2009 | ||
---|---|---|
186 | EE | Martín Abadi, Andrew Birrell, Tim Harris, Johnson Hsieh, Michael Isard: Implementation and Use of Transactional Memory with Dynamic Separation. CC 2009: 63-77 |
185 | EE | Wenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi: Unified Declarative Platform for Secure Netwoked Information Systems. ICDE 2009: 150-161 |
184 | EE | Martín Abadi, Gordon D. Plotkin: A model of cooperative threads. POPL 2009: 29-40 |
183 | EE | Martín Abadi, Tim Harris, Mojtaba Mehrara: Transactional memory with strong atomicity using off-the-shelf memory protection hardware. PPOPP 2009: 185-196 |
2008 | ||
182 | EE | Martín Abadi: The good, the bad, and the provable. ACM Conference on Computer and Communications Security 2008: 1 |
181 | EE | Martín Abadi, Tim Harris, Katherine F. Moore: A Model of Dynamic Separation for Transactional Memory. CONCUR 2008: 6-20 |
180 | EE | Martín Abadi: Automatic Mutual Exclusion and Atomicity Checks. Concurrency, Graphs and Models 2008: 510-526 |
179 | EE | Martín Abadi: Variations in Access Control Logic. DEON 2008: 96-109 |
178 | EE | Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon: Code-Carrying Authorization. ESORICS 2008: 563-579 |
177 | EE | Deepak Garg, Martín Abadi: A Modal Deconstruction of Access Control Logics. FoSSaCS 2008: 216-230 |
176 | EE | Martín Abadi, Andrew Birrell, Tim Harris, Michael Isard: Semantics of transactional memory and automatic mutual exclusion. POPL 2008: 63-74 |
175 | EE | Martín Abadi, Bogdan Warinschi: Security analysis of cryptographically controlled access to XML documents. J. ACM 55(2): (2008) |
174 | EE | Bruno Blanchet, Martín Abadi, Cédric Fournet: Automated verification of selected equivalences for security protocols. J. Log. Algebr. Program. 75(1): 3-51 (2008) |
2007 | ||
173 | EE | Nathan Whitehead, Jordan Johnson, Martín Abadi: Policies and Proofs for Code Auditing. ATVA 2007: 1-14 |
172 | EE | Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon: Authorizing applications in singularity. EuroSys 2007: 355-368 |
171 | EE | Martín Abadi: Security Protocols: Principles and Calculi. FOSAD 2007: 1-23 |
170 | EE | Martín Abadi, Bruno Blanchet, Cédric Fournet: Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3): (2007) |
169 | EE | Martín Abadi, Jens Palsberg: Editorial. ACM Trans. Program. Lang. Syst. 29(3): (2007) |
168 | EE | Martín Abadi: Access Control in a Core Calculus of Dependency. Electr. Notes Theor. Comput. Sci. 172: 5-31 (2007) |
167 | EE | Martín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 20(3): 395 (2007) |
2006 | ||
166 | EE | Martín Abadi, Ricardo Corin, Cédric Fournet: Computational Secrecy by Typing for the Pi Calculus. APLAS 2006: 253-269 |
165 | EE | Mihai Budiu, Úlfar Erlingsson, Martín Abadi: Architectural support for software-based protection. ASID 2006: 42-51 |
164 | EE | Avik Chaudhuri, Martín Abadi: Secrecy by Typing and File-Access Control. CSFW 2006: 112-123 |
163 | EE | Avik Chaudhuri, Martín Abadi: Formal Analysis of Dynamic, Distributed File-System Access Controls. FORTE 2006: 99-114 |
162 | EE | Martín Abadi, Mathieu Baudet, Bogdan Warinschi: Guessing Attacks and the Computational Soundness of Static Equivalence. FoSSaCS 2006: 398-412 |
161 | EE | Martín Abadi: Access control in a core calculus of dependency. ICFP 2006: 263-273 |
160 | EE | Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula: XFI: Software Guards for System Address Spaces. OSDI 2006: 75-88 |
159 | EE | Martín Abadi, Cormac Flanagan, Stephen N. Freund: Types for safe locking: Static race detection for Java. ACM Trans. Program. Lang. Syst. 28(2): 207-255 (2006) |
158 | EE | Martín Abadi, Véronique Cortier: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1-2): 2-32 (2006) |
