-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi, Secrecy by typing in security protocols, Journal of the ACM 46(5) (1999), 749-786.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0000298407
-
A bisimulation method for cryptographic protocols
-
M. Abadi and A.D. Gordon. A bisimulation method for cryptographic protocols, Nordic Journal of Computing 5 (1998), 267-303.
-
(1998)
Nordic Journal of Computing
, vol.5
, pp. 267-303
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
A preliminary version appeared in: Proceedings of the 4th ACM Conference on Computer and Communications Security. 1997, pp. 36-47
-
M. Abadi and A.D. Gordon, A calculus for cryptographic protocols: The spi calculus, Information and Computation, 148(1) (1999), 1-70. A preliminary version appeared in: Proceedings of the 4th ACM Conference on Computer and Communications Security. 1997, pp. 36-47.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
17644411480
-
Mobile values, new names, and secure communication
-
M. Abadi and C. Fournet, Mobile values, new names, and secure communication, in: Proceedings of the 28th ACM S1GPLAN-SIGACT Symposium on Principles of Programming Languages, 2001, pp. 104-115.
-
(2001)
Proceedings of the 28th ACM S1GPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
5
-
-
18944405475
-
Operational properties of Lily, a polymorphic linear lambda calculus with recursion
-
Higher Order Operational Techniques in Semantics, Elsevier Science
-
G.M. Bierman, A.M. Pitts and C.V. Russo, Operational properties of Lily, a polymorphic linear lambda calculus with recursion, in: Higher Order Operational Techniques in Semantics, Volume 41 of Electronic Notes in Theoretical Computer Science, Elsevier Science, 2000.
-
(2000)
Electronic Notes in Theoretical Computer Science
, vol.41
-
-
Bierman, G.M.1
Pitts, A.M.2
Russo, C.V.3
-
6
-
-
0000650306
-
Relational interpretations of recursive types in an operational setting
-
L. Birkedal and R. Harper, Relational interpretations of recursive types in an operational setting, Information and Computation 155(1-2) (1999), 3-63.
-
(1999)
Information and Computation
, vol.155
, Issue.1-2
, pp. 3-63
-
-
Birkedal, L.1
Harper, R.2
-
7
-
-
0036308321
-
Proof techniques for cryptographic processes, 1999
-
An extended and revised version of the paper that appeared in
-
M. Boreale. R. De Nicola and R. Pugliese, Proof techniques for cryptographic processes, 1999. ftp://rap.dsi.unifi.it/pub/papers/spi.ps.gz. An extended and revised version of the paper that appeared in 14th Annual IEEE Symposium on Logic in Computer Science. 1999, pp. 157-166.
-
(1999)
14th Annual IEEE Symposium on Logic in Computer Science
, pp. 157-166
-
-
Boreale, M.1
De Nicola, R.2
Pugliese, R.3
-
10
-
-
0039926997
-
A compiler for analysing cryptographic protocols using noninterference
-
A. Durante, R. Focardi and R. Gorrieri, A compiler for analysing cryptographic protocols using noninterference, ACM Transactions on Software Engineering and Methodology 9(4) (2000), 488-528.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 488-528
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
15
-
-
84974577536
-
Information flow vs. resource access in the asynchronous pi-calculus
-
Proceedings of the 27th International Colloquium on Automata, Languages and Programming, Springer-Verlag
-
M. Hennessy and J. Riely, Information flow vs. resource access in the asynchronous pi-calculus, in: Proceedings of the 27th International Colloquium on Automata, Languages and Programming, Volume 1853 of Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 415-427.
-
(2000)
Lecture Notes in Computer Science
, vol.1853
, pp. 415-427
-
-
Hennessy, M.1
Riely, J.2
-
18
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
G. Lowe, An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters 56(3) (1995), 131-133.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
19
-
-
84955602379
-
Formal verification of cryptographic protocols: A survey
-
Advances in Cryptology Asiacrypt '94, Springer-Verlag
-
C. Meadows, Formal verification of cryptographic protocols: A survey, in: Advances in Cryptology Asiacrypt '94, Volume 917 of Lecture Notes in Computer Science. Springer-Verlag, 1995, pp. 133-150.
-
(1995)
Lecture Notes in Computer Science
, vol.917
, pp. 133-150
-
-
Meadows, C.1
-
20
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
IEEE Computer Society
-
C. Meadows, Open issues in formal methods for cryptographic protocol analysis, in: DARPA Information Survivability Conference and Exposition, IEEE Computer Society, 2000, pp. 237-250.
