-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi M., Gordon A.D. A calculus for cryptographic protocols. the spi calculus Inform., Comput. 148:1999;1-70.
-
(1999)
Inform., Comput.
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
0001439401
-
Lambda calculi with types
-
S. Abramsky, D.M. Gabbay, MaibaumT.S.E. Oxford: Oxford University Press
-
Barendregt H. Lambda calculi with types. Abramsky S., Gabbay D.M., Maibaum T.S.E. Handbook of Logic in Computer Science. Vol. II:1992;Oxford University Press, Oxford.
-
(1992)
Handbook of Logic in Computer Science
, vol.2
-
-
Barendregt, H.1
-
3
-
-
0027113388
-
The chemical abstract machine
-
Berry G., Boudol G. The chemical abstract machine. Theoret. Comput. Sci. 96(1):1992;217-248.
-
(1992)
Theoret. Comput. Sci.
, vol.96
, Issue.1
, pp. 217-248
-
-
Berry, G.1
Boudol, G.2
-
4
-
-
0036041250
-
Types as models: Model checking message-passing programs
-
S. Chaki, S.R. Rajamani, J. Rehof, Types as models: model checking message-passing programs, in: 29th ACM Symp. on Principles of Programming Languages (POPL'02), 2002, pp. 45-57.
-
(2002)
29th ACM Symp. on Principles of Programming Languages (POPL'02)
, pp. 45-57
-
-
Chaki, S.1
Rajamani, S.R.2
Rehof, J.3
-
6
-
-
0032670229
-
Typed memory management in a calculus of capabilities
-
A. Aiken (Ed.)
-
K. Crary, D. Walker, G. Morrisett, Typed memory management in a calculus of capabilities, in: A. Aiken (Ed.), 26th ACM Symp. on Principles of Programming Languages (POPL'99), 1999, pp. 262-275.
-
(1999)
26th ACM Symp. on Principles of Programming Languages (POPL'99)
, pp. 262-275
-
-
Crary, K.1
Walker, D.2
Morrisett, G.3
-
7
-
-
84930486749
-
Region analysis and a π-calculus with groups
-
Dal Zilio S., Gordon A.D. Region analysis and a. π-calculus with groups J. Funct. Programm. 12:2002;229-292.
-
(2002)
J. Funct. Programm.
, vol.12
, pp. 229-292
-
-
Dal Zilio, S.1
Gordon, A.D.2
-
8
-
-
84888243417
-
Object types against races
-
J.C.M. Baeten, & S. Mauw., CONCUR'99: Concurrency Theory, Berlin: Springer
-
Flanagan C., Abadi M. Object types against races. Baeten J.C.M., Mauw S. CONCUR'99: Concurrency Theory. Lectures Notes in Computer Science. Vol. 1664:1999;288-303 Springer, Berlin.
-
(1999)
Lectures Notes in Computer Science
, vol.1664
, pp. 288-303
-
-
Flanagan, C.1
Abadi, M.2
-
9
-
-
0034835462
-
Authenticity by typing for security protocols
-
IEEE Computer Society Press, Silver Spring, MD An extended version appears as Microsoft Research Technical Report MSR-TR-2001-49, May 2001
-
A.D. Gordon, A. Jeffrey, Authenticity by typing for security protocols, in: 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Silver Spring, MD, 2001, pp. 145-159. An extended version appears as Microsoft Research Technical Report MSR-TR-2001-49, May 2001.
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 145-159
-
-
Gordon, A.D.1
Jeffrey, A.2
-
10
-
-
0141658120
-
Typing correspondence assertions for communication protocols
-
Mathematical Foundations of Programming Semantics 17, Elsevier, Amsterdam, Preliminary Proceedings, BRICS Notes Series NS-01-2, BRICS, University of Aarhus, May 2001. An extended version appears as Microsoft Research Technical Report MSR-TR-2001-48, May 2001
-
A.D. Gordon, A. Jeffrey, Typing correspondence assertions for communication protocols, in: Mathematical Foundations of Programming Semantics 17, Electronic Notes in Theoretical Computer Science, Vol. 45, Elsevier, Amsterdam, 2001, pp. 99-120, Preliminary Proceedings, BRICS Notes Series NS-01-2, BRICS, University of Aarhus, May 2001. An extended version appears as Microsoft Research Technical Report MSR-TR-2001-48, May 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.45
, pp. 99-120
-
-
Gordon, A.D.1
Jeffrey, A.2
-
11
-
-
84948759702
-
Types and effects for asymmetric cryptographic protocols
-
IEEE Computer Society Press, Silver Spring, MD, to appear
-
A.D. Gordon, A. Jeffrey, Types and effects for asymmetric cryptographic protocols, in: 15th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Silver Spring, MD, 2002, to appear.
