-
1
-
-
0003761061
-
A calculus for cryptographic protocols: The spi calculus
-
Technical Report 414, University of Cambridge Computer Laboratory, January 1997. Extended version of both [2] and [3]. A revised version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998, and an abridged version will appear
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Technical Report 414, University of Cambridge Computer Laboratory, January 1997. Extended version of both [2] and [3]. A revised version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998, and an abridged version will appear in Information and Computation.
-
Information and Computation
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
0029703268
-
The reflexive chemical abstract machine and the join-calculus
-
ACM
-
Fournet Cédric, Gonthier Georges. The reflexive chemical abstract machine and the join-calculus. In Proceedings of POPL '96. January 1996;372-385 ACM
-
(1996)
In Proceedings of POPL '96
, pp. 372-385
-
-
Fournet, C.1
Gonthier, G.2
-
5
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson Butler, Abadi Martín, Burrows Michael, Wobber Edward. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems. 10:(4):November1992;265-310
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
6
-
-
0028468205
-
Generic interface to security services
-
Linn John. Generic interface to security services. Computer Communications. 17:(7):July 1994;476-482
-
(1994)
Computer Communications
, vol.17
, Issue.7
, pp. 476-482
-
-
Linn, J.1
-
8
-
-
0012735033
-
A socket-based key management API (and surrounding infrastructure)
-
Daniel L. McDonald, Bao G. Phan, and Randall J. Atkinson. A socket-based key management API (and surrounding infrastructure). In Proceedings of INET96, 1996. On the Web at http://www.isoc.org/isoc/whatis/conferences/inet/96/.
-
(1996)
Proceedings of INET96
-
-
McDonald, D.L.1
Phan, B.G.2
Atkinson, R.J.3
-
9
-
-
19144370621
-
-
Microsoft. CryptoAPI. Web pages at http://www.microsoft.com/security/ tech/.
-
CryptoAPI
-
-
-
11
-
-
44049113210
-
A calculus of mobile processes, parts I and II
-
41-77
-
Milner Robin, Parrow Joachim, Walker David. A calculus of mobile processes, parts I and II. Information and Computation. 100:September 1992;1-40. 41-77
-
(1992)
Information and Computation
, vol.100
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
12
-
-
0029697576
-
Secure network objects
-
May
-
Leendert van Doorn, Martín Abadi, Mike Burrows, and Edward Wobber. Secure network objects. In Proceedings 1996 IEEE Symposium on Security and Privacy, pages 211 - 221, May 1996.
-
(1996)
Proceedings 1996 IEEE Symposium on Security and Privacy
, pp. 211-221
-
-
Van Doorn, L.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
13
-
-
0001259536
-
A distributed object model for the Java system
-
Fall
-
Wollrath Ann, Riggs Roger, Waldo Jim. A distributed object model for the Java system. Computing Systems. 9:(4):1996;265-290. Fall
-
(1996)
Computing Systems
, vol.9
, Issue.4
, pp. 265-290
-
-
Wollrath, A.1
Riggs, R.2
Waldo, J.3
|