2005 | ||
157 | Jens Palsberg, Martín Abadi: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005 ACM 2005 | |
156 | Martín Abadi, Luca de Alfaro: CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings Springer 2005 | |
155 | EE | Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti: Control-flow integrity. ACM Conference on Computer and Communications Security 2005: 340-353 |
154 | EE | Martín Abadi, Véronique Cortier: Deciding Knowledge in Security Protocols under (Many More) Equational Theories. CSFW 2005: 62-76 |
153 | EE | Avik Chaudhuri, Martín Abadi: Formal security analysis of basic network-attached storage. FMSE 2005: 43-52 |
152 | EE | Martín Abadi, Bogdan Warinschi: Password-Based Encryption Analyzed. ICALP 2005: 664-676 |
151 | EE | Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti: A Theory of Secure Control Flow. ICFEM 2005: 111-124 |
150 | EE | Bruno Blanchet, Martín Abadi, Cédric Fournet: Automated Verification of Selected Equivalences for Security Protocols. LICS 2005: 331-340 |
149 | EE | Martín Abadi, Bogdan Warinschi: Security analysis of cryptographically controlled access to XML documents. PODS 2005: 108-117 |
148 | EE | Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber: Moderately hard, memory-bound functions. ACM Trans. Internet Techn. 5(2): 299-327 (2005) |
147 | EE | Martín Abadi, Bruno Blanchet: Analyzing security protocols with secrecy types and logic programs. J. ACM 52(1): 102-146 (2005) |
146 | EE | Martín Abadi, Greg Morrisett, Andrei Sabelfeld: "Language-Based Security". J. Funct. Program. 15(2): 129 (2005) |
145 | EE | Martín Abadi, Bruno Blanchet: Computer-assisted verification of a protocol for certified email. Sci. Comput. Program. 58(1-2): 3-27 (2005) |
2004 | ||
144 | EE | Nathan Whitehead, Martín Abadi, George C. Necula: By Reason and Authority: A System for Authorization of Proof-Carrying Code. CSFW 2004: 236-250 |
143 | EE | Martín Abadi, Bruno Blanchet, Cédric Fournet: Just Fast Keying in the Pi Calculus. ESOP 2004: 340-354 |
142 | EE | Martín Abadi, Ted Wobber: A Logical Account of NGSCB. FORTE 2004: 1-12 |
141 | EE | Martín Abadi, Georges Gonthier, Benjamin Werner: Choice in Dynamic Linking. FoSSaCS 2004: 12-26 |
140 | EE | Martín Abadi, Véronique Cortier: Deciding Knowledge in Security Protocols Under Equational Theories. ICALP 2004: 46-58 |
139 | EE | Nathan Whitehead, Martín Abadi: BCiC: A System for Code Authentication and Verification. LPAR 2004: 110-124 |
138 | EE | Katia Hayati, Martín Abadi: Language-Based Enforcement of Privacy Policies. Privacy Enhancing Technologies 2004: 302-313 |
137 | Martín Abadi: Trusted Computing, Trusted Third Parties, and Verified Communications. SEC 2004: 291-308 | |
136 | EE | Martín Abadi, Cédric Fournet: Private authentication. Theor. Comput. Sci. 322(3): 427-476 (2004) |
2003 | ||
135 | EE | Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber: Bankable Postage for Network Services. ASIAN 2003: 72-90 |
134 | EE | Martín Abadi: Built-in Object Security. ECOOP 2003: 1 |
133 | EE | Martín Abadi: Logic in Access Control. LICS 2003: 228- |
132 | EE | Martín Abadi, Cédric Fournet: Access Control Based on Execution History. NDSS 2003 |
131 | EE | Martín Abadi, Michael Burrows, Ted Wobber: Moderately Hard, Memory-Bound Functions. NDSS 2003 |
130 | EE | Martín Abadi, Bruno Blanchet: Computer-Assisted Verification of a Protocol for Certified Email. SAS 2003: 316-335 |
129 | EE | Martín Abadi, K. Rustan M. Leino: A Logic of Object-Oriented Programs. Verification: Theory and Practice 2003: 11-41 |
128 | Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning About Secrecy for Active Networks. Journal of Computer Security 11(2): 245-287 (2003) | |
