-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
September, 289, 323
-
[Aba99] M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749–786, September 1999. 289, 323
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
273
-
[ABLP93] M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706–734, 1993. 273
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
0035035153
-
-
28th ACM Symposium on Principles of Programming Languages (POPL’01), 288, 289
-
[AF01] M. Abadi and C. Fournet. Mobile values, new names, and secure communication. In 28th ACM Symposium on Principles of Programming Languages (POPL’01), pages 104–115, 2001. 288, 289
-
(2001)
Mobile Values, New Names, and Secure Communication
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
5
-
-
0000298407
-
A bisimulation method for cryptographic protocols
-
289
-
[AG98] M. Abadi and A. D. Gordon. A bisimulation method for cryptographic protocols. Nordic Journal of Computing, 5:267–303, 1998. 289
-
(1998)
Nordic Journal of Computing
, vol.5
, pp. 267-303
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
An extended version with full proofs appears as Digital Equipment Corporation Systems Research Center report No. 149, January 1998. 264, 266
-
[AG99] M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1–70, 1999. An extended version with full proofs appears as Digital Equipment Corporation Systems Research Center report No. 149, January 1998. 264, 266
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
7
-
-
0037505265
-
-
COORDINATION 97, Lecture Notes in Computer Science. Springer, 293, 323
-
[Ama97] R. M. Amadio. An asynchronous model of locality, failure, and process mobility. In COORDINATION 97, volume 1282 of Lecture Notes in Computer Science. Springer, 1997. 293, 323
-
(1997)
An Asynchronous Model of Locality, Failure, and Process Mobility
-
-
Amadio, R.M.1
-
8
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
281
-
[AN96] M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6– 15,January 1996. 281
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
10
-
-
84958762859
-
The game of the name in cryptographic tables
-
Lectures Notes in Computer Science, Springer, 289
-
[AP99] R. Amadio and S. Prasad. The game of the name in cryptographic tables. In Advances in Computing Science (ASIAN’99), volume 1742 of Lectures Notes in Computer Science, pages 5–26. Springer, 1999. 289
-
(1742)
Advances in Computing Science (ASIAN’99)
, pp. 5-26
-
-
Amadio, R.1
Prasad, S.2
-
11
-
-
84879078812
-
Reconciling two views of cryptography
-
Lectures Notes in Computer Science, Springer, 273
-
[AR00] M. Abadi and P. Rogaway. Reconciling two views of cryptography. In Theoretical Computer Science (IFIP TCS 2000), volume 1872 of Lectures Notes in Computer Science, pages 3–33. Springer, 2000. 273
-
(1872)
Theoretical Computer Science (IFIP TCS 2000)
, pp. 3-33
-
-
Abadi, M.1
Rogaway, P.2
-
12
-
-
0000523051
-
A logic of authentication
-
270, 272, 273, 274
-
[BAN89] M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233–271, 1989. 270, 272, 273, 274
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
15
-
-
84945976575
-
Control flow analysis for the π-calculus
-
Lecture Notes in Computer Science, Springer, 323
-
[BDNN98] C. Bodei, P. Degano, F. Nielson, and H. Nielson. Control flow analysis for the π-calculus. In CONCUR’98: Concurrency Theory, volume 1466 of Lecture Notes in Computer Science, pages 84–98. Springer, 1998. 323
-
(1998)
CONCUR’98: Concurrency Theory
, vol.1466
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.4
-
16
-
-
0000036723
-
Testing equivalence for mobile processes
-
August, 272, 286
-
[BN95] M. Boreale and R. De Nicola. Testing equivalence for mobile processes. Information and Computation, 120(2):279–303, August 1995. 272, 286
