| 2009 |
| 186 | EE | Martín Abadi,
Andrew Birrell,
Tim Harris,
Johnson Hsieh,
Michael Isard:
Implementation and Use of Transactional Memory with Dynamic Separation.
CC 2009: 63-77 |
| 185 | EE | Wenchao Zhou,
Yun Mao,
Boon Thau Loo,
Martín Abadi:
Unified Declarative Platform for Secure Netwoked Information Systems.
ICDE 2009: 150-161 |
| 184 | EE | Martín Abadi,
Gordon D. Plotkin:
A model of cooperative threads.
POPL 2009: 29-40 |
| 183 | EE | Martín Abadi,
Tim Harris,
Mojtaba Mehrara:
Transactional memory with strong atomicity using off-the-shelf memory protection hardware.
PPOPP 2009: 185-196 |
| 2008 |
| 182 | EE | Martín Abadi:
The good, the bad, and the provable.
ACM Conference on Computer and Communications Security 2008: 1 |
| 181 | EE | Martín Abadi,
Tim Harris,
Katherine F. Moore:
A Model of Dynamic Separation for Transactional Memory.
CONCUR 2008: 6-20 |
| 180 | EE | Martín Abadi:
Automatic Mutual Exclusion and Atomicity Checks.
Concurrency, Graphs and Models 2008: 510-526 |
| 179 | EE | Martín Abadi:
Variations in Access Control Logic.
DEON 2008: 96-109 |
| 178 | EE | Sergio Maffeis,
Martín Abadi,
Cédric Fournet,
Andrew D. Gordon:
Code-Carrying Authorization.
ESORICS 2008: 563-579 |
| 177 | EE | Deepak Garg,
Martín Abadi:
A Modal Deconstruction of Access Control Logics.
FoSSaCS 2008: 216-230 |
| 176 | EE | Martín Abadi,
Andrew Birrell,
Tim Harris,
Michael Isard:
Semantics of transactional memory and automatic mutual exclusion.
POPL 2008: 63-74 |
| 175 | EE | Martín Abadi,
Bogdan Warinschi:
Security analysis of cryptographically controlled access to XML documents.
J. ACM 55(2): (2008) |
| 174 | EE | Bruno Blanchet,
Martín Abadi,
Cédric Fournet:
Automated verification of selected equivalences for security protocols.
J. Log. Algebr. Program. 75(1): 3-51 (2008) |
| 2007 |
| 173 | EE | Nathan Whitehead,
Jordan Johnson,
Martín Abadi:
Policies and Proofs for Code Auditing.
ATVA 2007: 1-14 |
| 172 | EE | Ted Wobber,
Aydan R. Yumerefendi,
Martín Abadi,
Andrew Birrell,
Daniel R. Simon:
Authorizing applications in singularity.
EuroSys 2007: 355-368 |
| 171 | EE | Martín Abadi:
Security Protocols: Principles and Calculi.
FOSAD 2007: 1-23 |
| 170 | EE | Martín Abadi,
Bruno Blanchet,
Cédric Fournet:
Just fast keying in the pi calculus.
ACM Trans. Inf. Syst. Secur. 10(3): (2007) |
| 169 | EE | Martín Abadi,
Jens Palsberg:
Editorial.
ACM Trans. Program. Lang. Syst. 29(3): (2007) |
| 168 | EE | Martín Abadi:
Access Control in a Core Calculus of Dependency.
Electr. Notes Theor. Comput. Sci. 172: 5-31 (2007) |
| 167 | EE | Martín Abadi,
Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
J. Cryptology 20(3): 395 (2007) |
| 2006 |
| 166 | EE | Martín Abadi,
Ricardo Corin,
Cédric Fournet:
Computational Secrecy by Typing for the Pi Calculus.
APLAS 2006: 253-269 |
| 165 | EE | Mihai Budiu,
Úlfar Erlingsson,
Martín Abadi:
Architectural support for software-based protection.
