2009 |
186 | EE | Martín Abadi,
Andrew Birrell,
Tim Harris,
Johnson Hsieh,
Michael Isard:
Implementation and Use of Transactional Memory with Dynamic Separation.
CC 2009: 63-77 |
185 | EE | Wenchao Zhou,
Yun Mao,
Boon Thau Loo,
Martín Abadi:
Unified Declarative Platform for Secure Netwoked Information Systems.
ICDE 2009: 150-161 |
184 | EE | Martín Abadi,
Gordon D. Plotkin:
A model of cooperative threads.
POPL 2009: 29-40 |
183 | EE | Martín Abadi,
Tim Harris,
Mojtaba Mehrara:
Transactional memory with strong atomicity using off-the-shelf memory protection hardware.
PPOPP 2009: 185-196 |
2008 |
182 | EE | Martín Abadi:
The good, the bad, and the provable.
ACM Conference on Computer and Communications Security 2008: 1 |
181 | EE | Martín Abadi,
Tim Harris,
Katherine F. Moore:
A Model of Dynamic Separation for Transactional Memory.
CONCUR 2008: 6-20 |
180 | EE | Martín Abadi:
Automatic Mutual Exclusion and Atomicity Checks.
Concurrency, Graphs and Models 2008: 510-526 |
179 | EE | Martín Abadi:
Variations in Access Control Logic.
DEON 2008: 96-109 |
178 | EE | Sergio Maffeis,
Martín Abadi,
Cédric Fournet,
Andrew D. Gordon:
Code-Carrying Authorization.
ESORICS 2008: 563-579 |
177 | EE | Deepak Garg,
Martín Abadi:
A Modal Deconstruction of Access Control Logics.
FoSSaCS 2008: 216-230 |
176 | EE | Martín Abadi,
Andrew Birrell,
Tim Harris,
Michael Isard:
Semantics of transactional memory and automatic mutual exclusion.
POPL 2008: 63-74 |
175 | EE | Martín Abadi,
Bogdan Warinschi:
Security analysis of cryptographically controlled access to XML documents.
J. ACM 55(2): (2008) |
174 | EE | Bruno Blanchet,
Martín Abadi,
Cédric Fournet:
Automated verification of selected equivalences for security protocols.
J. Log. Algebr. Program. 75(1): 3-51 (2008) |
2007 |
173 | EE | Nathan Whitehead,
Jordan Johnson,
Martín Abadi:
Policies and Proofs for Code Auditing.
ATVA 2007: 1-14 |
172 | EE | Ted Wobber,
Aydan R. Yumerefendi,
Martín Abadi,
Andrew Birrell,
Daniel R. Simon:
Authorizing applications in singularity.
EuroSys 2007: 355-368 |
171 | EE | Martín Abadi:
Security Protocols: Principles and Calculi.
FOSAD 2007: 1-23 |
170 | EE | Martín Abadi,
Bruno Blanchet,
Cédric Fournet:
Just fast keying in the pi calculus.
ACM Trans. Inf. Syst. Secur. 10(3): (2007) |
169 | EE | Martín Abadi,
Jens Palsberg:
Editorial.
ACM Trans. Program. Lang. Syst. 29(3): (2007) |
168 | EE | Martín Abadi:
Access Control in a Core Calculus of Dependency.
Electr. Notes Theor. Comput. Sci. 172: 5-31 (2007) |
167 | EE | Martín Abadi,
Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
J. Cryptology 20(3): 395 (2007) |
2006 |
166 | EE | Martín Abadi,
Ricardo Corin,
Cédric Fournet:
Computational Secrecy by Typing for the Pi Calculus.
APLAS 2006: 253-269 |
165 | EE | Mihai Budiu,
Úlfar Erlingsson,
Martín Abadi:
Architectural support for software-based protection.
ASID 2006: 42-51 |
164 | EE | Avik Chaudhuri,
Martín Abadi:
Secrecy by Typing and File-Access Control.
CSFW 2006: 112-123 |
163 | EE | Avik Chaudhuri,
Martín Abadi:
Formal Analysis of Dynamic, Distributed File-System Access Controls.
FORTE 2006: 99-114 |
162 | EE | Martín Abadi,
Mathieu Baudet,
Bogdan Warinschi:
Guessing Attacks and the Computational Soundness of Static Equivalence.