127 | EE | Martín Abadi, Bruno Blanchet: Secrecy types for asymmetric communication. Theor. Comput. Sci. 3(298): 387-415 (2003) |
2002 | ||
126 | EE | Cédric Fournet, Martín Abadi: Hiding Names: Private Authentication in the Applied Pi Calculus. ISSS 2002: 317-338 |
125 | EE | Martín Abadi, Bruno Blanchet: Analyzing security protocols with secrecy types and logic programs. POPL 2002: 33-44 |
124 | EE | Martín Abadi: Private Authentication. Privacy Enhancing Technologies 2002: 27-40 |
123 | EE | Martín Abadi, Neal Glew: Certified email with a light on-line trusted third party: design and implementation. WWW 2002: 387-395 |
122 | EE | Martín Abadi, Leonid Libkin, Frank Pfenning: Editorial. ACM Trans. Comput. Log. 3(3): 335-335 (2002) |
121 | EE | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. Inf. Comput. 174(1): 37-83 (2002) |
120 | EE | Martín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 15(2): 103-127 (2002) |
2001 | ||
119 | EE | Marcelo P. Fiore, Martín Abadi: Computing Symbolic Models for Verifying Cryptographic Protocols. CSFW 2001: 160-173 |
118 | EE | Martín Abadi, Bruno Blanchet: Secrecy Types for Asymmetric Communication. FoSSaCS 2001: 25-41 |
117 | EE | Martín Abadi: Leslie Lamport's properties and actions. PODC 2001: 15 |
116 | EE | Martín Abadi, Cédric Fournet: Mobile values, new names, and secure communication. POPL 2001: 104-115 |
115 | EE | Martín Abadi, Jan Jürjens: Formal Eavesdropping and Its Computational Interpretation. TACS 2001: 82-94 |
2000 | ||
114 | EE | Martín Abadi: Taming the Adversary. CRYPTO 2000: 353-358 |
113 | EE | Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning about Secrecy for Active Networks. CSFW 2000: 118-129 |
112 | EE | Martín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). IFIP TCS 2000: 3-22 |
111 | EE | Martín Abadi, Cédric Fournet, Georges Gonthier: Authentication Primitives and Their Compilation. POPL 2000: 302-315 |
110 | Martín Abadi: top-top-closed relations and admissibility. Mathematical Structures in Computer Science 10(3): 313-320 (2000) | |
1999 | ||
109 | EE | Cormac Flanagan, Martín Abadi: Object Types against Races. CONCUR 1999: 288-303 |
108 | EE | Cormac Flanagan, Martín Abadi: Types for Safe Locking. ESOP 1999: 91-108 |
107 | EE | Martín Abadi, Cédric Fournet, Georges Gonthier: A Top-Down Look at a Secure Message. FSTTCS 1999: 122-141 |
106 | Martín Abadi: Security Protocols and Specifications. FoSSaCS 1999: 1-13 | |
105 | EE | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Communications Processing for Distributed Languages. IEEE Symposium on Security and Privacy 1999: 74-88 |
104 | EE | Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke: A Core Calculus of Dependency. POPL 1999: 147-160 |
103 | Martín Abadi: Protection in Programming-Language Translations. Secure Internet Programming 1999: 19-34 | |
102 | Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber: Secure Network Objects. Secure Internet Programming 1999: 395-412 | |
101 | EE | Raymie Stata, Martín Abadi: A Type System for Java Bytecode Subroutines. ACM Trans. Program. Lang. Syst. 21(1): 90-137 (1999) |
100 | EE | Martín Abadi: Secrecy in Programming-Language Semantics. Electr. Notes Theor. Comput. Sci. 20: (1999) |
99 | Martín Abadi, Andrew D. Gordon: A Calculus for Cryptographic Protocols: The spi Calculus. Inf. Comput. 148(1): 1-70 (1999) | |
1998 | ||
98 | EE | Martín Abadi: Two Facets of Authentication. CSFW 1998: 27-32 |
97 | EE | Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 |
96 | EE | Martín Abadi: Protection in Programming-Language Translations: Mobile Object Systems (Abstract). ECOOP Workshops 1998: 291 |
95 | EE | Martín Abadi, Andrew D. Gordon: A Bisimulation Method for Cryptographic Protocols. ESOP 1998: 12-26 |