ASID 2006: 42-51 |
| 164 | EE | Avik Chaudhuri,
Martín Abadi:
Secrecy by Typing and File-Access Control.
CSFW 2006: 112-123 |
| 163 | EE | Avik Chaudhuri,
Martín Abadi:
Formal Analysis of Dynamic, Distributed File-System Access Controls.
FORTE 2006: 99-114 |
| 162 | EE | Martín Abadi,
Mathieu Baudet,
Bogdan Warinschi:
Guessing Attacks and the Computational Soundness of Static Equivalence.
FoSSaCS 2006: 398-412 |
| 161 | EE | Martín Abadi:
Access control in a core calculus of dependency.
ICFP 2006: 263-273 |
| 160 | EE | Úlfar Erlingsson,
Martín Abadi,
Michael Vrable,
Mihai Budiu,
George C. Necula:
XFI: Software Guards for System Address Spaces.
OSDI 2006: 75-88 |
| 159 | EE | Martín Abadi,
Cormac Flanagan,
Stephen N. Freund:
Types for safe locking: Static race detection for Java.
ACM Trans. Program. Lang. Syst. 28(2): 207-255 (2006) |
| 158 | EE | Martín Abadi,
Véronique Cortier:
Deciding knowledge in security protocols under equational theories.
Theor. Comput. Sci. 367(1-2): 2-32 (2006) |
| 2005 |
| 157 | | Jens Palsberg,
Martín Abadi:
Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005
ACM 2005 |
| 156 | | Martín Abadi,
Luca de Alfaro:
CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings
Springer 2005 |
| 155 | EE | Martín Abadi,
Mihai Budiu,
Úlfar Erlingsson,
Jay Ligatti:
Control-flow integrity.
ACM Conference on Computer and Communications Security 2005: 340-353 |
| 154 | EE | Martín Abadi,
Véronique Cortier:
Deciding Knowledge in Security Protocols under (Many More) Equational Theories.
CSFW 2005: 62-76 |
| 153 | EE | Avik Chaudhuri,
Martín Abadi:
Formal security analysis of basic network-attached storage.
FMSE 2005: 43-52 |
| 152 | EE | Martín Abadi,
Bogdan Warinschi:
Password-Based Encryption Analyzed.
ICALP 2005: 664-676 |
| 151 | EE | Martín Abadi,
Mihai Budiu,
Úlfar Erlingsson,
Jay Ligatti:
A Theory of Secure Control Flow.
ICFEM 2005: 111-124 |
| 150 | EE | Bruno Blanchet,
Martín Abadi,
Cédric Fournet:
Automated Verification of Selected Equivalences for Security Protocols.
LICS 2005: 331-340 |
| 149 | EE | Martín Abadi,
Bogdan Warinschi:
Security analysis of cryptographically controlled access to XML documents.
PODS 2005: 108-117 |
| 148 | EE | Martín Abadi,
Michael Burrows,
Mark S. Manasse,
Ted Wobber:
Moderately hard, memory-bound functions.
ACM Trans. Internet Techn. 5(2): 299-327 (2005) |
| 147 | EE | Martín Abadi,
Bruno Blanchet:
Analyzing security protocols with secrecy types and logic programs.
J. ACM 52(1): 102-146 (2005) |
| 146 | EE | Martín Abadi,
Greg Morrisett,
Andrei Sabelfeld:
"Language-Based Security".
J. Funct. Program. 15(2): 129 (2005) |
| 145 | EE | Martín Abadi,
Bruno Blanchet:
Computer-assisted verification of a protocol for certified email.
Sci. Comput. Program. 58(1-2): 3-27 (2005) |
| 2004 |
| 144 | EE | Nathan Whitehead,
Martín Abadi,
George C. Necula:
By Reason and Authority: A System for Authorization of Proof-Carrying Code.
CSFW 2004: 236-250 |
| 143 | EE | Martín Abadi,
Bruno Blanchet,
Cédric Fournet:
Just Fast Keying in the Pi Calculus.
