-
1
-
-
84957668700
-
Secrecy by typing in security protocols
-
Theoretical Aspects of Computer Software Springer-Verlag
-
Martín Abadi. Secrecy by typing in security protocols. In Theoretical Aspects of Computer Software, volume 1281 of Lecture Notes in Computer Science, pages 611-638. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1281
, pp. 611-638
-
-
Abadi, M.1
-
3
-
-
84878558984
-
-
April
-
Martín Abadi, Protection in programming-language translations, In: Proceedings of the 25th International Colloquium on Automata, Languages and Programming, July 1998, pages 868-883. Also Digital Equipment Corporation Systems Research Center report No. 154, April 1998.
-
(1998)
Digital Equipment Corporation Systems Research Center Report No. 154
, vol.154
-
-
-
4
-
-
84937720349
-
Security protocols and specifications
-
Springer-Verlag, March
-
Martín Abadi, Security protocols and specifications, In: Foundations of Software Science and Computation Structures: Second International Conference, FOSSACS '99, Springer-Verlag, March 1999, pp. 1-13.
-
(1999)
Foundations of Software Science and Computation Structures: Second International Conference, FOSSACS '99
, pp. 1-13
-
-
Abadi, M.1
-
5
-
-
0032681509
-
A core calculus of dependency
-
January
-
Martín Abadi, Anindya Banerjee, Nevin Heintze, and Jon G. Riecke, A core calculus of dependency, In: Proceedings of the 26th ACM Symposium on Principles of Programming Languages, January 1999, pp. 147-160.
-
(1999)
Proceedings of the 26th ACM Symposium on Principles of Programming Languages
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
6
-
-
84982909952
-
Secure implementation of channel abstractions
-
June
-
Martín Abadi, Cédric Fournet, and Georges Gonthier, Secure implementation of channel abstractions, In: Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, June 1998, pp. 105-116.
-
(1998)
Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science
, pp. 105-116
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
7
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Martín Abadi and Andrew D. Gordon, A calculus for cryptographic protocols: The spi calculus, Information and Computation 148 (1999), An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998.
-
(1999)
Information and Computation
, vol.148
-
-
Abadi, M.1
Gordon, A.D.2
-
8
-
-
0003092378
-
-
An extended version appeared as January
-
Martín Abadi and Andrew D. Gordon, A calculus for cryptographic protocols: The spi calculus, Information and Computation 148 (1999), An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998.
-
(1998)
Digital Equipment Corporation Systems Research Center Report No. 149
-
-
-
9
-
-
84945976575
-
Control flow analysis for the π-calculus
-
CONCUR '98: Concurrency Theory
-
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, and Hanne Riis Nielson, Control flow analysis for the π-calculus, In: CONCUR '98: Concurrency Theory, Lecture Notes in Computer Science 1466 1998, pp. 84-98.
-
(1998)
Lecture Notes in Computer Science
, vol.1466
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Riis Nielson, H.4
-
14
-
-
84957588448
-
A semantic approach to secure information flow
-
Mathematics of Program Construction, 4th International Conference
-
K. Rustan M. Leino and Rajeev Joshi, A semantic approach to secure information flow, In: Mathematics of Program Construction, 4th International Conference, Lecture Notes in Computer Science 1422 (1998), pp. 254-271.
-
(1998)
Lecture Notes in Computer Science
, vol.1422
, pp. 254-271
-
-
Rustan, K.1
Leino, M.2
Joshi, R.3
-
18
-
-
44049113210
-
A calculus of mobile processes, parts I and II
-
pages 41-77
-
Milner Robin, Parrow Joachim, Walker David. A calculus of mobile processes, parts I and II. Information and Computation. 100:1992;1-40. pages 41-77
-
(1992)
Information and Computation
, vol.100
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
19
-
-
0000046942
-
A security flow control algorithm and its denotational semantics correctness proof
-
Mizuno Masaaki, Schmidt David. A security flow control algorithm and its denotational semantics correctness proof. Formal Aspects of Computing. 4:1992;727-754
-
(1992)
Formal Aspects of Computing
, vol.4
, pp. 727-754
-
-
Mizuno, M.1
Schmidt, D.2
-
20
-
-
0026188821
-
Notions of computation and monads
-
Moggi Eugenio. Notions of computation and monads. Information and Control. 93:1991;55-92
-
(1991)
Information and Control
, vol.93
, pp. 55-92
-
-
Moggi, E.1
-
27
-
-
17144396747
-
TIL: A type-directed optimizing compiler for ML
-
D. Tarditi, G. Morrisett, P. Cheng. C. Stone, R. Harper, and P. Lee, TIL: A type-directed optimizing compiler for ML, In: Proceedings of the ACM SIGPLAN '96 Conference on Programming Language Design and Implementation, 1996, pp. 181-192.
-
(1996)
Proceedings of the ACM SIGPLAN '96 Conference on Programming Language Design and Implementation
, pp. 181-192
-
-
Tarditi, D.1
Morrisett, G.2
Cheng, P.3
Stone, C.4
Harper, R.5
Lee, P.6
|