94 | EE | Martín Abadi: Protection in Programming-Language Translations. ICALP 1998: 868-883 |
93 | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. LICS 1998: 105-116 | |
92 | EE | Raymie Stata, Martín Abadi: A Type System for Java Bytecode Subroutines. POPL 1998: 149-160 |
91 | EE | Martín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber: Secure Web Tunneling. Computer Networks 30(1-7): 531-539 (1998) |
90 | Martín Abadi: On SDSI's Linked Local Name Spaces. Journal of Computer Security 6(1-2): 3-22 (1998) | |
89 | Martín Abadi, Andrew D. Gordon: A Bisimulation Method for Cryptographic Protocols. Nord. J. Comput. 5(4): 267- (1998) | |
1997 | ||
88 | Martín Abadi, Takayasu Ito: Theoretical Aspects of Computer Software, Third International Symposium, TACS '97, Sendai, Japan, September 23-26, 1997, Proceedings Springer 1997 | |
87 | EE | Martín Abadi, Andrew D. Gordon: A Calculus for Cryptographic Protocols: The Spi Calculus. ACM Conference on Computer and Communications Security 1997: 36-47 |
86 | Martín Abadi, Andrew D. Gordon: Reasoning about Cryptographic Protocols in the Spi Calculus. CONCUR 1997: 59-73 | |
85 | EE | Martín Abadi: On SDSI's Linked Local Name Spaces. CSFW 1997: 98-108 |
84 | Martín Abadi: Secrecy by Typing inSecurity Protocols. TACS 1997: 611-638 | |
83 | Martín Abadi, K. Rustan M. Leino: A Logic of Object-Oriented Programs. TAPSOFT 1997: 682-696 | |
82 | EE | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. Electr. Notes Theor. Comput. Sci. 10: (1997) |
81 | EE | Martín Abadi: Explicit Communication Revisited: Two New Attacks on Authentication Protocols. IEEE Trans. Software Eng. 23(3): 185-186 (1997) |
1996 | ||
80 | Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy: Analysis and Caching of Dependencies. ICFP 1996: 83-91 | |
79 | EE | Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber: Secure Network Objects. IEEE Symposium on Security and Privacy 1996: 211-221 |
78 | Martín Abadi, Marcelo P. Fiore: Syntactic Considerations on Recursive Types. LICS 1996: 242-252 | |
77 | Martín Abadi, Stephan Merz: On TLA as a logic. NATO ASI DPD 1996: 235-271 | |
76 | EE | Martín Abadi, Luca Cardelli, Ramesh Viswanathan: An Interpretation of Objects and Object Types. POPL 1996: 396-409 |
75 | EE | Martín Abadi, Luca Cardelli: On Subtyping and Matching. ACM Trans. Program. Lang. Syst. 18(4): 401-423 (1996) |
74 | EE | Martín Abadi, Roger M. Needham: Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Software Eng. 22(1): 6-15 (1996) |
73 | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects: Untyped and First-Order Systems. Inf. Comput. 125(2): 78-102 (1996) | |
1995 | ||
72 | EE | Martín Abadi, Luca Cardelli: On Subtyping and Matching. ECOOP 1995: 145-167 |
71 | Martín Abadi, Stephan Merz: An Abstract Account of Composition. MFCS 1995: 499-508 | |
70 | Martín Abadi, Luca Cardelli: An Imperative Object Calculus. TAPSOFT 1995: 471-485 | |
69 | Roberto Bellucci, Martín Abadi, Pierre-Louis Curien: A Model for Formal Parametric Polymorphism: A PER Interpretation for System R. TLCA 1995: 32-46 | |
68 | EE | Martín Abadi, Leslie Lamport: Conjoining Specifications. ACM Trans. Program. Lang. Syst. 17(3): 507-534 (1995) |
67 | Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Didier Rémy: Dynamic Typing in Polymorphic Languages. J. Funct. Program. 5(1): 111-130 (1995) | |
66 | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects: Second-Order Systems. Sci. Comput. Program. 25(2-3): 81-116 (1995) | |
65 | John Lamping, Martín Abadi: Methods as Assertions. TAPOS 1(1): 5-18 (1995) | |
64 | Martín Abadi, Luca Cardelli: An Imperative Object Calculus (Invited Paper). TAPOS 1(3): 151-166 (1995) | |
1994 | ||
63 | EE | John Lamping, Martín Abadi: Methods as Assertions. ECOOP 1994: 60-80 |