ESOP 2004: 340-354 |
| 142 | EE | Martín Abadi,
Ted Wobber:
A Logical Account of NGSCB.
FORTE 2004: 1-12 |
| 141 | EE | Martín Abadi,
Georges Gonthier,
Benjamin Werner:
Choice in Dynamic Linking.
FoSSaCS 2004: 12-26 |
| 140 | EE | Martín Abadi,
Véronique Cortier:
Deciding Knowledge in Security Protocols Under Equational Theories.
ICALP 2004: 46-58 |
| 139 | EE | Nathan Whitehead,
Martín Abadi:
BCiC: A System for Code Authentication and Verification.
LPAR 2004: 110-124 |
| 138 | EE | Katia Hayati,
Martín Abadi:
Language-Based Enforcement of Privacy Policies.
Privacy Enhancing Technologies 2004: 302-313 |
| 137 | | Martín Abadi:
Trusted Computing, Trusted Third Parties, and Verified Communications.
SEC 2004: 291-308 |
| 136 | EE | Martín Abadi,
Cédric Fournet:
Private authentication.
Theor. Comput. Sci. 322(3): 427-476 (2004) |
| 2003 |
| 135 | EE | Martín Abadi,
Andrew Birrell,
Michael Burrows,
Frank Dabek,
Ted Wobber:
Bankable Postage for Network Services.
ASIAN 2003: 72-90 |
| 134 | EE | Martín Abadi:
Built-in Object Security.
ECOOP 2003: 1 |
| 133 | EE | Martín Abadi:
Logic in Access Control.
LICS 2003: 228- |
| 132 | EE | Martín Abadi,
Cédric Fournet:
Access Control Based on Execution History.
NDSS 2003 |
| 131 | EE | Martín Abadi,
Michael Burrows,
Ted Wobber:
Moderately Hard, Memory-Bound Functions.
NDSS 2003 |
| 130 | EE | Martín Abadi,
Bruno Blanchet:
Computer-Assisted Verification of a Protocol for Certified Email.
SAS 2003: 316-335 |
| 129 | EE | Martín Abadi,
K. Rustan M. Leino:
A Logic of Object-Oriented Programs.
Verification: Theory and Practice 2003: 11-41 |
| 128 | | Pankaj Kakkar,
Carl A. Gunter,
Martín Abadi:
Reasoning About Secrecy for Active Networks.
Journal of Computer Security 11(2): 245-287 (2003) |
| 127 | EE | Martín Abadi,
Bruno Blanchet:
Secrecy types for asymmetric communication.
Theor. Comput. Sci. 3(298): 387-415 (2003) |
| 2002 |
| 126 | EE | Cédric Fournet,
Martín Abadi:
Hiding Names: Private Authentication in the Applied Pi Calculus.
ISSS 2002: 317-338 |
| 125 | EE | Martín Abadi,
Bruno Blanchet:
Analyzing security protocols with secrecy types and logic programs.
POPL 2002: 33-44 |
| 124 | EE | Martín Abadi:
Private Authentication.
Privacy Enhancing Technologies 2002: 27-40 |
| 123 | EE | Martín Abadi,
Neal Glew:
Certified email with a light on-line trusted third party: design and implementation.
WWW 2002: 387-395 |
| 122 | EE | Martín Abadi,
Leonid Libkin,
Frank Pfenning:
Editorial.
ACM Trans. Comput. Log. 3(3): 335-335 (2002) |
| 121 | EE | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
Secure Implementation of Channel Abstractions.
Inf. Comput. 174(1): 37-83 (2002) |
| 120 | EE | Martín Abadi,
Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
J. Cryptology 15(2): 103-127 (2002) |
| 2001 |
| 119 | EE | Marcelo P. Fiore,
Martín Abadi:
Computing Symbolic Models for Verifying Cryptographic Protocols.
CSFW 2001: 160-173 |
| 118 | EE | Martín Abadi,
Bruno Blanchet:
Secrecy Types for Asymmetric Communication.
