1, pp:18-36 [Journal ] Martín Abadi , Luca Cardelli On Subtyping and Matching. [Citation Graph (1, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1996, v:18, n:4, pp:401-423 [Journal ] Martín Abadi , Ricardo Corin , Cédric Fournet Computational Secrecy by Typing for the Pi Calculus. [Citation Graph (0, 0)][DBLP ] APLAS, 2006, pp:253-269 [Conf ] Martín Abadi , Andrew Birrell , Michael Burrows , Frank Dabek , Ted Wobber Bankable Postage for Network Services. [Citation Graph (0, 0)][DBLP ] ASIAN, 2003, pp:72-90 [Conf ] Mihai Budiu , Úlfar Erlingsson , Martín Abadi Architectural support for software-based protection. [Citation Graph (0, 0)][DBLP ] ASID, 2006, pp:42-51 [Conf ] Martín Abadi , K. Rustan M. Leino A Logic of Object-Oriented Programs. [Citation Graph (0, 0)][DBLP ] Verification: Theory and Practice, 2003, pp:11-41 [Conf ] Martín Abadi , Zohar Manna Modal Theorem Proving. [Citation Graph (0, 0)][DBLP ] CADE, 1986, pp:172-189 [Conf ] Martín Abadi , Mihai Budiu , Úlfar Erlingsson , Jay Ligatti Control-flow integrity. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:340-353 [Conf ] Martín Abadi , Andrew D. Gordon A Calculus for Cryptographic Protocols: The Spi Calculus. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:36-47 [Conf ] Avik Chaudhuri , Martín Abadi Formal security analysis of basic network-attached storage. [Citation Graph (0, 0)][DBLP ] FMSE, 2005, pp:43-52 [Conf ] Martín Abadi An Axiomatization of Lamport's Temporal Logic of Actions. [Citation Graph (0, 0)][DBLP ] CONCUR, 1990, pp:57-69 [Conf ] Martín Abadi , Andrew D. Gordon Reasoning about Cryptographic Protocols in the Spi Calculus. [Citation Graph (0, 0)][DBLP ] CONCUR, 1997, pp:59-73 [Conf ] Cormac Flanagan , Martín Abadi Object Types against Races. [Citation Graph (0, 0)][DBLP ] CONCUR, 1999, pp:288-303 [Conf ] Martín Abadi Taming the Adversary. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:353-358 [Conf ] Martín Abadi , Eric Allender , Andrei Z. Broder , Joan Feigenbaum , Lane A. Hemachandra On Generating Solved Instances of Computational Problems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:297-310 [Conf ] Martín Abadi , Michael Burrows , Butler W. Lampson , Gordon D. Plotkin A Calculus for Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:1-23 [Conf ] Martín Abadi On SDSI's Linked Local Name Spaces. [Citation Graph (0, 0)][DBLP ] CSFW, 1997, pp:98-108 [Conf ] Martín Abadi Two Facets of Authentication. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:27-32 [Conf ] Martín Abadi , Véronique Cortier Deciding Knowledge in Security Protocols under (Many More) Equational Theories. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:62-76 [Conf ] Marcelo P. Fiore , Martín Abadi Computing Symbolic Models for Verifying Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:160-173 [Conf ] Roberto Gorrieri , Paul F. Syverson , Martín Abadi , Riccardo Focardi , Dieter Gollmann , Gavin Lowe , Catherine Meadows Panel Introduction: Varieties of Authentication. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:79-82 [Conf ] Pankaj Kakkar , Carl A. Gunter , Martín Abadi Reasoning about Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:118-129 [Conf ] Nathan Whitehead , Martín Abadi , George C. Necula By Reason and Authority: A System for Authorization of Proof-Carrying Code. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:236-250 [Conf ] Avik Chaudhuri , Martín Abadi Secrecy by Typing and File-Access Control. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:112-123 [Conf ] Martín Abadi , Leslie Lamport , Stephan Merz A TLA Solution to the RPC-Memory Specification Problem. [Citation Graph (0, 0)][DBLP ] Formal Systems Specification, 1994, pp:21-66 [Conf ] Martín Abadi Built-in Object Security. [Citation Graph (0, 0)][DBLP ] ECOOP, 2003, pp:1- [Conf ] John Lamping , Martín Abadi Methods as Assertions. [Citation Graph (0, 0)][DBLP ] ECOOP, 1994, pp:60-80 [Conf ] Martín Abadi Protection in Programming-Language Translations: Mobile Object Systems (Abstract). [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1998, pp:291- [Conf ] Martín Abadi Protection in Programming-Language Translations. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:19-34 [Conf ] Leendert van Doorn , Martín Abadi , Michael Burrows , Edward Wobber Secure Network Objects. [Citation Graph (0, 0)][DBLP ] Secure Internet Programming, 1999, pp:395-412 [Conf ] Martín Abadi , Bruno Blanchet , Cédric Fournet Just Fast Keying in the Pi Calculus. [Citation Graph (0, 0)][DBLP ] ESOP, 2004, pp:340-354 [Conf ] Martín Abadi , Luca Cardelli A Theory of Primitive Objects - Scond-Order Systems. [Citation Graph (0, 0)][DBLP ] ESOP, 1994, pp:1-25 [Conf ] Martín Abadi , Andrew D. Gordon A Bisimulation Method for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] ESOP, 1998, pp:12-26 [Conf ] Cormac Flanagan , Martín Abadi Types for Safe Locking. [Citation Graph (0, 0)][DBLP ] ESOP, 1999, pp:91-108 [Conf ] Martín Abadi , Joseph Y. Halpern Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1989, pp:148-153 [Conf ] Avik Chaudhuri , Martín Abadi Formal Analysis of Dynamic, Distributed File-System Access Controls. [Citation Graph (0, 0)][DBLP ] FORTE, 2006, pp:99-114 [Conf ] Martín Abadi , Ted Wobber A Logical Account of NGSCB. [Citation Graph (0, 0)][DBLP ] FORTE, 2004, pp:1-12 [Conf ] Martín Abadi Security Protocols and Specifications. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 1999, pp:1-13 [Conf ] Martín Abadi , Bruno Blanchet Secrecy Types for Asymmetric Communication. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2001, pp:25-41 [Conf ] Martín Abadi , Mathieu Baudet , Bogdan Warinschi Guessing Attacks and the Computational Soundness of Static Equivalence. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2006, pp:398-412 [Conf ] Martín Abadi , Georges Gonthier , Benjamin Werner Choice in Dynamic Linking. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2004, pp:12-26 [Conf ] Martín Abadi , Cédric Fournet , Georges Gonthier A Top-Down Look at a Secure Message. [Citation Graph (0, 0)][DBLP ] FSTTCS, 1999, pp:122-141 [Conf ] Martín Abadi Protection in Programming-Language Translations. [Citation Graph (0, 0)][DBLP ] ICALP, 1998, pp:868-883 [Conf ] Martín Abadi , Véronique Cortier Deciding Knowledge in Security Protocols Under Equational Theories. [Citation Graph (0, 0)][DBLP ] ICALP, 2004, pp:46-58 [Conf ] Martín Abadi , Leslie Lamport , Pierre Wolper Realizable and Unrealizable Specifications of Reactive Systems. [Citation Graph (0, 0)][DBLP ] ICALP, 1989, pp:1-17 [Conf ] Martín Abadi , Bogdan Warinschi Password-Based Encryption Analyzed. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:664-676 [Conf ] Martín Abadi , Mihai Budiu , Úlfar Erlingsson , Jay Ligatti A Theory of Secure Control Flow. [Citation Graph (0, 0)][DBLP ] ICFEM, 2005, pp:111-124 [Conf ] Martín Abadi Access control in a core calculus of dependency. [Citation Graph (0, 0)][DBLP ] ICFP, 2006, pp:263-273 [Conf ] Martín Abadi , Butler W. Lampson , Jean-Jacques Lévy Analysis and Caching of Dependencies. [Citation Graph (0, 0)][DBLP ] ICFP, 1996, pp:83-91 [Conf ] Martín Abadi , Phillip Rogaway Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). [Citation Graph (0, 0)][DBLP ] IFIP TCS, 2000, pp:3-22 [Conf ] Cédric Fournet , Martín Abadi Hiding Names: Private Authentication