-
(1995)
Information and Computation
, vol.120
, Issue.2
, pp. 279-303
-
-
Boreale, M.1
de Nicola, R.2
-
18
-
-
0004135552
-
-
Addison-Wesley, 263
-
[Box98] D. Box. Essential COM. Addison-Wesley, 1998. 263
-
(1998)
Essential COM
-
-
Box, D.1
-
20
-
-
0035733596
-
The JavaSeal mobile agent kernel
-
To appear. A preliminary version appears in the proceedings of the 3rd International Symposium on Mobile Agents (MA/ASA’99), 1999. 266
-
[BV01] C. Bryce and J. Vitek. The JavaSeal mobile agent kernel. Agent Systems Journal, 2001. To appear. A preliminary version appears in the proceedings of the 3rd International Symposium on Mobile Agents (MA/ASA’99), 1999. 266
-
(2001)
Agent Systems Journal
-
-
Bryce, C.1
Vitek, J.2
-
21
-
-
0029631979
-
A language with distributed scope
-
265, 292
-
[Car95] L. Cardelli. A language with distributed scope. Computing Systems, 8(1):27–59, January 1995. 265, 292
-
(1995)
Computing Systems
, vol.8
, Issue.1
, pp. 27-59
-
-
Cardelli, L.1
-
22
-
-
0003757373
-
-
SRC Technical Note 1997– 013, Digital Equipment Corporation Systems Research Center, 325
-
[Car97] L. Cardelli. Mobile ambient synchronization. SRC Technical Note 1997– 013, Digital Equipment Corporation Systems Research Center, July 1997. 325
-
(1997)
Mobile Ambient Synchronization
-
-
Cardelli, L.1
-
23
-
-
84982993891
-
Abstractions for mobile computation
-
C. Jensen and J. Vitek, Lecture Notes in Computer Science, Springer, 265, 324
-
[Car99] L. Cardelli. Abstractions for mobile computation. In C. Jensen and J. Vitek, editors, Secure Internet Programming: Issues in Distributed and Mobile Object Systems, volume 1603 of Lecture Notes in Computer Science, pages 51–94. Springer, 1999. 265, 324
-
(1999)
Secure Internet Programming: Issues in Distributed and Mobile Object Systems
, vol.1603
, pp. 51-94
-
-
Cardelli, L.1
-
24
-
-
84945269845
-
The complexity of model checking mobile ambients
-
Lecture Notes in Computer Science. Springer, To appear. 324
-
+ 01] W. Charatonik, S. Dal Zilio, A. D. Gordon, S. Mukhopadhyay, and J.-M. Talbot. The complexity of model checking mobile ambients. In Foundations of Software Science and Computation Structures (FoS-SaCS’01), Lecture Notes in Computer Science. Springer, 2001. To appear. 324
-
(2001)
Foundations of Software Science and Computation Structures (FoS-SaCS’01)
-
-
Charatonik, W.1
Dal Zilio, S.2
Gordon, A.D.3
Mukhopadhyay, S.4
Talbot, J.-M.5
-
26
-
-
0032670228
-
-
26th ACM Symposium on Principles of Programming Languages (POPL’99), 266, 298, 317, 324
-
[CG99] L. Cardelli and A. D. Gordon. Types for mobile ambients. In 26th ACM Symposium on Principles of Programming Languages (POPL’99), pages 79–92, January 1999. 266, 298, 317, 324
-
(1999)
Types for Mobile Ambients
, pp. 79-92
-
-
Cardelli, L.1
Gordon, A.D.2
-
28
-
-
0001525319
-
Mobile ambients
-
265, 266, 294, 297, 324
-
[CG00b] L. Cardelli and A. D. Gordon. Mobile ambients. Theoretical Computer Science, 240:177–213, 2000. 265, 266, 294, 297, 324
-
(2000)
Theoretical Computer Science
, vol.240
, pp. 177-213
-
-
Cardelli, L.1
Gordon, A.D.2
-
29
-
-
0005505928
-
Logical properties of name restriction
-
Lecture Notes in Computer Science. Springer, To appear. 324
-
[CG01] L. Cardelli and A. D. Gordon. Logical properties of name restriction. In Typed Lambda Calculi and Applications (TLCA’01), Lecture Notes in Computer Science. Springer, 2001. To appear. 324
-
(2001)
Typed Lambda Calculi and Applications (TLCA’01)
-
-
Cardelli, L.1
Gordon, A.D.2
-
30
-
-
84887502600
-
-
26th International Colloquium on Automata, Languages and Programming (ICALP’99), Lecture Notes in Computer Science, Springer, 322, 324
-
[CGG99] L. Cardelli, G. Ghelli, and A. D. Gordon. Mobility types for mobile ambients. In 26th International Colloquium on Automata, Languages and Programming (ICALP’99), volume 1644 of Lecture Notes in Computer Science, pages 230–239. Springer, 1999. 322, 324