FoSSaCS 2001: 25-41 |
| 117 | EE | Martín Abadi:
Leslie Lamport's properties and actions.
PODC 2001: 15 |
| 116 | EE | Martín Abadi,
Cédric Fournet:
Mobile values, new names, and secure communication.
POPL 2001: 104-115 |
| 115 | EE | Martín Abadi,
Jan Jürjens:
Formal Eavesdropping and Its Computational Interpretation.
TACS 2001: 82-94 |
| 2000 |
| 114 | EE | Martín Abadi:
Taming the Adversary.
CRYPTO 2000: 353-358 |
| 113 | EE | Pankaj Kakkar,
Carl A. Gunter,
Martín Abadi:
Reasoning about Secrecy for Active Networks.
CSFW 2000: 118-129 |
| 112 | EE | Martín Abadi,
Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
IFIP TCS 2000: 3-22 |
| 111 | EE | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
Authentication Primitives and Their Compilation.
POPL 2000: 302-315 |
| 110 | | Martín Abadi:
top-top-closed relations and admissibility.
Mathematical Structures in Computer Science 10(3): 313-320 (2000) |
| 1999 |
| 109 | EE | Cormac Flanagan,
Martín Abadi:
Object Types against Races.
CONCUR 1999: 288-303 |
| 108 | EE | Cormac Flanagan,
Martín Abadi:
Types for Safe Locking.
ESOP 1999: 91-108 |
| 107 | EE | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
A Top-Down Look at a Secure Message.
FSTTCS 1999: 122-141 |
| 106 | | Martín Abadi:
Security Protocols and Specifications.
FoSSaCS 1999: 1-13 |
| 105 | EE | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
Secure Communications Processing for Distributed Languages.
IEEE Symposium on Security and Privacy 1999: 74-88 |
| 104 | EE | Martín Abadi,
Anindya Banerjee,
Nevin Heintze,
Jon G. Riecke:
A Core Calculus of Dependency.
POPL 1999: 147-160 |
| 103 | | Martín Abadi:
Protection in Programming-Language Translations.
Secure Internet Programming 1999: 19-34 |
| 102 | | Leendert van Doorn,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Secure Network Objects.
Secure Internet Programming 1999: 395-412 |
| 101 | EE | Raymie Stata,
Martín Abadi:
A Type System for Java Bytecode Subroutines.
ACM Trans. Program. Lang. Syst. 21(1): 90-137 (1999) |
| 100 | EE | Martín Abadi:
Secrecy in Programming-Language Semantics.
Electr. Notes Theor. Comput. Sci. 20: (1999) |
| 99 | | Martín Abadi,
Andrew D. Gordon:
A Calculus for Cryptographic Protocols: The spi Calculus.
Inf. Comput. 148(1): 1-70 (1999) |
| 1998 |
| 98 | EE | Martín Abadi:
Two Facets of Authentication.
CSFW 1998: 27-32 |
| 97 | EE | Roberto Gorrieri,
Paul F. Syverson,
Martín Abadi,
Riccardo Focardi,
Dieter Gollmann,
Gavin Lowe,
Catherine Meadows:
Panel Introduction: Varieties of Authentication.
CSFW 1998: 79-82 |
| 96 | EE | Martín Abadi:
Protection in Programming-Language Translations: Mobile Object Systems (Abstract).
ECOOP Workshops 1998: 291 |
| 95 | EE | Martín Abadi,
Andrew D. Gordon:
A Bisimulation Method for Cryptographic Protocols.
ESOP 1998: 12-26 |
| 94 | EE | Martín Abadi:
Protection in Programming-Language Translations.
ICALP 1998: 868-883 |
| 93 | | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
Secure Implementation of Channel Abstractions.
LICS 1998: 105-116 |
| 92 | EE | Raymie Stata,
Martín Abadi:
A Type System for Java Bytecode Subroutines.
POPL 1998: 149-160 |
| 91 | EE | Martín Abadi,
Andrew Birrell,
Raymie Stata,
Edward Wobber:
Secure Web Tunneling.