62 | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects - Scond-Order Systems. ESOP 1994: 1-25 | |
61 | Martín Abadi, Leslie Lamport, Stephan Merz: A TLA Solution to the RPC-Memory Specification Problem. Formal Systems Specification 1994: 21-66 | |
60 | Gordon D. Plotkin, Martín Abadi, Luca Cardelli: Subtyping and Parametricity LICS 1994: 310-319 | |
59 | Martín Abadi, Luca Cardelli: A Semantics of Object Types LICS 1994: 332-341 | |
58 | Martín Abadi, Leslie Lamport: Open Systems in TLA. PODC 1994: 81-90 | |
57 | Martín Abadi, Leslie Lamport: Decomposing Specifications of Concurrent Systems. PROCOMET 1994: 327-340 | |
56 | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects - Untyped and First-Order Systems. TACS 1994: 296-320 | |
55 | EE | Edward Wobber, Martín Abadi, Michael Burrows: Authentication in the Taos Operating System. ACM Trans. Comput. Syst. 12(1): 3-32 (1994) |
54 | EE | Martín Abadi, Leslie Lamport: An Old-Fashined Recipe for Real-Time. ACM Trans. Program. Lang. Syst. 16(5): 1543-1571 (1994) |
53 | Martín Abadi: A Semantics for Static Type Inference in a Nondeterministic Language Inf. Comput. 109(1/2): 300-306 (1994) | |
52 | Martín Abadi, Joseph Y. Halpern: Decidability and Expressiveness for First-Order Logics of Probability Inf. Comput. 112(1): 1-36 (1994) | |
51 | Martín Abadi: Baby Modula-3 and a Theory of Objects. J. Funct. Program. 4(2): 249-283 (1994) | |
1993 | ||
50 | EE | Luca Cardelli, Florian Matthes, Martín Abadi: Extensible Grammars for Language Specialization. DBPL 1993: 11-31 |
49 | Martín Abadi, Luca Cardelli, Pierre-Louis Curien: Formal Parametric Polymorphism. POPL 1993: 157-170 | |
48 | Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson: Authentication in the Taos Operating System. SOSP 1993: 256-269 | |
47 | Gordon D. Plotkin, Martín Abadi: A Logic for Parametric Polymorphism. TLCA 1993: 361-375 | |
46 | EE | Martín Abadi, Leslie Lamport: Composing Specifications. ACM Trans. Program. Lang. Syst. 15(1): 73-132 (1993) |
45 | EE | Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin: A Calculus for Access Control in Distributed Systems. ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993) |
44 | Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson: Authentification and Delegation with Smart-Cards. Sci. Comput. Program. 21(2): 93-113 (1993) | |
43 | Martín Abadi, Gordon D. Plotkin: A Logical View of Composition. Theor. Comput. Sci. 114(1): 3-30 (1993) | |
42 | Martín Abadi, Luca Cardelli, Pierre-Louis Curien: Formal Parametric Polymorphism. Theor. Comput. Sci. 121(1&2): 9-58 (1993) | |
1992 | ||
41 | Georges Gonthier, Martín Abadi, Jean-Jacques Lévy: Linear Logic Without Boxes LICS 1992: 223-234 | |
40 | Georges Gonthier, Martín Abadi, Jean-Jacques Lévy: The Geometry of Optimal Lambda Reduction. POPL 1992: 15-26 | |
39 | EE | Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber: Authentication in Distributed Systems: Theory and Practice. ACM Trans. Comput. Syst. 10(4): 265-310 (1992) |
1991 | ||
38 | EE | Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin: A Calculus for Access Control in Distributed Systems. CRYPTO 1991: 1-23 |
37 | Martín Abadi, Mark R. Tuttle: A Semantics for a Logic of Authentication (Extended Abstract). PODC 1991: 201-216 | |
36 | Martín Abadi, Gordon D. Plotkin: A Logical View of Composition and Refinement. POPL 1991: 323-332 | |
35 | Martín Abadi, Leslie Lamport: An Old-Fashioned Recipe for Real Time. REX Workshop 1991: 1-27 | |
34 | Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber: Authentication in Distributed Systems: Theory and Practice. SOSP 1991: 165-182 | |
33 | Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson: Authentication and Delegation with Smart-cards. TACS 1991: 326-345 | |
