-
1
-
-
0035035153
-
-
Martín Abadi, Cédric Fournet, Mobile values, new names, and secure communication, in: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001, pp. 104-115
-
-
-
-
2
-
-
0000298407
-
A bisimulation method for cryptographic protocols
-
Abadi M., and Gordon A.D. A bisimulation method for cryptographic protocols. Nordic Journal of Computing 5 (1998) 267-303
-
(1998)
Nordic Journal of Computing
, vol.5
, pp. 267-303
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
84947720399
-
A bisimulation method for cryptographic protocols
-
7th European Symposium on Programming, Springer-Verlag (preliminary version)
-
Abadi M., and Gordon A.D. A bisimulation method for cryptographic protocols. 7th European Symposium on Programming. Lecture Notes in Computer Science vol. 1381 (1998), Springer-Verlag 12-26 (preliminary version)
-
(1998)
Lecture Notes in Computer Science
, vol.1381
, pp. 12-26
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Proceedings of the 4th ACM Conference on Computer and Communications Security, 1997, pp. 36-47 (preliminary version)
-
Abadi M., and Gordon A.D. A calculus for cryptographic protocols: The spi calculus. Information and Computation 148 1 (1999) 1-70 Proceedings of the 4th ACM Conference on Computer and Communications Security, 1997, pp. 36-47 (preliminary version)
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
0002534194
-
The lazy lambda calculus
-
Turner D.A. (Ed), Addison-Wesley
-
Abramsky S. The lazy lambda calculus. In: Turner D.A. (Ed). Research Topics in Functional Programming (1990), Addison-Wesley 65-117
-
(1990)
Research Topics in Functional Programming
, pp. 65-117
-
-
Abramsky, S.1
-
6
-
-
0036308321
-
Proof techniques for cryptographic processes
-
14th Annual IEEE Symposium on Logic in Computer Science, 1999, pp. 157-166 (preliminary version)
-
Boreale M., De Nicola R., and Pugliese R. Proof techniques for cryptographic processes. SIAM Journal on Computing 31 3 (2002) 947-986 14th Annual IEEE Symposium on Logic in Computer Science, 1999, pp. 157-166 (preliminary version)
-
(2002)
SIAM Journal on Computing
, vol.31
, Issue.3
, pp. 947-986
-
-
Boreale, M.1
De Nicola, R.2
Pugliese, R.3
-
7
-
-
84944052768
-
On bisimulations for the spi calculus
-
9th International Conference on Algebraic Methodology and Software Technology, Springer-Verlag
-
Borgström J., and Nestmann U. On bisimulations for the spi calculus. 9th International Conference on Algebraic Methodology and Software Technology. Lecture Notes in Computer Science vol. 2422 (2002), Springer-Verlag 287-303
-
(2002)
Lecture Notes in Computer Science
, vol.2422
, pp. 287-303
-
-
Borgström, J.1
Nestmann, U.2
-
8
-
-
0037629421
-
-
Derek Dreyer, Karl Crary, Robert Harper, A type system for higher-order modules, in: Proceedings of the 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2003, pp. 236-249
-
-
-
-
9
-
-
0000865197
-
Syntactic type abstraction
-
Principals in programming languages: A syntactic proof technique, in: Proceedings of the Fourth ACM SIGPLAN International Conference on Functional Programming (extended abstract), 1999, pp. 197-207
-
Grossman D., Morrisett G., and Zdancewic S. Syntactic type abstraction. ACM Transactions on Programming Languages and Systems 22 6 (2000) 1037-1080 Principals in programming languages: A syntactic proof technique, in: Proceedings of the Fourth ACM SIGPLAN International Conference on Functional Programming (extended abstract), 1999, pp. 197-207
-
(2000)
ACM Transactions on Programming Languages and Systems
, vol.22
, Issue.6
, pp. 1037-1080
-
-
Grossman, D.1
Morrisett, G.2
Zdancewic, S.3
-
10
-
-
0000627561
-
Proving congruence of bisimulation in functional programming languages
-
Howe D.J. Proving congruence of bisimulation in functional programming languages. Information and Computation 124 2 (1996) 103-112
-
(1996)
Information and Computation
, vol.124
, Issue.2
, pp. 103-112
-
-
Howe, D.J.1
-
11
-
-
0032597538
-
-
Alan Jeffrey, Julian Rathke, Towards a theory of bisimulation for local names, in: 14th Annual IEEE Symposium on Logic in Computer Science, 1999, pp. 56-66
-
-
-
-
12
-
-
4243199081
-
A theory of bisimulation for a fragment of Concurrent ML with local names
-
15th Annual IEEE Symposium on Logic in Computer Science (extended abstract), 2000, pp. 311-321
-
Jeffrey A., and Rathke J. A theory of bisimulation for a fragment of Concurrent ML with local names. Theoretical Computer Science 323 (2004) 1-48 15th Annual IEEE Symposium on Logic in Computer Science (extended abstract), 2000, pp. 311-321
-
(2004)
Theoretical Computer Science
, vol.323
, pp. 1-48
-
-
Jeffrey, A.1
Rathke, J.2
-
13
-
-
1442288659
-
-
James J. Leifer, Gilles Peskine, Peter Sewell, Keith Wansbrough, Global abstraction-safe marshalling with hash types, in: Proceedings of the Eighth ACM SIGPLAN International Conference on Functional Programming, 2003, pp. 87-98
-
-
-
-
14
-
-
0029205357
-
-
Xavier Leroy, Applicative functors and fully transparent higher-order modules, in: Proceedings of the 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1995, pp. 142-153
-
-
-
-
15
-
-
85033219712
-
-
Barbara Liskov, A history of CLU, in: The Second ACM SIGPLAN Conference on History of Programming Languages, 1993, pp. 133-147