FoSSaCS 2006: 398-412 |
161 | EE | Martín Abadi:
Access control in a core calculus of dependency.
ICFP 2006: 263-273 |
160 | EE | Úlfar Erlingsson,
Martín Abadi,
Michael Vrable,
Mihai Budiu,
George C. Necula:
XFI: Software Guards for System Address Spaces.
OSDI 2006: 75-88 |
159 | EE | Martín Abadi,
Cormac Flanagan,
Stephen N. Freund:
Types for safe locking: Static race detection for Java.
ACM Trans. Program. Lang. Syst. 28(2): 207-255 (2006) |
158 | EE | Martín Abadi,
Véronique Cortier:
Deciding knowledge in security protocols under equational theories.
Theor. Comput. Sci. 367(1-2): 2-32 (2006) |
2005 |
157 | | Jens Palsberg,
Martín Abadi:
Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005
ACM 2005 |
156 | | Martín Abadi,
Luca de Alfaro:
CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings
Springer 2005 |
155 | EE | Martín Abadi,
Mihai Budiu,
Úlfar Erlingsson,
Jay Ligatti:
Control-flow integrity.
ACM Conference on Computer and Communications Security 2005: 340-353 |
154 | EE | Martín Abadi,
Véronique Cortier:
Deciding Knowledge in Security Protocols under (Many More) Equational Theories.
CSFW 2005: 62-76 |
153 | EE | Avik Chaudhuri,
Martín Abadi:
Formal security analysis of basic network-attached storage.
FMSE 2005: 43-52 |
152 | EE | Martín Abadi,
Bogdan Warinschi:
Password-Based Encryption Analyzed.
ICALP 2005: 664-676 |
151 | EE | Martín Abadi,
Mihai Budiu,
Úlfar Erlingsson,
Jay Ligatti:
A Theory of Secure Control Flow.
ICFEM 2005: 111-124 |
150 | EE | Bruno Blanchet,
Martín Abadi,
Cédric Fournet:
Automated Verification of Selected Equivalences for Security Protocols.
LICS 2005: 331-340 |
149 | EE | Martín Abadi,
Bogdan Warinschi:
Security analysis of cryptographically controlled access to XML documents.
PODS 2005: 108-117 |
148 | EE | Martín Abadi,
Michael Burrows,
Mark S. Manasse,
Ted Wobber:
Moderately hard, memory-bound functions.
ACM Trans. Internet Techn. 5(2): 299-327 (2005) |
147 | EE | Martín Abadi,
Bruno Blanchet:
Analyzing security protocols with secrecy types and logic programs.
J. ACM 52(1): 102-146 (2005) |
146 | EE | Martín Abadi,
Greg Morrisett,
Andrei Sabelfeld:
"Language-Based Security".
J. Funct. Program. 15(2): 129 (2005) |
145 | EE | Martín Abadi,
Bruno Blanchet:
Computer-assisted verification of a protocol for certified email.
Sci. Comput. Program. 58(1-2): 3-27 (2005) |
2004 |
144 | EE | Nathan Whitehead,
Martín Abadi,
George C. Necula:
By Reason and Authority: A System for Authorization of Proof-Carrying Code.
CSFW 2004: 236-250 |
143 | EE | Martín Abadi,
Bruno Blanchet,
Cédric Fournet:
Just Fast Keying in the Pi Calculus.
ESOP 2004: 340-354 |
142 | EE | Martín Abadi,
Ted Wobber:
A Logical Account of NGSCB.
FORTE 2004: 1-12 |
141 | EE | Martín Abadi,
Georges Gonthier,
Benjamin Werner:
Choice in Dynamic Linking.
FoSSaCS 2004: 12-26 |
140 | EE | Martín Abadi,
Véronique Cortier:
Deciding Knowledge in Security Protocols Under Equational Theories.
ICALP 2004: 46-58 |
139 | EE | Nathan Whitehead,
Martín Abadi:
BCiC: A System for Code Authentication and Verification.
LPAR 2004: 110-124 |
138 | EE | Katia Hayati,
Martín Abadi:
Language-Based Enforcement of Privacy Policies.
Privacy Enhancing Technologies 2004: 302-313 |
137 | | Martín Abadi:
Trusted Computing, Trusted Third Parties, and Verified Communications.
SEC 2004: 291-308 |
136 | EE | Martín Abadi,
Cédric Fournet:
Private authentication.
