-
2
-
-
20444431300
-
Se-cure web tunneling
-
Apr Proceedings of the 7th International World Wide Web Conference
-
M. Abadi, A. Birrell, R. Stata, and E. Wobber. Se-cure web tunneling. Computer Networks and ISDN Systems, 30(1-7):531-539, Apr. 1998. Proceedings of the 7th International World Wide Web Conference
-
(1998)
Computer Networks and ISDN Systems
, vol.30
, Issue.1-7
, pp. 531-539
-
-
Abadi, M.1
Birrell, A.2
Stata, R.3
Wobber, E.4
-
5
-
-
0003092378
-
A calculus for crypto-graphic protocols: The spi calculus
-
Jan. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998
-
M. Abadi and A. D. Gordon. A calculus for crypto-graphic protocols: The spi calculus. Information and Computation, 148(1), Jan. 1999. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998
-
(1999)
Information and Computation
, vol.148
, Issue.1
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
0031332010
-
The altavista tun-nel: Using the internet to extend corporate networks
-
Oct. On the Web at
-
K. F. Alden and E. P. Wobber. The AltaVista tun-nel: Using the Internet to extend corporate networks. Digital Technical Journal, 9(2):5-15, Oct. 1997. On the Web at http://www.digital.com/info/DTJQ01/DTJQ01HM.HTM
-
(1997)
Digital Technical Journal
, vol.9
, Issue.2
, pp. 5-15
-
-
Alden, K.F.1
Wobber, E.P.2
-
10
-
-
0029516756
-
Network objects
-
Dec
-
A. Birrell, G. Nelson, S. Owicki, and E. Wobber. Network objects. Software Practice and Experience, S4(25):87-130, Dec. 1995
-
(1995)
Software Practice and Experience
, vol.4
, Issue.25
, pp. 87-130
-
-
Birrell, A.1
Nelson, G.2
Owicki, S.3
Wobber, E.4
-
11
-
-
0022015288
-
Secure communication using remote pro-cedure calls
-
Feb
-
A. D. Birrell. Secure communication using remote pro-cedure calls. ACM Transactions on Computer Sys-tems, 3(1):1-14, Feb. 1985
-
(1985)
ACM Transactions on Computer Sys-tems
, vol.3
, Issue.1
, pp. 1-14
-
-
Birrell, A.D.1
-
13
-
-
0004215976
-
A logic of authentication
-
A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
16
-
-
0029703268
-
The reflexive chemical abstract machine and the join-calculus
-
ACM Jan
-
C. Fournet and G. Gonthier. The reflexive chemical abstract machine and the join-calculus. In Proceedings of POPL '96, pages 372-385. ACM, Jan. 1996
-
(1996)
Proceedings of POPL
, vol.96
, pp. 372-385
-
-
Fournet, C.1
Gonthier, G.2
-
17
-
-
84955565479
-
A calculus of mobile agents
-
In U. Montanari and V. Sassone, editors of Lecture Notes in Computer Science. Springer- Verlag Aug
-
C. Fournet, G. Gonthier, J.-J. Levy, L. Maranget, and D. Remy. A calculus of mobile agents. In U. Montanari and V. Sassone, editors, Proceedings of the 7th Inter-national Conference on Concurrency Theory, volume 1119 of Lecture Notes in Computer Science. Springer-Verlag, Aug. 1996
-
(1996)
Proceedings of the 7th Inter-national Conference on Concurrency Theory
, vol.1119
-
-
Fournet, C.1
Gonthier, G.2
Levy, J.-J.3
Maranget, L.4
Remy, D.5
-
18
-
-
84957891695
-
Implicit typing a la ML for the join-calculus. in A. Mazurkiewicz and J. Winkowski editors
-
Springer- Verlag, July
-
C. Fournet, C. Laneve, L. Maranget, and D. Remy. Implicit typing a la ML for the join-calculus. In A. Mazurkiewicz and J. Winkowski, editors, Proceed-ings of the 8th International Conference on Concur-rency Theory, volume 1243 of Lecture Notes in Com-puter Science, pages 196-212. Springer-Verlag, July 1997
-
(1997)
Proceed-ings of the 8th International Conference on Concur-rency Theory of Lecture Notes in Com-puter Science
, vol.1243
, pp. 196-212
-
-
Fournet, C.1
Laneve, C.2
Maranget, L.3
Remy, D.4
-
20
-
-
0024304753
-
A simple approach to specifying concur-rent systems
-
Jan
-
L. Lamport. A simple approach to specifying concur-rent systems. Commun. ACM, 32(1):32-45, Jan. 1989
-
(1989)
Commun ACM
, vol.32
, Issue.1
, pp. 32-45
-
-
Lamport, L.1
-
21
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
Nov
-
B. Lampson, M. Abadi, M. Burrows, and E. Wob-ber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Sys-tems, 10(4):265-310, Nov. 1992
-
(1992)
ACM Transactions on Computer Sys-tems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wob-ber, E.4
-
22
-
-
0032218226
-
A probabilistic poly-time framework for protocol anal-ysis
-
Nov
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol anal-ysis. In Proceedings of the Fifth ACM Conference on Computer and Communications Security, pages 112-121, Nov. 1998
-
(1998)
Proceedings of the Fifth ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
24
-
-
0002426876
-
A general theory of composition for a class of \possibilistic" properties
-
Jan
-
J. McLean. A general theory of composition for a class of \possibilistic" properties. IEEE Transactions on Software Engineering, 22(1):53-66, Jan. 1996
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-66
-
-
McLean, J.1
-
26
-
-
44049114041
-
A calculus of mo-bile processes, parts i and II
-
Sept
-
R. Milner, J. Parrow, and D. Walker. A calculus of mo-bile processes, parts I and II. Information and Com-putation, 100:1-40 and 41-77, Sept. 1992
-
(1992)
Information and Com-putation
, vol.100
, Issue.1-40
, pp. 41-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
27
-
-
0018048246
-
Using encryp-tion for authentication in large networks of computers
-
Dec
-
R. M. Needham and M. D. Schroeder. Using encryp-tion for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, Dec. 1978
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
28
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Secu-rity, 6(1-2), 1998
-
(1998)
Journal of Computer Secu-rity
, vol.6
, Issue.1-2
-
-
Paulson, L.C.1
-
29
-
-
84940119523
-
-
Sun Microsystems Inc RMI enhancements. Web pages at
-
Sun Microsystems, Inc. RMI enhancements. Web pages at http://java.sun.com/products/jdk/1.2/docs/guide/rmi/, 1997
-
(1997)
-
-
-
31
-
-
0029697576
-
Secure network objects
-
May
-
L. van Doorn, M. Abadi, M. Burrows, and E. Wobber. Secure network objects. In Proceedings 1996 IEEE Symposium on Security and Privacy, pages 211-221, May 1996
-
(1996)
Proceedings 1996 IEEE Symposium on Security and Privacy
, pp. 211-221
-
-
Van Doorn, L.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
32
-
-
0001259536
-
A distributed object model for the Java system
-
Fall
-
A. Wollrath, R. Riggs, and J. Waldo. A distributed object model for the Java system. Computing Systems, 9(4):265-290, Fall 1996
-
(1996)
Computing Systems
, vol.9
, Issue.4
, pp. 265-290
-
-
Wollrath, A.1
Riggs, R.2
Waldo, J.3
|