Computer Networks 30(1-7): 531-539 (1998) |
| 90 | | Martín Abadi:
On SDSI's Linked Local Name Spaces.
Journal of Computer Security 6(1-2): 3-22 (1998) |
| 89 | | Martín Abadi,
Andrew D. Gordon:
A Bisimulation Method for Cryptographic Protocols.
Nord. J. Comput. 5(4): 267- (1998) |
| 1997 |
| 88 | | Martín Abadi,
Takayasu Ito:
Theoretical Aspects of Computer Software, Third International Symposium, TACS '97, Sendai, Japan, September 23-26, 1997, Proceedings
Springer 1997 |
| 87 | EE | Martín Abadi,
Andrew D. Gordon:
A Calculus for Cryptographic Protocols: The Spi Calculus.
ACM Conference on Computer and Communications Security 1997: 36-47 |
| 86 | | Martín Abadi,
Andrew D. Gordon:
Reasoning about Cryptographic Protocols in the Spi Calculus.
CONCUR 1997: 59-73 |
| 85 | EE | Martín Abadi:
On SDSI's Linked Local Name Spaces.
CSFW 1997: 98-108 |
| 84 | | Martín Abadi:
Secrecy by Typing inSecurity Protocols.
TACS 1997: 611-638 |
| 83 | | Martín Abadi,
K. Rustan M. Leino:
A Logic of Object-Oriented Programs.
TAPSOFT 1997: 682-696 |
| 82 | EE | Martín Abadi,
Cédric Fournet,
Georges Gonthier:
Secure Implementation of Channel Abstractions.
Electr. Notes Theor. Comput. Sci. 10: (1997) |
| 81 | EE | Martín Abadi:
Explicit Communication Revisited: Two New Attacks on Authentication Protocols.
IEEE Trans. Software Eng. 23(3): 185-186 (1997) |
| 1996 |
| 80 | | Martín Abadi,
Butler W. Lampson,
Jean-Jacques Lévy:
Analysis and Caching of Dependencies.
ICFP 1996: 83-91 |
| 79 | EE | Leendert van Doorn,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Secure Network Objects.
IEEE Symposium on Security and Privacy 1996: 211-221 |
| 78 | | Martín Abadi,
Marcelo P. Fiore:
Syntactic Considerations on Recursive Types.
LICS 1996: 242-252 |
| 77 | | Martín Abadi,
Stephan Merz:
On TLA as a logic.
NATO ASI DPD 1996: 235-271 |
| 76 | EE | Martín Abadi,
Luca Cardelli,
Ramesh Viswanathan:
An Interpretation of Objects and Object Types.
POPL 1996: 396-409 |
| 75 | EE | Martín Abadi,
Luca Cardelli:
On Subtyping and Matching.
ACM Trans. Program. Lang. Syst. 18(4): 401-423 (1996) |
| 74 | EE | Martín Abadi,
Roger M. Needham:
Prudent Engineering Practice for Cryptographic Protocols.
IEEE Trans. Software Eng. 22(1): 6-15 (1996) |
| 73 | | Martín Abadi,
Luca Cardelli:
A Theory of Primitive Objects: Untyped and First-Order Systems.
Inf. Comput. 125(2): 78-102 (1996) |
| 1995 |
| 72 | EE | Martín Abadi,
Luca Cardelli:
On Subtyping and Matching.
ECOOP 1995: 145-167 |
| 71 | | Martín Abadi,
Stephan Merz:
An Abstract Account of Composition.
MFCS 1995: 499-508 |
| 70 | | Martín Abadi,
Luca Cardelli:
An Imperative Object Calculus.
TAPSOFT 1995: 471-485 |
| 69 | | Roberto Bellucci,
Martín Abadi,
Pierre-Louis Curien:
A Model for Formal Parametric Polymorphism: A PER Interpretation for System R.
TLCA 1995: 32-46 |
| 68 | EE | Martín Abadi,
Leslie Lamport:
Conjoining Specifications.