in the Applied Pi Calculus. [Citation Graph (0, 0)][DBLP ] ISSS, 2002, pp:317-338 [Conf ] Martín Abadi Logic in Access Control. [Citation Graph (0, 0)][DBLP ] LICS, 2003, pp:228-0 [Conf ] Martín Abadi The Power of Temporal Proofs [Citation Graph (0, 0)][DBLP ] LICS, 1987, pp:123-130 [Conf ] Martín Abadi , Luca Cardelli A Semantics of Object Types [Citation Graph (0, 0)][DBLP ] LICS, 1994, pp:332-341 [Conf ] Martín Abadi , Marcelo P. Fiore Syntactic Considerations on Recursive Types. [Citation Graph (0, 0)][DBLP ] LICS, 1996, pp:242-252 [Conf ] Martín Abadi , Cédric Fournet , Georges Gonthier Secure Implementation of Channel Abstractions. [Citation Graph (0, 0)][DBLP ] LICS, 1998, pp:105-116 [Conf ] Martín Abadi , Leslie Lamport The Existence of Refinement Mappings [Citation Graph (0, 0)][DBLP ] LICS, 1988, pp:165-175 [Conf ] Martín Abadi , Zohar Manna A Timely Resolution [Citation Graph (0, 0)][DBLP ] LICS, 1986, pp:176-186 [Conf ] Martín Abadi , Gordon D. Plotkin A Per Model of Polymorphism and Recursive Types [Citation Graph (0, 0)][DBLP ] LICS, 1990, pp:355-365 [Conf ] Martín Abadi , Benjamin C. Pierce , Gordon D. Plotkin Faithful Ideal Models for Recursive Polymorphic Types [Citation Graph (0, 0)][DBLP ] LICS, 1989, pp:216-225 [Conf ] Bruno Blanchet , Martín Abadi , Cédric Fournet Automated Verification of Selected Equivalences for Security Protocols. [Citation Graph (0, 0)][DBLP ] LICS, 2005, pp:331-340 [Conf ] Georges Gonthier , Martín Abadi , Jean-Jacques Lévy Linear Logic Without Boxes [Citation Graph (0, 0)][DBLP ] LICS, 1992, pp:223-234 [Conf ] Gordon D. Plotkin , Martín Abadi , Luca Cardelli Subtyping and Parametricity [Citation Graph (0, 0)][DBLP ] LICS, 1994, pp:310-319 [Conf ] Martín Abadi , Zohar Manna Nonclausal Temporal Deduction. [Citation Graph (0, 0)][DBLP ] Logic of Programs, 1985, pp:1-15 [Conf ] Nathan Whitehead , Martín Abadi BCiC: A System for Code Authentication and Verification. [Citation Graph (0, 0)][DBLP ] LPAR, 2004, pp:110-124 [Conf ] Martín Abadi , Stephan Merz An Abstract Account of Composition. [Citation Graph (0, 0)][DBLP ] MFCS, 1995, pp:499-508 [Conf ] Martín Abadi , Stephan Merz On TLA as a logic. [Citation Graph (0, 0)][DBLP ] NATO ASI DPD, 1996, pp:235-271 [Conf ] Martín Abadi , Michael Burrows , Ted Wobber Moderately Hard, Memory-Bound Functions. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Martín Abadi , Cédric Fournet Access Control Based on Execution History. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Úlfar Erlingsson , Martín Abadi , Michael Vrable , Mihai Budiu , George C. Necula XFI: Software Guards for System Address Spaces. [Citation Graph (0, 0)][DBLP ] OSDI, 2006, pp:75-88 [Conf ] Martín Abadi Private Authentication. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:27-40 [Conf ] Katia Hayati , Martín Abadi Language-Based Enforcement of Privacy Policies. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2004, pp:302-313 [Conf ] Martín Abadi Leslie Lamport's properties and actions. [Citation Graph (0, 0)][DBLP ] PODC, 2001, pp:15- [Conf ] Martín Abadi , Leslie Lamport Open Systems in TLA. [Citation Graph (0, 0)][DBLP ] PODC, 1994, pp:81-90 [Conf ] Martín Abadi , Mark R. Tuttle A Semantics for a Logic of Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP ] PODC, 1991, pp:201-216 [Conf ] Martín Abadi , Bogdan Warinschi Security analysis of cryptographically controlled access to XML documents. [Citation Graph (0, 0)][DBLP ] PODS, 2005, pp:108-117 [Conf ] Martín Abadi , Bruno Blanchet Analyzing security protocols with secrecy types and logic programs. [Citation Graph (0, 0)][DBLP ] POPL, 2002, pp:33-44 [Conf ] Martín Abadi , Anindya Banerjee , Nevin Heintze , Jon G. Riecke A Core Calculus of Dependency. [Citation Graph (0, 0)][DBLP ] POPL, 1999, pp:147-160 [Conf ] Martín Abadi , Luca Cardelli , Pierre-Louis Curien Formal Parametric Polymorphism. [Citation Graph (0, 0)][DBLP ] POPL, 1993, pp:157-170 [Conf ] Martín Abadi , Luca Cardelli , Pierre-Louis Curien , Jean-Jacques Lévy Explicit Substitutions. [Citation Graph (0, 0)][DBLP ] POPL, 1990, pp:31-46 [Conf ] Martín Abadi , Luca Cardelli , Ramesh Viswanathan An Interpretation of Objects and Object Types. [Citation Graph (0, 0)][DBLP ] POPL, 1996, pp:396-409 [Conf ] Martín Abadi , Cédric Fournet Mobile values, new names, and secure communication. [Citation Graph (0, 0)][DBLP ] POPL, 2001, pp:104-115 [Conf ] Martín Abadi , Cédric Fournet , Georges Gonthier Authentication Primitives and Their Compilation. [Citation Graph (0, 0)][DBLP ] POPL, 2000, pp:302-315 [Conf ] Martín Abadi , Gordon D. Plotkin A Logical View of Composition and Refinement. [Citation Graph (0, 0)][DBLP ] POPL, 1991, pp:323-332 [Conf ] Georges Gonthier , Martín Abadi , Jean-Jacques Lévy The Geometry of Optimal Lambda Reduction. [Citation Graph (0, 0)][DBLP ] POPL, 1992, pp:15-26 [Conf ] Raymie Stata , Martín Abadi A Type System for Java Bytecode Subroutines. [Citation Graph (0, 0)][DBLP ] POPL, 1998, pp:149-160 [Conf ] Martín Abadi , Leslie Lamport Decomposing Specifications of Concurrent Systems. [Citation Graph (0, 0)][DBLP ] PROCOMET, 1994, pp:327-340 [Conf ] Martín Abadi , Leslie Lamport Composing Specifications. [Citation Graph (0, 0)][DBLP ] REX Workshop, 1989, pp:1-41 [Conf ] Martín Abadi , Leslie Lamport An Old-Fashioned Recipe for Real Time. [Citation Graph (0, 0)][DBLP ] REX Workshop, 1991, pp:1-27 [Conf ] Martín Abadi , Bruno Blanchet Computer-Assisted Verification of a Protocol for Certified Email. [Citation Graph (0, 0)][DBLP ] SAS, 2003, pp:316-335 [Conf ] Martín Abadi Trusted Computing, Trusted Third Parties, and Verified Communications. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:291-308 [Conf ] Michael Burrows , Martín Abadi , Roger M. Needham A Logic of Authentication. [Citation Graph (0, 0)][DBLP ] SOSP, 1989, pp:1-13 [Conf ] Butler W. Lampson , Martín Abadi , Michael Burrows , Edward Wobber Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP ] SOSP, 1991, pp:165-182 [Conf ] Edward Wobber , Martín Abadi , Michael Burrows , Butler W. Lampson Authentication in the Taos Operating System. [Citation Graph (0, 0)][DBLP ] SOSP, 1993, pp:256-269 [Conf ] Martín Abadi , Cédric Fournet , Georges Gonthier Secure Communications Processing for Distributed Languages. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:74-88 [Conf ] Leendert van Doorn , Martín Abadi , Michael Burrows , Edward Wobber Secure Network Objects. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:211-221 [Conf ] Martín Abadi , Joan Feigenbaum A Simple Protocol for Secure Circuit Evaluation. [Citation Graph (0, 0)][DBLP ] STACS, 1988, pp:264-272 [Conf ] Martín Abadi , Joan Feigenbaum , Joe Kilian On Hiding Information from an Oracle (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1987, pp:195-203 [Conf ] Martín Abadi Secrecy by Typing inSecurity Protocols. [Citation Graph (0, 0)][DBLP ] TACS, 1997, pp:611-638 [Conf ] Martín Abadi , Michael Burrows , C. Kaufman , Butler W. Lampson Authentication and Delegation with Smart-cards. [Citation Graph (0, 0)][DBLP ] TACS, 1991, pp:326-345 [Conf ] Martín Abadi , Luca Cardelli A Theory of Primitive Objects - Untyped and First-Order Systems. [Citation Graph (0, 0)][DBLP ] TACS, 1994, pp:296-320 [Conf ] Martín Abadi , Jan Jürjens Formal Eavesdropping and Its Computational Interpretation. [Citation Graph (0, 