-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi. Secrecy by typing in security protocols. J. ACM, 46(5), 1999.
-
(1999)
J. ACM
, vol.46
, Issue.5
-
-
Abadi, M.1
-
4
-
-
84976752728
-
Dynamic typing in a statically typed language
-
M. Abadi, L. Cardelli, B. Pierce, and G. Plotkin. Dynamic typing in a statically typed language. ACM Trans. Program. Lang. Syst., 13(2), 1991.
-
(1991)
ACM Trans. Program. Lang. Syst.
, vol.13
, Issue.2
-
-
Abadi, M.1
Cardelli, L.2
Pierce, B.3
Plotkin, G.4
-
5
-
-
0035035153
-
Mobile values, new names, and secure communication
-
M. Abadi and C. Fournet. Mobile values, new names, and secure communication. In POPL '01, 2001.
-
(2001)
POPL '01
-
-
Abadi, M.1
Fournet, C.2
-
7
-
-
0033715532
-
Authentication primitives and their compilation
-
M. Abadi, C. Fournet, and G. Gonthier. Authentication primitives and their compilation. In POPL '00, 2000.
-
(2000)
POPL '00
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
8
-
-
0037052276
-
Secure implementation of channel abstractions
-
M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Inf. Comput., 174(1), 2002.
-
(2002)
Inf. Comput.
, vol.174
, Issue.1
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
9
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1), 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
-
-
Abadi, M.1
Gordon, A.D.2
-
10
-
-
33745766520
-
A logical account of NGSCB
-
M. Abadi and T. Wobber. A logical account of NGSCB. In FORTE '04, 2004.
-
(2004)
FORTE '04
-
-
Abadi, M.1
Wobber, T.2
-
14
-
-
85008038596
-
Improving the TCPA specification
-
W. A. Arbaugh. Improving the TCPA specification. IEEE Computer, 2002.
-
(2002)
IEEE Computer
-
-
Arbaugh, W.A.1
-
16
-
-
0025207607
-
The chemical abstract machine
-
G. Berry and G. Boudol. The chemical abstract machine. In POPL '90, 1990.
-
(1990)
POPL '90
-
-
Berry, G.1
Boudol, G.2
-
18
-
-
33745771399
-
Compositional analysis of authentication protocols
-
M. Bugliesi, R. Focardi, and M. Maffei. Compositional analysis of authentication protocols. In ESOP, 2004.
-
(2004)
ESOP
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
19
-
-
28144464907
-
Analysis of typed analyses of authentication protocols
-
M. Bugliesi, R. Focardi, and M. Maffei. Analysis of typed analyses of authentication protocols. In CSFW, 2005.
-
(2005)
CSFW
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
20
-
-
0030646118
-
Program fragments, linking, and modularization
-
L. Cardelli. Program fragments, linking, and modularization. In POPL '97, 1997.
-
(1997)
POPL '97
-
-
Cardelli, L.1
-
22
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. D. Gordon and A. S. A. Jeffrey. Authenticity by typing for security protocols. J. Computer Security, 11(4), 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.4
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
23
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. D. Gordon and A. S. A. Jeffrey. Types and effects for asymmetric cryptographic protocols. J. Computer Security, 12(3/4), 2004.
-
(2004)
J. Computer Security
, vol.12
, Issue.3-4
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
24
-
-
27244435196
-
Secrecy despite compromise: Types, cryptography, and the pi-calculus
-
A. D. Gordon and A. S. A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. In CONCUR, 2005.
-
(2005)
CONCUR
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
26
-
-
24644470511
-
Semantic remote attestation: A virtual machine directed approach to trusted computing
-
V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: A virtual machine directed approach to trusted computing. In USENIX VM, 2004.
-
(2004)
USENIX VM
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
27
-
-
33745792638
-
Symmetric behavior-based trust: A new paradigm for internet computing
-
V. Haldar and M. Franz. Symmetric behavior-based trust: A new paradigm for internet computing. In New Security Paradigms Workshop, 2004.
-
(2004)
New Security Paradigms Workshop
-
-
Haldar, V.1
Franz, M.2
-
28
-
-
0037170503
-
Resource access control in systems of mobile agents
-
M. Hennessy and J. Riely. Resource access control in systems of mobile agents. Information and Computation, 173, 2002.
-
(2002)
Information and Computation
, pp. 173
-
-
Hennessy, M.1
Riely, J.2
-
35
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, P. Lincoln, M. Mitchell, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In ASPLOS-IX, 2000.
-
(2000)
ASPLOS-IX
-
-
Lie, D.1
Thekkath, C.2
Lincoln, P.3
Mitchell, M.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
40
-
-
44049113210
-
A calculus of mobile processes, I
-
R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes, I. Inf. Comput., 100(1), 1992.
-
(1992)
Inf. Comput.
, vol.100
, Issue.1
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
41
-
-
0005011263
-
Polarized name passing
-
M. Odersky. Polarized name passing. In FST-TCS '95, 1995.
-
(1995)
FST-TCS '95
-
-
Odersky, M.1
-
43
-
-
1942504253
-
Trust and partial typing in open systems of mobile agents
-
J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. J. Automated Reasoning, 31(3-4), 2003.
-
(2003)
J. Automated Reasoning
, vol.31
, Issue.3-4
-
-
Riely, J.1
Hennessy, M.2
-
44
-
-
29244472125
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
A.-R. Sadeghi and C. Stüble. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In New Security Paradigms Workshop, 2004.
-
(2004)
New Security Paradigms Workshop
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
46
-
-
30144435491
-
Peer-to-peer access control architecture using trusted computing technology
-
R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trusted computing technology. In SACMAT, 2005.
-
(2005)
SACMAT
-
-
Sandhu, R.1
Zhang, X.2
-
48
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
Special Issue on Computer Network Security
-
S. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31, 1999. Special Issue on Computer Network Security.
-
(1999)
Computer Networks
, pp. 31
-
-
Smith, S.1
Weingart, S.2
-
49
-
-
84976781807
-
Reflections on trusting trust
-
K. Thompson. Reflections on trusting trust. CACM, 27(8), 1984.
-
(1984)
CACM
, vol.27
, Issue.8
-
-
Thompson, K.1
|