ACM Trans. Program. Lang. Syst. 17(3): 507-534 (1995) |
| 67 | | Martín Abadi,
Luca Cardelli,
Benjamin C. Pierce,
Didier Rémy:
Dynamic Typing in Polymorphic Languages.
J. Funct. Program. 5(1): 111-130 (1995) |
| 66 | | Martín Abadi,
Luca Cardelli:
A Theory of Primitive Objects: Second-Order Systems.
Sci. Comput. Program. 25(2-3): 81-116 (1995) |
| 65 | | John Lamping,
Martín Abadi:
Methods as Assertions.
TAPOS 1(1): 5-18 (1995) |
| 64 | | Martín Abadi,
Luca Cardelli:
An Imperative Object Calculus (Invited Paper).
TAPOS 1(3): 151-166 (1995) |
| 1994 |
| 63 | EE | John Lamping,
Martín Abadi:
Methods as Assertions.
ECOOP 1994: 60-80 |
| 62 | | Martín Abadi,
Luca Cardelli:
A Theory of Primitive Objects - Scond-Order Systems.
ESOP 1994: 1-25 |
| 61 | | Martín Abadi,
Leslie Lamport,
Stephan Merz:
A TLA Solution to the RPC-Memory Specification Problem.
Formal Systems Specification 1994: 21-66 |
| 60 | | Gordon D. Plotkin,
Martín Abadi,
Luca Cardelli:
Subtyping and Parametricity
LICS 1994: 310-319 |
| 59 | | Martín Abadi,
Luca Cardelli:
A Semantics of Object Types
LICS 1994: 332-341 |
| 58 | | Martín Abadi,
Leslie Lamport:
Open Systems in TLA.
PODC 1994: 81-90 |
| 57 | | Martín Abadi,
Leslie Lamport:
Decomposing Specifications of Concurrent Systems.
PROCOMET 1994: 327-340 |
| 56 | | Martín Abadi,
Luca Cardelli:
A Theory of Primitive Objects - Untyped and First-Order Systems.
TACS 1994: 296-320 |
| 55 | EE | Edward Wobber,
Martín Abadi,
Michael Burrows:
Authentication in the Taos Operating System.
ACM Trans. Comput. Syst. 12(1): 3-32 (1994) |
| 54 | EE | Martín Abadi,
Leslie Lamport:
An Old-Fashined Recipe for Real-Time.
ACM Trans. Program. Lang. Syst. 16(5): 1543-1571 (1994) |
| 53 | | Martín Abadi:
A Semantics for Static Type Inference in a Nondeterministic Language
Inf. Comput. 109(1/2): 300-306 (1994) |
| 52 | | Martín Abadi,
Joseph Y. Halpern:
Decidability and Expressiveness for First-Order Logics of Probability
Inf. Comput. 112(1): 1-36 (1994) |
| 51 | | Martín Abadi:
Baby Modula-3 and a Theory of Objects.
J. Funct. Program. 4(2): 249-283 (1994) |
| 1993 |
| 50 | EE | Luca Cardelli,
Florian Matthes,
Martín Abadi:
Extensible Grammars for Language Specialization.
DBPL 1993: 11-31 |
| 49 | | Martín Abadi,
Luca Cardelli,
Pierre-Louis Curien:
Formal Parametric Polymorphism.
POPL 1993: 157-170 |
| 48 | | Edward Wobber,
Martín Abadi,
Michael Burrows,
Butler W. Lampson:
Authentication in the Taos Operating System.
SOSP 1993: 256-269 |
| 47 | | Gordon D. Plotkin,
Martín Abadi:
A Logic for Parametric Polymorphism.
TLCA 1993: 361-375 |
| 46 | EE | Martín Abadi,
Leslie Lamport:
Composing Specifications.
ACM Trans. Program. Lang. Syst. 15(1): 73-132 (1993) |
| 45 | EE | Martín Abadi,
Michael Burrows,
Butler W. Lampson,
Gordon D. Plotkin:
A Calculus for Access Control in Distributed Systems.
ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993) |
| 44 | | Martín Abadi,
Michael Burrows,
C. Kaufman,
Butler W. Lampson:
Authentification and Delegation with Smart-Cards.
Sci. Comput. Program. 21(2): 93-113 (1993) |
| 43 | | Martín Abadi,
Gordon D. Plotkin:
A Logical View of Composition.
Theor. Comput. Sci. 114(1): 3-30 (1993) |
| 42 | | Martín Abadi,
Luca Cardelli,
Pierre-Louis Curien:
Formal Parametric Polymorphism.
Theor. Comput. Sci. 121(1&2): 9-58 (1993) |
| 1992 |
| 41 | | Georges Gonthier,
Martín Abadi,
Jean-Jacques Lévy:
Linear Logic Without Boxes
LICS 1992: 223-234 |
| 40 | | Georges Gonthier,
Martín Abadi,
Jean-Jacques Lévy:
The Geometry of Optimal Lambda Reduction.
POPL 1992: 15-26 |
| 39 | EE | Butler W. Lampson,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Authentication in Distributed Systems: Theory and Practice.
ACM Trans. Comput. Syst. 10(4): 265-310 (1992) |
| 1991 |
| 38 | EE | Martín Abadi,
Michael Burrows,
Butler W. Lampson,
Gordon D. Plotkin:
A Calculus for Access Control in Distributed Systems.
CRYPTO 1991: 1-23 |
| 37 | | Martín Abadi,
Mark R. Tuttle:
A Semantics for a Logic of Authentication (Extended Abstract).
PODC 1991: 201-216 |
| 36 | | Martín Abadi,
Gordon D. Plotkin:
A Logical View of Composition and Refinement.
POPL 1991: 323-332 |
| 35 | | Martín Abadi,
Leslie Lamport:
An Old-Fashioned Recipe for Real Time.
REX Workshop 1991: 1-27 |
| 34 | | Butler W. Lampson,
Martín Abadi,
Michael Burrows,
Edward Wobber:
Authentication in Distributed Systems: Theory and Practice.
SOSP 1991: 165-182 |
| 33 | | Martín Abadi,
Michael Burrows,
C. Kaufman,
Butler W. Lampson:
Authentication and Delegation with Smart-cards.
TACS 1991: 326-345 |
| 32 | EE | Martín Abadi,
Luca Cardelli,
Benjamin C. Pierce,
Gordon D. Plotkin:
Dynamic Typing in a Statically Typed Language.
ACM Trans. Program. Lang. Syst. 13(2): 237-268 (1991) |
| 31 | | Martín Abadi,
Bowen Alpern,
Krzysztof R. Apt,
Nissim Francez,
Shmuel Katz,
Leslie Lamport,
Fred B. Schneider:
Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''.
Inf. Process. Lett. 40(3): 141-142 (1991) |
| 30 | | Martín Abadi,
Benjamin C. Pierce,
Gordon D. Plotkin:
Faithful Ideal Models for Recursive Polymorphic Types.
Int. J. Found. Comput. Sci. 2(1): 1-21 (1991) |
| 29 | | Martín Abadi,
Luca Cardelli,
Pierre-Louis Curien,
Jean-Jacques Lévy:
Explicit Substitutions.
J. Funct. Program. 1(4): 375-416 (1991) |
| 28 | | Martín Abadi,
Leslie Lamport:
The Existence of Refinement Mappings.
Theor. Comput. Sci. 82(2): 253-284 (1991) |
| 1990 |
| 27 | | Martín Abadi:
An Axiomatization of Lamport's Temporal Logic of Actions.
CONCUR 1990: 57-69 |
| 26 | | Martín Abadi,
Gordon D. Plotkin:
A Per Model of Polymorphism and Recursive Types
LICS 1990: 355-365 |
| 25 | | Martín Abadi,
Luca Cardelli,
Pierre-Louis Curien,
Jean-Jacques Lévy:
Explicit Substitutions.