Theor. Comput. Sci. 322(3): 427-476 (2004) |
2003 |
135 | EE | Martín Abadi,
Andrew Birrell,
Michael Burrows,
Frank Dabek,
Ted Wobber:
Bankable Postage for Network Services.
ASIAN 2003: 72-90 |
134 | EE | Martín Abadi:
Built-in Object Security.
ECOOP 2003: 1 |
133 | EE | Martín Abadi:
Logic in Access Control.
LICS 2003: 228- |
132 | EE | Martín Abadi,
Cédric Fournet:
Access Control Based on Execution History.
NDSS 2003 |
131 | EE | Martín Abadi,
Michael Burrows,
Ted Wobber:
Moderately Hard, Memory-Bound Functions.
NDSS 2003 |
130 | EE | Martín Abadi,
Bruno Blanchet:
Computer-Assisted Verification of a Protocol for Certified Email.
SAS 2003: 316-335 |
129 | EE | Martín Abadi,
K. Rustan M. Leino:
A Logic of Object-Oriented Programs.
Verification: Theory and Practice 2003: 11-41 |
128 | | Pankaj Kakkar,
Carl A. Gunter,
Martín Abadi:
Reasoning About Secrecy for Active Networks.
Journal of Computer Security 11(2): 245-287 (2003) |
127 | EE | Martín Abadi,
Bruno Blanchet:
Secrecy types for asymmetric communication.
Theor. Comput. Sci. 3(298): 387-415 (2003) |
2002 |
126 | EE | Cédric Fournet,
Martín Abadi:
Hiding Names: Private Authentication in the Applied Pi Calculus.
ISSS 2002: 317-338 |
125 | EE | Martín Abadi,
Bruno Blanchet:
Analyzing security protocols with secrecy types and logic programs.
POPL 2002: 33-44 |
124 | EE | Martín Abadi:
Private Authentication.
Privacy Enhancing Technologies 2002: 27-40 |
123 | EE | Martín Abadi,
Neal Glew:
Certified email with a light on-line trusted third party: design and implementation.
WWW 2002: 387-395 |
122 | EE | Martín Abadi,
Leonid Libkin,
Frank Pfenning:
Editorial.
ACM Trans. Comput. Log. 3(3): 335-335 (2002) |
121 | EE | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
Secure Implementation of Channel Abstractions.
Inf. Comput. 174(1): 37-83 (2002) |
120 | EE | Martín Abadi,
Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
J. Cryptology 15(2): 103-127 (2002) |
2001 |
119 | EE | Marcelo P. Fiore,
Martín Abadi:
Computing Symbolic Models for Verifying Cryptographic Protocols.
CSFW 2001: 160-173 |
118 | EE | Martín Abadi,
Bruno Blanchet:
Secrecy Types for Asymmetric Communication.
FoSSaCS 2001: 25-41 |
117 | EE | Martín Abadi:
Leslie Lamport's properties and actions.
PODC 2001: 15 |
116 | EE | Martín Abadi,
Cédric Fournet:
Mobile values, new names, and secure communication.
POPL 2001: 104-115 |
115 | EE | Martín Abadi,
Jan Jürjens:
Formal Eavesdropping and Its Computational Interpretation.
TACS 2001: 82-94 |
2000 |
114 | EE | Martín Abadi:
Taming the Adversary.
CRYPTO 2000: 353-358 |
113 | EE | Pankaj Kakkar,
Carl A. Gunter,
Martín Abadi:
Reasoning about Secrecy for Active Networks.
CSFW 2000: 118-129 |
112 | EE | Martín Abadi,
Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
IFIP TCS 2000: 3-22 |
111 | EE | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
Authentication Primitives and Their Compilation.
POPL 2000: 302-315 |
110 | | Martín Abadi:
top-top-closed relations and admissibility.
Mathematical Structures in Computer Science 10(3): 313-320 (2000) |
1999 |
109 | EE | Cormac Flanagan,
Martín Abadi:
Object Types against Races.
CONCUR 1999: 288-303 |
108 | EE | Cormac Flanagan,
Martín Abadi:
Types for Safe Locking.
ESOP 1999: 91-108 |
107 | EE | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
A Top-Down Look at a Secure Message.
FSTTCS 1999: 122-141 |
106 | | Martín Abadi:
Security Protocols and Specifications.