32 | EE | Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin: Dynamic Typing in a Statically Typed Language. ACM Trans. Program. Lang. Syst. 13(2): 237-268 (1991) |
31 | Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider: Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''. Inf. Process. Lett. 40(3): 141-142 (1991) | |
30 | Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin: Faithful Ideal Models for Recursive Polymorphic Types. Int. J. Found. Comput. Sci. 2(1): 1-21 (1991) | |
29 | Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy: Explicit Substitutions. J. Funct. Program. 1(4): 375-416 (1991) | |
28 | Martín Abadi, Leslie Lamport: The Existence of Refinement Mappings. Theor. Comput. Sci. 82(2): 253-284 (1991) | |
1990 | ||
27 | Martín Abadi: An Axiomatization of Lamport's Temporal Logic of Actions. CONCUR 1990: 57-69 | |
26 | Martín Abadi, Gordon D. Plotkin: A Per Model of Polymorphism and Recursive Types LICS 1990: 355-365 | |
25 | Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy: Explicit Substitutions. POPL 1990: 31-46 | |
24 | EE | Michael Burrows, Martín Abadi, Roger M. Needham: A Logic of Authentication. ACM Trans. Comput. Syst. 8(1): 18-36 (1990) |
23 | EE | Martín Abadi, Zohar Manna: Nonclausal Deduction in First-Order Temporal Logic J. ACM 37(2): 279-317 (1990) |
22 | Martín Abadi, Joan Feigenbaum: Secure Circuit Evaluation. J. Cryptology 2(1): 1-12 (1990) | |
21 | Michael Burrows, Martín Abadi, Roger M. Needham: Rejoinder to Nessett. Operating Systems Review 24(2): 39-40 (1990) | |
20 | Martín Abadi: Corrigendum: The Power of Temporal Proofs. Theor. Comput. Sci. 70(2): 275 (1990) | |
1989 | ||
19 | Martín Abadi, Joseph Y. Halpern: Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract) FOCS 1989: 148-153 | |
18 | Martín Abadi, Leslie Lamport, Pierre Wolper: Realizable and Unrealizable Specifications of Reactive Systems. ICALP 1989: 1-17 | |
17 | Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin: Faithful Ideal Models for Recursive Polymorphic Types LICS 1989: 216-225 | |
16 | Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin: Dynamic Typing in a Statically-Typed Language. POPL 1989: 213-227 | |
15 | Martín Abadi, Leslie Lamport: Composing Specifications. REX Workshop 1989: 1-41 | |
14 | Michael Burrows, Martín Abadi, Roger M. Needham: A Logic of Authentication. SOSP 1989: 1-13 | |
13 | Martín Abadi, Joan Feigenbaum, Joe Kilian: On Hiding Information from an Oracle. J. Comput. Syst. Sci. 39(1): 21-50 (1989) | |
12 | Martín Abadi, Zohar Manna: Temporal Logic Programming. J. Symb. Comput. 8(3): 277-295 (1989) | |
11 | Martín Abadi: The Power of Temporal Proofs. Theor. Comput. Sci. 65(1): 35-83 (1989) | |
1988 | ||
10 | EE | Martín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra: On Generating Solved Instances of Computational Problems. CRYPTO 1988: 297-310 |
9 | Martín Abadi, Leslie Lamport: The Existence of Refinement Mappings LICS 1988: 165-175 | |
8 | Martín Abadi, Joan Feigenbaum: A Simple Protocol for Secure Circuit Evaluation. STACS 1988: 264-272 | |
7 | Michael Burrows, Martín Abadi, Roger M. Needham: Authentication: A Practical Study in Belief and Action. TARK 1988: 325-342 | |
1987 | ||
6 | Martín Abadi: The Power of Temporal Proofs LICS 1987: 123-130 | |
5 | Martín Abadi, Zohar Manna: Temporal Logic Programming. SLP 1987: 4-16 | |
4 | Martín Abadi, Joan Feigenbaum, Joe Kilian: On Hiding Information from an Oracle (Extended Abstract) STOC 1987: 195-203 | |
1986 | ||
3 | Martín Abadi, Zohar Manna: Modal Theorem Proving. CADE 1986: 172-189 | |
2 | Martín Abadi, Zohar Manna: A Timely Resolution LICS 1986: 176-186 | |
1985 | ||
1 | Martín Abadi, Zohar Manna: Nonclausal Temporal Deduction. Logic of Programs 1985: 1-15 |