-
(1999)
Mobility Types for Mobile Ambients
, vol.1644
, pp. 230-239
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
31
-
-
84879087677
-
Ambient groups and mobility types
-
Lecture Notes in Computer Science, Springer, 266, 324
-
[CGG00a] L. Cardelli, G. Ghelli, and A. D. Gordon. Ambient groups and mobility types. In Theoretical Computer Science (IFIP TCS 2000), volume 1872 of Lecture Notes in Computer Science, pages 333–347. Springer, 2000. 266, 324
-
(2000)
Theoretical Computer Science (IFIP TCS 2000)
, vol.1872
, pp. 333-347
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
32
-
-
84865445501
-
Group creation and secrecy
-
C. Palamidessi, editor, Lecture Notes in Computer Science, Springer, 323
-
[CGG00b] L. Cardelli, G. Ghelli, and A. D. Gordon. Group creation and secrecy. In C. Palamidessi, editor, CONCUR 2000—Concurrency Theory, volume 1877 of Lecture Notes in Computer Science, pages 365–379. Springer, 2000. 323
-
(2000)
CONCUR 2000—Concurrency Theory
, vol.1877
, pp. 365-379
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
33
-
-
84958963801
-
Bauhaus linda
-
P. Ciancarini, O. Nierstrasz, and A. Yonezawa, editors, Lecture Notes in Computer Science, Springer, 292
-
[CGZ95] N. Carriero, D. Gelernter, and L. Zuck. Bauhaus linda. In P. Ciancarini, O. Nierstrasz, and A. Yonezawa, editors, Object-Based Models and Languages for Concurrent Systems, volume 924 of Lecture Notes in Computer Science, pages 66–76. Springer, 1995. 292
-
(1995)
Object-Based Models and Languages for Concurrent Systems
, vol.924
, pp. 66-76
-
-
Carriero, N.1
Gelernter, D.2
Zuck, L.3
-
34
-
-
0023965424
-
The calculus of constructions
-
297
-
[CH88] T. Coquand and G. Huet. The calculus of constructions. Information and Computation, 76(2/3):95–120, February/March 1988. 297
-
(1988)
Information and Computation
, vol.76
, Issue.2-3
, pp. 95-120
-
-
Coquand, T.1
Huet, G.2
-
35
-
-
0004717076
-
Model checking mobile processes
-
272
-
[Dam96] M. Dam. Model checking mobile processes. Information and Computation, 129(1):35–51, 1996. 272
-
(1996)
Information and Computation
, vol.129
, Issue.1
, pp. 35-51
-
-
Dam, M.1
-
36
-
-
0031601027
-
-
31st Hawaii International Conference on System Sciences, 272
-
[Dam98] M. Dam. Proving trust in systems of second-order processes. In 31st Hawaii International Conference on System Sciences, volume VII, pages 255–264, 1998. 272
-
(1998)
Proving Trust in Systems of Second-Order Processes
, vol.7
, pp. 255-264
-
-
Dam, M.1
-
37
-
-
85045310540
-
-
National Bureau of Standards, Washington DC, January, 274
-
[DES77] Data encryption standard. Fed. Inform. Processing Standards Pub. 46, National Bureau of Standards, Washington DC, January 1977. 274
-
(1977)
Fed. Inform. Processing Standards Pub. 46
-
-
-
38
-
-
84982908771
-
-
Secure Internet Programming 1999, Lecture Notes in Computer Science, Springer, 323
-
[DFP99] R. De Nicola, G. Ferrari, and R. Pugliese. Types as specifications of access policies. In Secure Internet Programming 1999, volume 1603 of Lecture Notes in Computer Science, pages 117–146. Springer, 1999. 323
-
(1999)
Types as Specifications of Access Policies
, vol.1603
, pp. 117-146
-
-
de Nicola, R.1
Ferrari, G.2
Pugliese, R.3
-
39
-
-
18944399713
-
Region analysis and a π-calculus with groups
-
Lectures Notes in Computer Science, 324
-
[DG00] S. Dal Zilio and A. D. Gordon. Region analysis and a π-calculus with groups. In Mathematical Foundations of Computer Science 2000 (MFCS2000), volume 1893 of Lectures Notes in Computer Science, pages 1–21. Springer, 2000. 324
-
(2000)
Mathematical Foundations of Computer Science 2000 (MFCS2000)
, vol.1893
, pp. 1-21
-
-
Dal Zilio, S.1
Gordon, A.D.2