-
-
-
-
16
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe G. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters 56 3 (1995) 131-133
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
19
-
-
0024038082
-
Abstract types have existential types
-
Proceedings of the 12th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, 1985, pp. 37-51 (preliminary version)
-
Mitchell J.C., and Plotkin G.D. Abstract types have existential types. ACM Transactions on Programming Languages and Systems 10 3 (1988) 470-502 Proceedings of the 12th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, 1985, pp. 37-51 (preliminary version)
-
(1988)
ACM Transactions on Programming Languages and Systems
, vol.10
, Issue.3
, pp. 470-502
-
-
Mitchell, J.C.1
Plotkin, G.D.2
-
20
-
-
34047155864
-
-
James H. Morris Jr., Lambda-Calculus Models of Programming Languages, Ph.D. Thesis, Massachusetts Institute of Technology, 1968
-
-
-
-
21
-
-
0015561577
-
Protection in programming languages
-
Morris Jr. J.H. Protection in programming languages. Communications of the ACM 16 1 (1973) 15-21
-
(1973)
Communications of the ACM
, vol.16
, Issue.1
, pp. 15-21
-
-
Morris Jr., J.H.1
-
22
-
-
85059176860
-
-
James H. Morris Jr., Types are not sets, in: Proceedings of the 1st Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, 1973, pp. 120-124
-
-
-
-
23
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM 21 12 (1978) 993-999
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
24
-
-
34047162118
-
-
Benjamin C. Pierce, Eijiro Sumii, Relating cryptography and polymorphism, 2000. Draft. http://www.kb.ecei.tohoku.ac.jp/~sumii/pub/
-
-
-
-
25
-
-
84878538793
-
Existential types: Logical relations and operational equivalence
-
Automata, Languages and Programming, Springer-Verlag
-
Pitts A.M. Existential types: Logical relations and operational equivalence. Automata, Languages and Programming. Lecture Notes in Computer Science vol. 1443 (1998), Springer-Verlag 309-326
-
(1998)
Lecture Notes in Computer Science
, vol.1443
, pp. 309-326
-
-
Pitts, A.M.1
-
26
-
-
0001233777
-
Parametric polymorphism and operational equivalence
-
HOOTS II Second Workshop on Higher-Order Operational Techniques in Semantics, in: Electronic Notes in Theoretical Computer Science, vol. 10, 1998 (preliminary version)
-
Pitts A.M. Parametric polymorphism and operational equivalence. Mathematical Structures in Computer Science 10 (2000) 321-359 HOOTS II Second Workshop on Higher-Order Operational Techniques in Semantics, in: Electronic Notes in Theoretical Computer Science, vol. 10, 1998 (preliminary version)
-
(2000)
Mathematical Structures in Computer Science
, vol.10
, pp. 321-359
-
-
Pitts, A.M.1
-
27
-
-
85029606643
-
Observable properties of higher order functions that dynamically create local names, or: what's new?
-
Mathematical Foundations of Computer Science, Springer-Verlag
-
Pitts A.M., and Stark I. Observable properties of higher order functions that dynamically create local names, or: what's new?. Mathematical Foundations of Computer Science. Lecture Notes in Computer Science vol. 711 (1993), Springer-Verlag 122-141
-
(1993)
Lecture Notes in Computer Science
, vol.711
, pp. 122-141
-
-
Pitts, A.M.1
Stark, I.2
-
28
-
-
0020919435
-
-
John C. Reynolds, Types, abstraction and parametric polymorphism, in: Information Processing 83, Proceedings of the IFIP 9th World Computer Congres, 1983, pp. 513-523
-
-
-
-
29
-
-
1242287791
-
-
Andreas Rossberg, Generativity and dynamic opacity for abstract types, in: Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2003, pp. 241-252
-
-
-
-
30
-
-
84955567248
-
The problem of "weak bisimulation up to"
-
CONCUR '92, Third International Conference on Concurrency Theory, Springer-Verlag
-
Sangiorgi D., and Milner R. The problem of "weak bisimulation up to". CONCUR '92, Third International Conference on Concurrency Theory. Lecture Notes in Computer Science vol. 630 (1992), Springer-Verlag 32-46
-
(1992)
Lecture Notes in Computer Science
, vol.630
, pp. 32-46
-
-
Sangiorgi, D.1
Milner, R.2
-
31
-
-
0035030508
-
-
Peter Sewell, Modules, abstract types, and distributed versioning, in: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001, pp. 236-247
-
-
-
-
32
-
-
34047140820
-
-
Ian Stark, Names and Higher-Order Functions. Ph.D. Thesis, University of Cambridge, http://homepages.inf.ed.ac.uk/stark/namhof.html, 1994
-
-
-
-
33
-
-
0141751786
-
Logical relations for encryption
-
14th IEEE Computer Security Foundations Workshop, 2001, pp. 256-269 (extended abstract)
-
Sumii E., and Pierce B.C. Logical relations for encryption. Journal of Computer Security 11 4 (2003) 521-554 14th IEEE Computer Security Foundations Workshop, 2001, pp. 256-269 (extended abstract)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 521-554
-
-
Sumii, E.1
Pierce, B.C.2
-
34
-
-
29144437303
-
-
Eijiro Sumii, Benjamin C. Pierce, A bisimulation for type abstraction and recursion, in: Technical Report MS-CIS-04-27, Department of Computer and Information Science, University of Pennsylvania, http://www.kb.ecei.tohoku.ac.jp/~sumii/pub/, 2004. Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2005, pp. 63-74 (extended abstract)
-
-
-
|