-
(2002)
15th IEEE Computer Security Foundations Workshop
-
-
Gordon, A.D.1
Jeffrey, A.2
-
13
-
-
0003730974
-
Resource access control in systems of mobile agents
-
Third Internat. Workshop on High-Level Concurrent Languages (HLCL'98), Elsevier, Amsterdam
-
M. Hennessy, J. Riely, Resource access control in systems of mobile agents, in: Third Internat. Workshop on High-Level Concurrent Languages (HLCL'98), Electronic Notes in Theoretical Computer Science, Vol. 16(3), Elsevier, Amsterdam, 1998.
-
(1998)
Electronic Notes in Theoretical Computer Science
, vol.16
, Issue.3
-
-
Hennessy, M.1
Riely, J.2
-
14
-
-
84947741770
-
Language primitives and type discipline for structured communication-based programming
-
European Symp. on Programming (ESOP'98), Berlin: Springer
-
Honda K., Vasconcelos V., Kubo M. Language primitives and type discipline for structured communication-based programming. European Symp. on Programming (ESOP'98). Lectures Notes in Computer Science. Vol. 1381:1998;122-128 Springer, Berlin.
-
(1998)
Lectures Notes in Computer Science
, vol.1381
, pp. 122-128
-
-
Honda, K.1
Vasconcelos, V.2
Kubo, M.3
-
15
-
-
84947269249
-
Secure information flow as typed process behaviour
-
European Symp. on Programming (ESOP'00), Berlin: Springer
-
Honda K., Vasconcelos V., Yoshida N. Secure information flow as typed process behaviour. European Symp. on Programming (ESOP'00). Lectures Notes in Computer Science. Vol. 1782:2000;180-199 Springer, Berlin.
-
(2000)
Lectures Notes in Computer Science
, vol.1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
17
-
-
0032010343
-
A partially deadlock-free typed process calculus
-
Kobayashi N. A partially deadlock-free typed process calculus. ACM Trans. Programm. Languages Syst. 20:1998;436-482.
-
(1998)
ACM Trans. Programm. Languages Syst.
, vol.20
, pp. 436-482
-
-
Kobayashi, N.1
-
18
-
-
0030708255
-
A hierarchy of authentication specifications
-
Silver Spring, MD: IEEE Computer Society Press
-
Lowe G. A hierarchy of authentication specifications. 10th Computer Security Foundations Workshop. 1995;31-43 IEEE Computer Society Press, Silver Spring, MD.
-
(1995)
10th Computer Security Foundations Workshop
, pp. 31-43
-
-
Lowe, G.1
-
19
-
-
0003466942
-
-
Ph.D. Thesis, MIT Press, Cambridge, MA; Available as Technical Report MIT/LCS/TR-408, MIT Laboratory for Computer Science
-
J.M. Lucassen, Types and effects, towards the integration of functional and imperative programming. Ph.D. Thesis, MIT Press, Cambridge, MA, 1987; Available as Technical Report MIT/LCS/TR-408, MIT Laboratory for Computer Science.
-
(1987)
Types and Effects, Towards the Integration of Functional and Imperative Programming
-
-
Lucassen, J.M.1
-
20
-
-
0003515838
-
Model checking for security protocols
-
Preliminary version appears as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May 1997
-
W. Marrero, E.M. Clarke, S. Jha, Model checking for security protocols, in: DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997. Preliminary version appears as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May 1997.
-
(1997)
DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Marrero, W.1
Clarke, E.M.2
Jha, S.3
-
23
-
-
4243056358
-
From CML to process algebras
-
CONCUR 93 - Concurrency Theory, Berlin: Springer
-
Nielson F., Riis Nielson H. From CML to process algebras. CONCUR 93 - Concurrency Theory. Lecture Notes in Computer Science. Vol. 715:1993;493-508 Springer, Berlin.
-
(1993)
Lecture Notes in Computer Science
, vol.715
, pp. 493-508
-
-
Nielson, F.1
Riis Nielson, H.2
-
25
-
-
0001518312
-
Typing and subtyping for mobile processes
-
Pierce B., Sangiorgi D. Typing and subtyping for mobile processes. Math. Struct. Comput. Sci. 6(5):1996;409-454.
-
(1996)
Math. Struct. Comput. Sci.
, vol.6
, Issue.5
, pp. 409-454
-
-
Pierce, B.1
Sangiorgi, D.2
-
27
-
-
85010894472
-
An interaction-based language and its typing system
-
Sixth European Conf. on Parallel Languages and Architecture (PARLE'94), Berlin: Springer
-
Takeuchi K., Honda K., Kubo M. An interaction-based language and its typing system. Sixth European Conf. on Parallel Languages and Architecture (PARLE'94). Lecture Notes in Computer Science. Vol. 817:1994;398-413 Springer, Berlin.
-
(1994)
Lecture Notes in Computer Science
, vol.817
, pp. 398-413
-
-
Takeuchi, K.1
Honda, K.2
Kubo, M.3
-
29
-
-
0002997049
-
Region-based memory management
-
Tofte M., Talpin J.-P. Region-based memory management. Inform. Comput. 132(2):1997;109-176.
-
(1997)
Inform. Comput.
, vol.132
, Issue.2
, pp. 109-176
-
-
Tofte, M.1
Talpin, J.-P.2
|