FoSSaCS 1999: 1-13 |
105 | EE | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
Secure Communications Processing for Distributed Languages.
IEEE Symposium on Security and Privacy 1999: 74-88 |
104 | EE | Martín Abadi,
Anindya Banerjee,
Nevin Heintze,
Jon G. Riecke:
A Core Calculus of Dependency.
POPL 1999: 147-160 |
103 | | Martín Abadi:
Protection in Programming-Language Translations.
Secure Internet Programming 1999: 19-34 |
102 | | Leendert van Doorn,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Secure Network Objects.
Secure Internet Programming 1999: 395-412 |
101 | EE | Raymie Stata,
Martín Abadi:
A Type System for Java Bytecode Subroutines.
ACM Trans. Program. Lang. Syst. 21(1): 90-137 (1999) |
100 | EE | Martín Abadi:
Secrecy in Programming-Language Semantics.
Electr. Notes Theor. Comput. Sci. 20: (1999) |
99 | | Martín Abadi,
Andrew D. Gordon:
A Calculus for Cryptographic Protocols: The spi Calculus.
Inf. Comput. 148(1): 1-70 (1999) |
1998 |
98 | EE | Martín Abadi:
Two Facets of Authentication.
CSFW 1998: 27-32 |
97 | EE | Roberto Gorrieri,
Paul F. Syverson,
Martín Abadi,
Riccardo Focardi,
Dieter Gollmann,
Gavin Lowe,
Catherine Meadows:
Panel Introduction: Varieties of Authentication.
CSFW 1998: 79-82 |
96 | EE | Martín Abadi:
Protection in Programming-Language Translations: Mobile Object Systems (Abstract).
ECOOP Workshops 1998: 291 |
95 | EE | Martín Abadi,
Andrew D. Gordon:
A Bisimulation Method for Cryptographic Protocols.
ESOP 1998: 12-26 |
94 | EE | Martín Abadi:
Protection in Programming-Language Translations.
ICALP 1998: 868-883 |
93 | | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
Secure Implementation of Channel Abstractions.
LICS 1998: 105-116 |
92 | EE | Raymie Stata,
Martín Abadi:
A Type System for Java Bytecode Subroutines.
POPL 1998: 149-160 |
91 | EE | Martín Abadi,
Andrew Birrell,
Raymie Stata,
Edward Wobber:
Secure Web Tunneling.
Computer Networks 30(1-7): 531-539 (1998) |
90 | | Martín Abadi:
On SDSI's Linked Local Name Spaces.
Journal of Computer Security 6(1-2): 3-22 (1998) |
89 | | Martín Abadi,
Andrew D. Gordon:
A Bisimulation Method for Cryptographic Protocols.
Nord. J. Comput. 5(4): 267- (1998) |
1997 |
88 | | Martín Abadi,
Takayasu Ito:
Theoretical Aspects of Computer Software, Third International Symposium, TACS '97, Sendai, Japan, September 23-26, 1997, Proceedings
Springer 1997 |
87 | EE | Martín Abadi,
Andrew D. Gordon:
A Calculus for Cryptographic Protocols: The Spi Calculus.
ACM Conference on Computer and Communications Security 1997: 36-47 |
86 | | Martín Abadi,
Andrew D. Gordon:
Reasoning about Cryptographic Protocols in the Spi Calculus.
CONCUR 1997: 59-73 |
85 | EE | Martín Abadi:
On SDSI's Linked Local Name Spaces.
CSFW 1997: 98-108 |
84 | | Martín Abadi:
Secrecy by Typing inSecurity Protocols.
TACS 1997: 611-638 |
83 | | Martín Abadi,
K. Rustan M. Leino:
A Logic of Object-Oriented Programs.
TAPSOFT 1997: 682-696 |
82 | EE | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
Secure Implementation of Channel Abstractions.
Electr. Notes Theor. Comput. Sci. 10: (1997) |
81 | EE | Martín Abadi:
Explicit Communication Revisited: Two New Attacks on Authentication Protocols.
IEEE Trans. Software Eng. 23(3): 185-186 (1997) |
1996 |
80 | | Martín Abadi,
Butler W. Lampson,
Jean-Jacques Lévy:
Analysis and Caching of Dependencies.
ICFP 1996: 83-91 |
79 | EE | Leendert van Doorn,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Secure Network Objects.