POPL 1990: 31-46 |
| 24 | EE | Michael Burrows,
Martín Abadi,
Roger M. Needham:
A Logic of Authentication.
ACM Trans. Comput. Syst. 8(1): 18-36 (1990) |
| 23 | EE | Martín Abadi,
Zohar Manna:
Nonclausal Deduction in First-Order Temporal Logic
J. ACM 37(2): 279-317 (1990) |
| 22 | | Martín Abadi,
Joan Feigenbaum:
Secure Circuit Evaluation.
J. Cryptology 2(1): 1-12 (1990) |
| 21 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
Rejoinder to Nessett.
Operating Systems Review 24(2): 39-40 (1990) |
| 20 | | Martín Abadi:
Corrigendum: The Power of Temporal Proofs.
Theor. Comput. Sci. 70(2): 275 (1990) |
| 1989 |
| 19 | | Martín Abadi,
Joseph Y. Halpern:
Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract)
FOCS 1989: 148-153 |
| 18 | | Martín Abadi,
Leslie Lamport,
Pierre Wolper:
Realizable and Unrealizable Specifications of Reactive Systems.
ICALP 1989: 1-17 |
| 17 | | Martín Abadi,
Benjamin C. Pierce,
Gordon D. Plotkin:
Faithful Ideal Models for Recursive Polymorphic Types
LICS 1989: 216-225 |
| 16 | | Martín Abadi,
Luca Cardelli,
Benjamin C. Pierce,
Gordon D. Plotkin:
Dynamic Typing in a Statically-Typed Language.
POPL 1989: 213-227 |
| 15 | | Martín Abadi,
Leslie Lamport:
Composing Specifications.
REX Workshop 1989: 1-41 |
| 14 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
A Logic of Authentication.
SOSP 1989: 1-13 |
| 13 | | Martín Abadi,
Joan Feigenbaum,
Joe Kilian:
On Hiding Information from an Oracle.
J. Comput. Syst. Sci. 39(1): 21-50 (1989) |
| 12 | | Martín Abadi,
Zohar Manna:
Temporal Logic Programming.
J. Symb. Comput. 8(3): 277-295 (1989) |
| 11 | | Martín Abadi:
The Power of Temporal Proofs.
Theor. Comput. Sci. 65(1): 35-83 (1989) |
| 1988 |
| 10 | EE | Martín Abadi,
Eric Allender,
Andrei Z. Broder,
Joan Feigenbaum,
Lane A. Hemachandra:
On Generating Solved Instances of Computational Problems.
CRYPTO 1988: 297-310 |
| 9 | | Martín Abadi,
Leslie Lamport:
The Existence of Refinement Mappings
LICS 1988: 165-175 |
| 8 | | Martín Abadi,
Joan Feigenbaum:
A Simple Protocol for Secure Circuit Evaluation.
STACS 1988: 264-272 |
| 7 | | Michael Burrows,
Martín Abadi,
Roger M. Needham:
Authentication: A Practical Study in Belief and Action.
TARK 1988: 325-342 |
| 1987 |
| 6 | | Martín Abadi:
The Power of Temporal Proofs
LICS 1987: 123-130 |
| 5 | | Martín Abadi,
Zohar Manna:
Temporal Logic Programming.
SLP 1987: 4-16 |
| 4 | | Martín Abadi,
Joan Feigenbaum,
Joe Kilian:
On Hiding Information from an Oracle (Extended Abstract)
STOC 1987: 195-203 |
| 1986 |
| 3 | | Martín Abadi,
Zohar Manna:
Modal Theorem Proving.
CADE 1986: 172-189 |
| 2 | | Martín Abadi,
Zohar Manna:
A Timely Resolution
LICS 1986: 176-186 |
| 1985 |
| 1 | | Martín Abadi,
Zohar Manna:
Nonclausal Temporal Deduction.
Logic of Programs 1985: 1-15 |