-
2
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
5
-
-
0037052276
-
Secure implementation of channel abstractions
-
Apr.
-
M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Information and Computation, 174(1):37-83, Apr. 2002.
-
(2002)
Information and Computation
, vol.174
, Issue.1
, pp. 37-83
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
6
-
-
0003761061
-
A calculus for cryptographic protocols: The spi calculus
-
Digital Systems Research Center, Palo Alto CA, January
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Technical Report SRC-RR-149, Digital Systems Research Center, Palo Alto CA, January 1998.
-
(1998)
Technical Report
, vol.SRC-RR-149
-
-
Abadi, M.1
Gordon, A.D.2
-
7
-
-
3543058869
-
Automatic proof of strong secrecy for security protocols
-
May
-
B. Blanchet, Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86-100, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 86-100
-
-
Blanchet, B.1
-
8
-
-
0004215976
-
A logic of authentication
-
A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989.
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
9
-
-
0005970563
-
A case for network-attached secure disks
-
G. A. Gibson, D. P. Nagle, K. Amiri, F. W. Chang, E. Feinberg, H. G. C. Lee, B. Ozceri, E. Riedel, and D. Rochberg. A case for network-attached secure disks. Technical Report CMU-CS-96-142, 1996.
-
(1996)
Technical Report
, vol.CMU-CS-96-142
-
-
Gibson, G.A.1
Nagle, D.P.2
Amiri, K.3
Chang, F.W.4
Feinberg, E.5
Lee, H.G.C.6
Ozceri, B.7
Riedel, E.8
Rochberg, D.9
-
11
-
-
4244158697
-
Security for network attached storage devices
-
Carnegie Mellon University, October
-
H. Gobioff, G. Gibson, and J. Tygar. Security for network attached storage devices. Technical Report CMU-CS-97-185, Carnegie Mellon University, October 1997.
-
(1997)
Technical Report
, vol.CMU-CS-97-185
-
-
Gobioff, H.1
Gibson, G.2
Tygar, J.3
-
12
-
-
0038414953
-
Typing correspondence assertions for communication protocols
-
A. D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. Theoretical Computer Science, 300(1-3):379-409, 2003.
-
(2003)
Theoretical Computer Science
, vol.300
, Issue.1-3
, pp. 379-409
-
-
Gordon, A.D.1
Jeffrey, A.2
-
13
-
-
84858537057
-
Untrustworthy programming languages
-
Talk May
-
A. Kennedy, Untrustworthy programming languages. Talk at the Joint Queen Mary/Imperial College Seminar series, May 2005. Slides available at http://research.microsoft.com/~akenn/sec/index.html.
-
(2005)
Joint Queen Mary/Imperial College Seminar Series
-
-
Kennedy, A.1
-
14
-
-
0042194883
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
L. Lamport. Specifying Systems: The TLA + Language and Tools for Hardware and Software Engineers. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2002.
-
(2002)
Specifying Systems: the TLA + Language and Tools for Hardware and Software Engineers
-
-
Lamport, L.1
-
16
-
-
85084162873
-
Strong security for network-attached storage
-
USENIX Association
-
E. L. Miller, D. D. E. Long, W. E. Freeman, and B. Reed. Strong security for network-attached storage. In FAST '02: Proceedings of the Conference on File and Storage Technologies, pages 1-13. USENIX Association, 2002.
-
(2002)
FAST '02: Proceedings of the Conference on File and Storage Technologies
, pp. 1-13
-
-
Miller, E.L.1
Long, D.D.E.2
Freeman, W.E.3
Reed, B.4
-
17
-
-
0001862336
-
Fully abstract models of typed lambda-calculi
-
R. Milner. Fully abstract models of typed lambda-calculi. Theoretical Computer Science, 4(1):1-22, 1977.
-
(1977)
Theoretical Computer Science
, vol.4
, Issue.1
, pp. 1-22
-
-
Milner, R.1
-
18
-
-
0000511698
-
The polyadic pi-calculus: A tutorial
-
F. L. Bauer, W. Brauer, and H. Schwichtenberg, editors, Springer-Verlag
-
R. Milner. The polyadic pi-calculus: a tutorial. In F. L. Bauer, W. Brauer, and H. Schwichtenberg, editors, Logic and Algebra of Specification, pages 203-246. Springer-Verlag, 1993.
-
(1993)
Logic and Algebra of Specification
, pp. 203-246
-
-
Milner, R.1
-
20
-
-
0033906295
-
Authenticating network-attached storage
-
Jan.
-
B. C. Reed, E. G. Chron, R. C. Burns, and D. D. E. Long. Authenticating network-attached storage. IEEE Micro, 20(1):49-57, Jan. 2000.
-
(2000)
IEEE Micro
, vol.20
, Issue.1
, pp. 49-57
-
-
Reed, B.C.1
Chron, E.G.2
Burns, R.C.3
Long, D.D.E.4
|