IEEE Symposium on Security and Privacy 1996: 211-221 |
78 | | Martín Abadi,
Marcelo P. Fiore:
Syntactic Considerations on Recursive Types.
LICS 1996: 242-252 |
77 | | Martín Abadi,
Stephan Merz:
On TLA as a logic.
NATO ASI DPD 1996: 235-271 |
76 | EE | Martín Abadi,
Luca Cardelli,
Ramesh Viswanathan:
An Interpretation of Objects and Object Types.
POPL 1996: 396-409 |
75 | EE | Martín Abadi,
Luca Cardelli:
On Subtyping and Matching.
ACM Trans. Program. Lang. Syst. 18(4): 401-423 (1996) |
74 | EE | Martín Abadi,
Roger M. Needham:
Prudent Engineering Practice for Cryptographic Protocols.
IEEE Trans. Software Eng. 22(1): 6-15 (1996) |
73 | | Martín Abadi,
Luca Cardelli:
A Theory of Primitive Objects: Untyped and First-Order Systems.
Inf. Comput. 125(2): 78-102 (1996) |
1995 |
72 | EE | Martín Abadi,
Luca Cardelli:
On Subtyping and Matching.
ECOOP 1995: 145-167 |
71 | | Martín Abadi,
Stephan Merz:
An Abstract Account of Composition.
MFCS 1995: 499-508 |
70 | | Martín Abadi,
Luca Cardelli:
An Imperative Object Calculus.
TAPSOFT 1995: 471-485 |
69 | | Roberto Bellucci,
Martín Abadi,
Pierre-Louis Curien:
A Model for Formal Parametric Polymorphism: A PER Interpretation for System R.
TLCA 1995: 32-46 |
68 | EE | Martín Abadi,
Leslie Lamport:
Conjoining Specifications.
ACM Trans. Program. Lang. Syst. 17(3): 507-534 (1995) |
67 | | Martín Abadi,
Luca Cardelli,
Benjamin C. Pierce,
Didier Rémy:
Dynamic Typing in Polymorphic Languages.
J. Funct. Program. 5(1): 111-130 (1995) |
66 | | Martín Abadi,
Luca Cardelli:
A Theory of Primitive Objects: Second-Order Systems.
Sci. Comput. Program. 25(2-3): 81-116 (1995) |
65 | | John Lamping,
Martín Abadi:
Methods as Assertions.
TAPOS 1(1): 5-18 (1995) |
64 | | Martín Abadi,
Luca Cardelli:
An Imperative Object Calculus (Invited Paper).
TAPOS 1(3): 151-166 (1995) |
1994 |
63 | EE | John Lamping,
Martín Abadi:
Methods as Assertions.
ECOOP 1994: 60-80 |
62 | | Martín Abadi,
Luca Cardelli:
A Theory of Primitive Objects - Scond-Order Systems.
ESOP 1994: 1-25 |
61 | | Martín Abadi,
Leslie Lamport,
Stephan Merz:
A TLA Solution to the RPC-Memory Specification Problem.
Formal Systems Specification 1994: 21-66 |
60 | | Gordon D. Plotkin,
Martín Abadi,
Luca Cardelli:
Subtyping and Parametricity
LICS 1994: 310-319 |
59 | | Martín Abadi,
Luca Cardelli:
A Semantics of Object Types
LICS 1994: 332-341 |
58 | | Martín Abadi,
Leslie Lamport:
Open Systems in TLA.
PODC 1994: 81-90 |
57 | | Martín Abadi,
Leslie Lamport:
Decomposing Specifications of Concurrent Systems.
PROCOMET 1994: 327-340 |
56 | | Martín Abadi,
Luca Cardelli:
A Theory of Primitive Objects - Untyped and First-Order Systems.
TACS 1994: 296-320 |
55 | EE | Edward Wobber,
Martín Abadi,
Michael Burrows:
Authentication in the Taos Operating System.
ACM Trans. Comput. Syst. 12(1): 3-32 (1994) |
54 | EE | Martín Abadi,
Leslie Lamport:
An Old-Fashined Recipe for Real-Time.
ACM Trans. Program. Lang. Syst. 16(5): 1543-1571 (1994) |
53 | | Martín Abadi:
A Semantics for Static Type Inference in a Nondeterministic Language
Inf. Comput. 109(1/2): 300-306 (1994) |
52 | | Martín Abadi,
Joseph Y. Halpern:
Decidability and Expressiveness for First-Order Logics of Probability
Inf. Comput. 112(1): 1-36 (1994) |
51 | | Martín Abadi:
Baby Modula-3 and a Theory of Objects.