-
42
-
-
84976665942
-
Timestamps in key distribution protocols
-
264
-
[DS81] D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533–536, 1981. 264
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
43
-
-
0020720357
-
On the security of public key protocols
-
273
-
[DY83] D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT–29(2):198–208, 1983. 273
-
(1983)
IEEE Transactions on Information Theory
, vol.IT29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
44
-
-
84974776068
-
A classification of security properties for process algebra
-
273
-
[FG94] R. Focardi and R. Gorrieri. A classification of security properties for process algebra. Journal of Computer Security, 3(1):5–33, 1994. 273
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
45
-
-
0029703268
-
-
23rd ACM Symposium on Principles of Programming Languages (POPL’96), 264, 266, 293
-
[FG96] C. Fournet and G. Gonthier. The reflexive CHAM and the Join-calculus. In 23rd ACM Symposium on Principles of Programming Languages (POPL’96), pages 372–385, 1996. 264, 266, 293
-
(1996)
The Reflexive CHAM and the Join-Calculus
, pp. 372-385
-
-
Fournet, C.1
Gonthier, G.2
-
46
-
-
84955565479
-
-
CONCUR’96: Concurrency Theory, Lecture Notes in Computer Science, Springer, 266, 293
-
+ 96] C. Fournet, G. Gonthier, J.-J. Lévy, L. Maranget, and D. Rémy. A calculus of mobile agents. In CONCUR’96: Concurrency Theory, volume 1119 of Lecture Notes in Computer Science, pages 406–421. Springer, 1996. 266, 293
-
(1996)
A Calculus of Mobile Agents
, vol.1119
, pp. 406-421
-
-
Fournet, C.1
Gonthier, G.2
Lévy, J.-J.3
Maranget, L.4
Rémy, D.5
-
47
-
-
84879070446
-
An asynchronous, distributed implementation of mobile ambients
-
Lecture Notes in Computer Science. Springer, 266, 325
-
[FLS00] C. Fournet, J.-J. Lévy, and A. Schmitt. An asynchronous, distributed implementation of mobile ambients. In Theoretical Computer Science (IFIP TCS 2000), volume 1872 of Lecture Notes in Computer Science. Springer, 2000. 266, 325
-
(2000)
Theoretical Computer Science (IFIP TCS 2000)
, vol.1872
-
-
Fournet, C.1
Lévy, J.-J.2
Schmitt, A.3
-
48
-
-
84937692789
-
Equational properties of mobile ambients
-
Lecture Notes in Computer Science, Springer, An extended version appears as Microsoft Research Technical Report MSR–TR–99–11, April 1999. 324
-
[GC99] A. D. Gordon and L. Cardelli. Equational properties of mobile ambients. In Foundations of Software Science and Computation Structures (FoSSaCS’99), volume 1578 of Lecture Notes in Computer Science, pages 212–226. Springer, 1999. An extended version appears as Microsoft Research Technical Report MSR–TR–99–11, April 1999. 324
-
(1999)
Foundations of Software Science and Computation Structures (FoSSaCS’99)
, vol.1578
, pp. 212-226
-
-
Gordon, A.D.1
Cardelli, L.2
-
53
-
-
84957649493
-
Abstract interpretation of mobile ambients
-
Lecture Notes in Computer Science, Springer, 323
-
[HJNN99] R. R. Hansen, J. G. Jensen, F. Nielson, and H. R. Nielson. Abstract interpretation of mobile ambients. In Static Analysis Symposium (SAS’99), volume 1694 of Lecture Notes in Computer Science, pages 134–148. Springer, 1999. 323
-
(1999)
Static Analysis Symposium (SAS’99)
, vol.1694
, pp. 134-148
-
-
Hansen, R.R.1
Jensen, J.G.2
Nielson, F.3
Nielson, H.R.4
-
56
-
-
0024665744
-
Analyzing encryption protocols using formal verification techniques
-
273
-
[Kem89] R. Kemmerer. Analyzing encryption protocols using formal verification techniques. IEEE Journal on Selected Areas in Communications, 7(4):448–457, 1989. 273
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.1
-
57
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
273
-
[LABW92] B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265–310, November 1992. 273
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