0)][DBLP ] TACS, 2001, pp:82-94 [Conf ] Martín Abadi , Luca Cardelli An Imperative Object Calculus. [Citation Graph (0, 0)][DBLP ] TAPSOFT, 1995, pp:471-485 [Conf ] Martín Abadi , K. Rustan M. Leino A Logic of Object-Oriented Programs. [Citation Graph (0, 0)][DBLP ] TAPSOFT, 1997, pp:682-696 [Conf ] Michael Burrows , Martín Abadi , Roger M. Needham Authentication: A Practical Study in Belief and Action. [Citation Graph (0, 0)][DBLP ] TARK, 1988, pp:325-342 [Conf ] Roberto Bellucci , Martín Abadi , Pierre-Louis Curien A Model for Formal Parametric Polymorphism: A PER Interpretation for System R. [Citation Graph (0, 0)][DBLP ] TLCA, 1995, pp:32-46 [Conf ] Gordon D. Plotkin , Martín Abadi A Logic for Parametric Polymorphism. [Citation Graph (0, 0)][DBLP ] TLCA, 1993, pp:361-375 [Conf ] Martín Abadi , Neal Glew Certified email with a light on-line trusted third party: design and implementation. [Citation Graph (0, 0)][DBLP ] WWW, 2002, pp:387-395 [Conf ] Martín Abadi , Andrew Birrell , Raymie Stata , Edward Wobber Secure Web Tunneling. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1998, v:30, n:1-7, pp:531-539 [Journal ] Martín Abadi Secrecy in Programming-Language Semantics. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal ] Martín Abadi , Cédric Fournet , Georges Gonthier Secure Implementation of Channel Abstractions. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1997, v:10, n:, pp:- [Journal ] Martín Abadi Access Control in a Core Calculus of Dependency. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:172, n:, pp:5-31 [Journal ] Martín Abadi A Semantics for Static Type Inference in a Nondeterministic Language [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1994, v:109, n:1/2, pp:300-306 [Journal ] Martín Abadi , Luca Cardelli A Theory of Primitive Objects: Untyped and First-Order Systems. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1996, v:125, n:2, pp:78-102 [Journal ] Martín Abadi , Cédric Fournet , Georges Gonthier Secure Implementation of Channel Abstractions. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2002, v:174, n:1, pp:37-83 [Journal ] Martín Abadi , Andrew D. Gordon A Calculus for Cryptographic Protocols: The spi Calculus. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1999, v:148, n:1, pp:1-70 [Journal ] Martín Abadi , Joseph Y. Halpern Decidability and Expressiveness for First-Order Logics of Probability [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1994, v:112, n:1, pp:1-36 [Journal ] Martín Abadi , Benjamin C. Pierce , Gordon D. Plotkin Faithful Ideal Models for Recursive Polymorphic Types. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 1991, v:2, n:1, pp:1-21 [Journal ] Martín Abadi , Bowen Alpern , Krzysztof R. Apt , Nissim Francez , Shmuel Katz , Leslie Lamport , Fred B. Schneider Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1991, v:40, n:3, pp:141-142 [Journal ] Martín Abadi , Bruno Blanchet Analyzing security protocols with secrecy types and logic programs. [Citation Graph (0, 0)][DBLP ] J. ACM, 2005, v:52, n:1, pp:102-146 [Journal ] Martín Abadi On SDSI's Linked Local Name Spaces. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1998, v:6, n:1-2, pp:3-22 [Journal ] Pankaj Kakkar , Carl A. Gunter , Martín Abadi Reasoning About Secrecy for Active Networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:2, pp:245-287 [Journal ] Martín Abadi , Joan Feigenbaum , Joe Kilian On Hiding Information from an Oracle. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1989, v:39, n:1, pp:21-50 [Journal ] Martín Abadi Baby Modula-3 and a Theory of Objects. [Citation Graph (0, 0)][DBLP ] J. Funct. Program., 1994, v:4, n:2, pp:249-283 [Journal ] Martín Abadi , Luca Cardelli , Pierre-Louis Curien , Jean-Jacques Lévy Explicit Substitutions. [Citation Graph (0, 0)][DBLP ] J. Funct. Program., 1991, v:1, n:4, pp:375-416 [Journal ] Martín Abadi , Greg Morrisett , Andrei Sabelfeld "Language-Based Security". [Citation Graph (0, 0)][DBLP ] J. Funct. Program., 2005, v:15, n:2, pp:129- [Journal ] Martín Abadi , Joan Feigenbaum Secure Circuit Evaluation. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1990, v:2, n:1, pp:1-12 [Journal ] Martín Abadi , Phillip Rogaway Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2002, v:15, n:2, pp:103-127 [Journal ] Martín Abadi top-top-closed relations and admissibility. [Citation Graph (0, 0)][DBLP ] Mathematical Structures in Computer Science, 2000, v:10, n:3, pp:313-320 [Journal ] Martín Abadi , Andrew D. Gordon A Bisimulation Method for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] Nord. J. Comput., 1998, v:5, n:4, pp:267-0 [Journal ] Martín Abadi , Bruno Blanchet Computer-assisted verification of a protocol for certified email. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2005, v:58, n:1-2, pp:3-27 [Journal ] Martín Abadi , Michael Burrows , C. Kaufman , Butler W. Lampson Authentification and Delegation with Smart-Cards. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1993, v:21, n:2, pp:93-113 [Journal ] Martín Abadi , Luca Cardelli A Theory of Primitive Objects: Second-Order Systems. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1995, v:25, n:2-3, pp:81-116 [Journal ] Michael Burrows , Martín Abadi , Roger M. Needham Rejoinder to Nessett. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1990, v:24, n:2, pp:39-40 [Journal ] Martín Abadi , Luca Cardelli An Imperative Object Calculus (Invited Paper). [Citation Graph (0, 0)][DBLP ] TAPOS, 1995, v:1, n:3, pp:151-166 [Journal ] John Lamping , Martín Abadi Methods as Assertions. [Citation Graph (0, 0)][DBLP ] TAPOS, 1995, v:1, n:1, pp:5-18 [Journal ] Martín Abadi The Power of Temporal Proofs. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1989, v:65, n:1, pp:35-83 [Journal ] Martín Abadi Corrigendum: The Power of Temporal Proofs. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1990, v:70, n:2, pp:275- [Journal ] Martín Abadi , Bruno Blanchet Secrecy types for asymmetric communication. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:3, n:298, pp:387-415 [Journal ] Martín Abadi , Véronique Cortier Deciding knowledge in security protocols under equational theories. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:2-32 [Journal ] Martín Abadi , Luca Cardelli , Pierre-Louis Curien Formal Parametric Polymorphism. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1993, v:121, n:1&2, pp:9-58 [Journal ] Martín Abadi , Cédric Fournet Private authentication. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2004, v:322, n:3, pp:427-476 [Journal ] Martín Abadi , Leslie Lamport The Existence of Refinement Mappings. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1991, v:82, n:2, pp:253-284 [Journal ] Martín Abadi , Gordon D. Plotkin A Logical View of Composition. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1993, v:114, n:1, pp:3-30 [Journal ] Martín Abadi , Leonid Libkin , Frank Pfenning Editorial. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Log., 2002, v:3, n:3, pp:335-335 [Journal ] Butler W. Lampson , Martín Abadi , Michael Burrows , Edward Wobber Authentication in Distributed Systems: Theory and Practice. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1992, v:10, n:4, pp:265-310 [Journal ] Edward Wobber , Martín Abadi , Michael Burrows Authentication in the Taos Operating System. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 1994, v:12, n:1, pp:3-32 [Journal ] Martín Abadi , Michael Burrows , Mark S. Manasse , Ted Wobber Moderately hard, memory-bound functions. [Citation Graph (0, 0)][DBLP ] ACM Trans. Internet Techn., 2005, v:5, n:2, pp:299-327 [Journal ] Martín Abadi , Cormac Flanagan , Stephen N. Freund Types for safe locking: Static race detection for Java. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2006, v:28, n:2, pp:207-255 [Journal ] Martín Abadi , Leslie Lamport Composing Specifications. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1993, v:15, n:1, pp:73-132 [Journal ] Martín Abadi , Leslie Lamport An Old-Fashined Recipe for Real-Time. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1994, v:16, n:5, pp:1543-1571 [Journal ] Martín Abadi , Leslie Lamport Conjoining Specifications. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1995, v:17, n:3, pp:507-534 [Journal ] Raymie Stata , Martín Abadi A Type System for Java Bytecode Subroutines. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1999, v:21, n:1, pp:90-137 [Journal ] Martín Abadi Explicit Communication Revisited: Two New Attacks on Authentication Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1997, v:23, n:3, pp:185-186 [Journal ] Martín Abadi , Roger M. Needham Prudent Engineering Practice for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:1, pp:6-15 [Journal ] Nathan Whitehead , Jordan Johnson , Martín Abadi Policies and Proofs for Code Auditing. [Citation Graph (0, 0)][DBLP ] ATVA, 2007, pp:1-14 [Conf ] Martín Abadi Security Protocols: Principles and Calculi. [Citation Graph (0, 0)][DBLP ] FOSAD, 2007, pp:1-23 [Conf ] Ted Wobber , Aydan R. Yumerefendi , Martín Abadi , Andrew Birrell , Daniel R. Simon Authorizing applications in singularity. [Citation Graph (0, 0)][DBLP ] EuroSys, 2007, pp:355-368 [Conf ] Martín Abadi , Phillip Rogaway Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:3, pp:395- [Journal ] Martín Abadi , Bruno Blanchet , Cédric Fournet Just fast keying in the pi calculus. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal ] Martín Abadi , Jens Palsberg Editorial. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2007, v:29, n:3, pp:- [Journal ] Automatic Mutual Exclusion and Atomicity Checks. [Citation Graph (, )][DBLP ] Models and Proofs of Protocol Security: A Progress Report. [Citation Graph (, )][DBLP ] Implementation and Use of Transactional Memory with Dynamic Separation. [Citation Graph (, )][DBLP ] The good, the bad, and the provable. [Citation Graph (, )][DBLP ] A Model of Dynamic Separation for Transactional Memory. [Citation Graph (, )][DBLP ] Perspectives on Transactional Memory. [Citation Graph (, )][DBLP ] On Protection by Layout Randomization. [Citation Graph (, )][DBLP ] Variations in Access Control Logic. [Citation Graph (, )][DBLP ] Code-Carrying Authorization. [Citation Graph (, )][DBLP ] Logic in Access Control (Tutorial Notes). [Citation Graph (, )][DBLP ] A Modal Deconstruction of Access Control Logics. [Citation Graph (, )][DBLP ] Access Control in a World of Software Diversity. [Citation Graph (, )][DBLP ] Unified Declarative Platform for Secure Netwoked Information Systems. [Citation Graph (, )][DBLP ] The Fine Print of Security. [Citation Graph (, )][DBLP ] Semantics of transactional memory and automatic mutual exclusion. [Citation Graph (, )][DBLP ] A model of cooperative threads. [Citation Graph (, )][DBLP ] Transactional memory with strong atomicity using off-the-shelf memory protection hardware. [Citation Graph (, )][DBLP ] De-anonymizing the internet using unreliable IDs. [Citation Graph (, )][DBLP ] Search in 0.040secs, Finished in 0.047secs