J. Funct. Program. 4(2): 249-283 (1994) |
1993 |
50 | EE | Luca Cardelli,
Florian Matthes,
Martín Abadi:
Extensible Grammars for Language Specialization.
DBPL 1993: 11-31 |
49 | | Martín Abadi,
Luca Cardelli,
Pierre-Louis Curien:
Formal Parametric Polymorphism.
POPL 1993: 157-170 |
48 | | Edward Wobber,
Martín Abadi,
Michael Burrows,
Butler W. Lampson:
Authentication in the Taos Operating System.
SOSP 1993: 256-269 |
47 | | Gordon D. Plotkin,
Martín Abadi:
A Logic for Parametric Polymorphism.
TLCA 1993: 361-375 |
46 | EE | Martín Abadi,
Leslie Lamport:
Composing Specifications.
ACM Trans. Program. Lang. Syst. 15(1): 73-132 (1993) |
45 | EE | Martín Abadi,
Michael Burrows,
Butler W. Lampson,
Gordon D. Plotkin:
A Calculus for Access Control in Distributed Systems.
ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993) |
44 | | Martín Abadi,
Michael Burrows,
C. Kaufman,
Butler W. Lampson:
Authentification and Delegation with Smart-Cards.
Sci. Comput. Program. 21(2): 93-113 (1993) |
43 | | Martín Abadi,
Gordon D. Plotkin:
A Logical View of Composition.
Theor. Comput. Sci. 114(1): 3-30 (1993) |
42 | | Martín Abadi,
Luca Cardelli,
Pierre-Louis Curien:
Formal Parametric Polymorphism.
Theor. Comput. Sci. 121(1&2): 9-58 (1993) |
1992 |
41 | | Georges Gonthier,
Martín Abadi,
Jean-Jacques Lévy:
Linear Logic Without Boxes
LICS 1992: 223-234 |
40 | | Georges Gonthier,
Martín Abadi,
Jean-Jacques Lévy:
The Geometry of Optimal Lambda Reduction.
POPL 1992: 15-26 |
39 | EE | Butler W. Lampson,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Authentication in Distributed Systems: Theory and Practice.
ACM Trans. Comput. Syst. 10(4): 265-310 (1992) |
1991 |
38 | EE | Martín Abadi,
Michael Burrows,
Butler W. Lampson,
Gordon D. Plotkin:
A Calculus for Access Control in Distributed Systems.
CRYPTO 1991: 1-23 |
37 | | Martín Abadi,
Mark R. Tuttle:
A Semantics for a Logic of Authentication (Extended Abstract).
PODC 1991: 201-216 |
36 | | Martín Abadi,
Gordon D. Plotkin:
A Logical View of Composition and Refinement.
POPL 1991: 323-332 |
35 | | Martín Abadi,
Leslie Lamport:
An Old-Fashioned Recipe for Real Time.
REX Workshop 1991: 1-27 |
34 | | Butler W. Lampson,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Authentication in Distributed Systems: Theory and Practice.
SOSP 1991: 165-182 |
33 | | Martín Abadi,
Michael Burrows,
C. Kaufman,
Butler W. Lampson:
Authentication and Delegation with Smart-cards.
TACS 1991: 326-345 |
32 | EE | Martín Abadi,
Luca Cardelli,
Benjamin C. Pierce,
Gordon D. Plotkin:
Dynamic Typing in a Statically Typed Language.
ACM Trans. Program. Lang. Syst. 13(2): 237-268 (1991) |
31 | | Martín Abadi,
Bowen Alpern,
Krzysztof R. Apt,
Nissim Francez,
Shmuel Katz,
Leslie Lamport,
Fred B. Schneider:
Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''.
Inf. Process. Lett. 40(3): 141-142 (1991) |
30 | | Martín Abadi,
Benjamin C. Pierce,
Gordon D. Plotkin:
Faithful Ideal Models for Recursive Polymorphic Types.
Int. J. Found. Comput. Sci. 2(1): 1-21 (1991) |
29 | | Martín Abadi,
Luca Cardelli,
Pierre-Louis Curien,
Jean-Jacques Lévy:
Explicit Substitutions.