58
-
-
0042664779
-
Authentication in distributed systems: A bibliography
-
272
-
[Lie93] A. Liebl. Authentication in distributed systems: A bibliography. ACM Operating Systems Review, 27(4):31–41, 1993. 272
-
(1993)
ACM Operating Systems Review
, vol.27
, Issue.4
, pp. 31-41
-
-
Liebl, A.1
-
59
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
273
-
[LMMS98] P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Fifth ACM Conference on Computer and Communications Security, pages 112–121, 1998. 273
-
(1998)
Fifth ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
60
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
-
T. Margaria and B. Steffen, Lectures Notes in Computer Science, Springer, 264, 273
-
[Low96] G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In T. Margaria and B. Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems (TACAS’96), volume 1055 of Lectures Notes in Computer Science, pages 147–166. Springer, 1996. 264, 273
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS’96)
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
63
-
-
0029718596
-
On two proposals for on-line bankcard payments using open networks: Problems and solutions
-
289
-
[Mao96] W. Mao. On two proposals for on-line bankcard payments using open networks: Problems and solutions. In IEEE Symposium on Security and Privacy, pages 201–210, 1996. 289
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 201-210
-
-
Mao, W.1
-
64
-
-
0023295108
-
The interrogator: Protocol security analysis
-
273
-
[MCF87] J. K. Millen, S. C. Clark, and S. B. Freedman. The interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, SE–13(2):274–288, 1987. 273
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
65
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
273
-
[Mea92] C. Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1):5–36, 1992. 273
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 5-36
-
-
Meadows, C.1
-
68
-
-
0003861188
-
-
Cambridge University Press, 263, 272, 298, 318, 323
-
[Mil99] R. Milner. Communicating and Mobile Systems: the π-Calculus. Cambridge University Press, 1999. 263, 272, 298, 318, 323
-
(1999)
Communicating and Mobile Systems: The π-Calculus
-
-
Milner, R.1
-
69
-
-
44049113210
-
A calculus of mobile processes, parts I and II
-
263, 272
-
[MPW92] R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes, parts I and II. Information and Computation, pages 1–40 and 41–77, 1992. 263, 272
-
(1992)
Information and Computation
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
72
-
-
0347293739
-
Names
-
S. Mullender, editor, Addison-Wesley, 263
-
[Nee89] R. M. Needham. Names. In S. Mullender, editor, Distributed Systems, pages 89–101. Addison-Wesley, 1989. 263
-
(1989)
Distributed Systems
, pp. 89-101
-
-
Needham, R.M.1
-
73
-
-
84957013187
-
Locality based linda: Programming with explicit localities
-
Lecture Notes in Computer Science, Springer, 293
-
[NFP97] R. De Nicola, G.-L. Ferrari, and R. Pugliese. Locality based linda: programming with explicit localities. In Proceedings TAPSOFT’97, volume 1214 of Lecture Notes in Computer Science, pages 712–726. Springer, 1997. 293
-
(1997)
Proceedings TAPSOFT’97
, vol.1214
, pp. 712-726
-
-
de Nicola, R.1
Ferrari, G.-L.2
Pugliese, R.3
-
74
-
-
35048826704
-
Validating firewalls in mobile ambients
-
Lecture Notes in Computer Science, Springer, 323
-
[NNHJ99] F. Nielson, H. R. Nielson, R. R. Hansen, and J. G. Jensen. Validating firewalls in mobile ambients. In CONCUR’99: Concurrency Theory, volume 1664 of Lecture Notes in Computer Science, pages 463–477. Springer, 1999. 323
-
(1999)
CONCUR’99: Concurrency Theory
, vol.1664
, pp. 463-477
-
-
Nielson, F.1
Nielson, H.R.2
Hansen, R.R.3
Jensen, J.G.4
-
75
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