-
(2000)
DARPA Information Survivability Conference and Exposition
, pp. 237-250
-
-
Meadows, C.1
-
23
-
-
0015561577
-
Protection in programming languages
-
J.H. Morris Jr. Protection in programming languages, Communications of the ACM 16(1) (1973) 15-21.
-
(1973)
Communications of the ACM
, vol.16
, Issue.1
, pp. 15-21
-
-
Morris J.H., Jr.1
-
24
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978) 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
25
-
-
0027150603
-
Typing and subtyping for mobile processes
-
Eighth Annual IEEE Symposium on Logic in Computer Science, 1993, pp. 376-385. Full version in
-
B. Pierce and D. Sangiorgi, Typing and subtyping for mobile processes, in: Eighth Annual IEEE Symposium on Logic in Computer Science, 1993, pp. 376-385. Full version in Mathematical Structures in Computer Science 6(5) (1996) 409-453.
-
(1996)
Mathematical Structures in Computer Science
, vol.6
, Issue.5
, pp. 409-453
-
-
Pierce, B.1
Sangiorgi, D.2
-
27
-
-
84878538793
-
Existential types: Logical relations and operational equivalence
-
Proceedings of the 25th International Colloquium on Automata, Languages and Programming, Springer-Verlag
-
A.M. Pitts, Existential types: Logical relations and operational equivalence, in: Proceedings of the 25th International Colloquium on Automata, Languages and Programming, Volume 1443 of Lecture Notes in Computer Science, Springer-Verlag, 1998, pp. 309-326.
-
(1998)
Lecture Notes in Computer Science
, vol.1443
, pp. 309-326
-
-
Pitts, A.M.1
-
28
-
-
0001233777
-
Parametric polymorphism and operational equivalence
-
A preliminary version appeared in HOOTS II Second Workshop on Higher-Order Operational Techniques in Semantics, Electronic Notes in Theoretical Computer Science, Vol. 10,1998
-
A.M. Pitts, Parametric polymorphism and operational equivalence, Mathematical Structures in Computer Science 10 (2000) 321-359. A preliminary version appeared in HOOTS II Second Workshop on Higher-Order Operational Techniques in Semantics, Electronic Notes in Theoretical Computer Science, Vol. 10,1998.
-
(2000)
Mathematical Structures in Computer Science
, vol.10
, pp. 321-359
-
-
Pitts, A.M.1
-
29
-
-
0141435071
-
Process calculus based upon evaluation to committed form
-
A preliminary version appeared in: CONCUR 196; Concurrency Theory, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1119, 1996, pp. 18-33.
-
A.M. Pitts and J.R.X. Ross, Process calculus based upon evaluation to committed form, Theoretical Computer Science 195 (1998), 155-182. A preliminary version appeared in: CONCUR 196; Concurrency Theory, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1119, 1996, pp. 18-33.
-
(1998)
Theoretical Computer Science
, vol.195
, pp. 155-182
-
-
Pitts, A.M.1
Ross, J.R.X.2
-
30
-
-
0003685579
-
Operational reasoning for functions with local state
-
Cambridge University Press
-
A.M. Pitls and I. Stark, Operational reasoning for functions with local state, in: Higher Order Operational Techniques in Semantics, Cambridge University Press, 1998, pp. 227-273.
-
(1998)
Higher Order Operational Techniques in Semantics
, pp. 227-273
-
-
Pitls, A.M.1
Stark, I.2
-
31
-
-
84948737028
-
A simple view of type-secure information flow in the π-calculus
-
F. Pottier, A simple view of type-secure information flow in the π-calculus, in: 15th IEEE Computer Security Foundations Workshop, 2002, pp. 320-330.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 320-330
-
-
Pottier, F.1
-
33
-
-
0020919435
-
Types, abstraction and parametric polymorphism
-
J.C. Reynolds, Types, abstraction and parametric polymorphism, in: Information Processing 83, Proceedings of the IFIP 9th World Computer Congress, 1983, pp. 513-523.
-
(1983)
Information Processing 83, Proceedings of the IFIP 9th World Computer Congress
, pp. 513-523
-
-
Reynolds, J.C.1
-
36
-
-
0003768829
-
-
PhD thesis. University of Cambridge
-
I. Stark, Names and higher-order functions, PhD thesis. University of Cambridge, 1994. http://www.dcs.ed.ac.uk/home/stark/publications/thesis.htrnl.
-
(1994)
Names and Higher-Order Functions
-
-
Stark, I.1
|