J. Funct. Program. 1(4): 375-416 (1991) |
28 | | Martín Abadi,
Leslie Lamport:
The Existence of Refinement Mappings.
Theor. Comput. Sci. 82(2): 253-284 (1991) |
1990 |
27 | | Martín Abadi:
An Axiomatization of Lamport's Temporal Logic of Actions.
CONCUR 1990: 57-69 |
26 | | Martín Abadi,
Gordon D. Plotkin:
A Per Model of Polymorphism and Recursive Types
LICS 1990: 355-365 |
25 | | Martín Abadi,
Luca Cardelli,
Pierre-Louis Curien,
Jean-Jacques Lévy:
Explicit Substitutions.
POPL 1990: 31-46 |
24 | EE | Michael Burrows,
Martín Abadi,
Roger M. Needham:
A Logic of Authentication.
ACM Trans. Comput. Syst. 8(1): 18-36 (1990) |
23 | EE | Martín Abadi,
Zohar Manna:
Nonclausal Deduction in First-Order Temporal Logic
J. ACM 37(2): 279-317 (1990) |
22 | | Martín Abadi,
Joan Feigenbaum:
Secure Circuit Evaluation.
J. Cryptology 2(1): 1-12 (1990) |
21 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
Rejoinder to Nessett.
Operating Systems Review 24(2): 39-40 (1990) |
20 | | Martín Abadi:
Corrigendum: The Power of Temporal Proofs.
Theor. Comput. Sci. 70(2): 275 (1990) |
1989 |
19 | | Martín Abadi,
Joseph Y. Halpern:
Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract)
FOCS 1989: 148-153 |
18 | | Martín Abadi,
Leslie Lamport,
Pierre Wolper:
Realizable and Unrealizable Specifications of Reactive Systems.
ICALP 1989: 1-17 |
17 | | Martín Abadi,
Benjamin C. Pierce,
Gordon D. Plotkin:
Faithful Ideal Models for Recursive Polymorphic Types
LICS 1989: 216-225 |
16 | | Martín Abadi,
Luca Cardelli,
Benjamin C. Pierce,
Gordon D. Plotkin:
Dynamic Typing in a Statically-Typed Language.
POPL 1989: 213-227 |
15 | | Martín Abadi,
Leslie Lamport:
Composing Specifications.
REX Workshop 1989: 1-41 |
14 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
A Logic of Authentication.
SOSP 1989: 1-13 |
13 | | Martín Abadi,
Joan Feigenbaum,
Joe Kilian:
On Hiding Information from an Oracle.
J. Comput. Syst. Sci. 39(1): 21-50 (1989) |
12 | | Martín Abadi,
Zohar Manna:
Temporal Logic Programming.
J. Symb. Comput. 8(3): 277-295 (1989) |
11 | | Martín Abadi:
The Power of Temporal Proofs.
Theor. Comput. Sci. 65(1): 35-83 (1989) |
1988 |
10 | EE | Martín Abadi,
Eric Allender,
Andrei Z. Broder,
Joan Feigenbaum,
Lane A. Hemachandra:
On Generating Solved Instances of Computational Problems.
CRYPTO 1988: 297-310 |
9 | | Martín Abadi,
Leslie Lamport:
The Existence of Refinement Mappings
LICS 1988: 165-175 |
8 | | Martín Abadi,
Joan Feigenbaum:
A Simple Protocol for Secure Circuit Evaluation.
STACS 1988: 264-272 |
7 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
Authentication: A Practical Study in Belief and Action.
TARK 1988: 325-342 |
1987 |
6 | | Martín Abadi:
The Power of Temporal Proofs
LICS 1987: 123-130 |
5 | | Martín Abadi,
Zohar Manna:
Temporal Logic Programming.
SLP 1987: 4-16 |
4 | | Martín Abadi,
Joan Feigenbaum,
Joe Kilian:
On Hiding Information from an Oracle (Extended Abstract)
STOC 1987: 195-203 |
1986 |
3 | | Martín Abadi,
Zohar Manna:
Modal Theorem Proving.
CADE 1986: 172-189 |
2 | | Martín Abadi,
Zohar Manna:
A Timely Resolution
LICS 1986: 176-186 |
1985 |
1 | | Martín Abadi,
Zohar Manna:
Nonclausal Temporal Deduction.
Logic of Programs 1985: 1-15 |