[NS78] R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993– 999, 1978. 264, 272
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
76
-
-
84947207579
-
Functional nets
-
Lecture Notes in Computer Science, Springer, 264
-
[Ode00] M. Odersky. Functional nets. In European Symposium on Programming (ESOP 2000), volume 1782 of Lecture Notes in Computer Science, pages 1–25. Springer, 2000. 264
-
(2000)
European Symposium on Programming (ESOP 2000)
, vol.1782
, pp. 1-25
-
-
Odersky, M.1
-
78
-
-
0003976893
-
-
G. Plotkin, C. Stirling, and M. Tofte, editors, Proof, Language and Interaction: Essays in Honour of Robin Milner. MIT Press, 264
-
[PT00] B. C. Pierce and D. N. Turner. Pict: A programming language based on the pi-calculus. In G. Plotkin, C. Stirling, and M. Tofte, editors, Proof, Language and Interaction: Essays in Honour of Robin Milner. MIT Press, 2000. 264
-
(2000)
Pict: A Programming Language Based on the Pi-Calculus
-
-
Pierce, B.C.1
Turner, D.N.2
-
80
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
287
-
[RSA78] R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126, February 1978. 287
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
83
-
-
0003855464
-
-
John Wiley & Sons, Inc., second edition, 286
-
[Sch96b] B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., second edition, 1996. 286
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
84
-
-
84878539063
-
Global/local subtyping and capability inference for a distributed π-calculus
-
Lecture Notes in Computer Science, Springer, 292, 317, 323
-
[Sew98] P. Sewell. Global/local subtyping and capability inference for a distributed π-calculus. In 25th International Colloquium on Automata, Languages and Programming (ICALP’98), volume 1443 of Lecture Notes in Computer Science, pages 695–706. Springer, 1998. 292, 317, 323
-
(1998)
25Th International Colloquium on Automata, Languages and Programming (ICALP’98)
, vol.1443
, pp. 695-706
-
-
Sewell, P.1
-
87
-
-
0002997049
-
Region-based memory management
-
323
-
[TT97] M. Tofte and J.-P. Talpin. Region-based memory management. Information and Computation, 132(2):109–176, 1997. 323
-
(1997)
Information and Computation
, vol.132
, Issue.2
, pp. 109-176
-
-
Tofte, M.1
Talpin, J.-P.2
-
88
-
-
84956985232
-
Seal: A framework for secure mobile computations
-
Lecture Notes in Computer Science, 266
-
[VC99] J. Vitek and G. Castagna. Seal: A framework for secure mobile computations. In Internet Programming Languages, volume 1686 of Lecture Notes in Computer Science, pages 47–77. Springer, 1999. 266
-
(1999)
Internet Programming Languages
, vol.1686
, pp. 47-77
-
-
Vitek, J.1
Castagna, G.2
-
89
-
-
85045304011
-
-
J. Bradshaw, editor, Software Agents. AAAI Press/The MIT Press
-
[Whi96] J. E. White. Mobile agents. In J. Bradshaw, editor, Software Agents. AAAI Press/The MIT Press, 1996. 265, 292
-
(1996)
Mobile Agents
, vol.265
, pp. 292
-
-
White, J.E.1
-
90
-
-
0027205880
-
A semantic model for authentication protocols
-
[WL93] T. Y. C. Woo and S. S. Lam. A semantic model for authentication protocols. In IEEE Symposium on Security and Privacy, pages 178–194, 1993. 289
-
(1993)
IEEE Symposium on Security and Privacy
, vol.289
, pp. 178-194
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
91
-
-
84878623670
-
Subtyping and typing algorithms for mobile ambients
-
Lecture Notes in Computer Science, Springer, 300, 312, 324
-
[Zim00] P. Zimmer. Subtyping and typing algorithms for mobile ambients. In Foundations of Software Science and Computation Structures (FoS-SaCS’00), volume 1784 of Lecture Notes in Computer Science, pages 375– 390. Springer, 2000. 300, 312, 324
-
(2000)
Foundations of Software Science and Computation Structures (FoS-SaCS’00)
, vol.1784
, pp. 375-390
-
-
Zimmer, P.1
|