-
6
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
January
-
M. Abadi and A. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, January 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
7
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
Also appeared as SRC Research Report
-
M. Abadi, B. Lampson, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst., 10(4):265-310, 1992. Also appeared as SRC Research Report 83.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
Abadi, M.1
Lampson, B.2
Burrows, M.3
Wobber, E.4
-
8
-
-
0028380781
-
Authentication in the Taos operating system
-
Also appeared as SRC Research Report
-
M. Abadi, E. Wobber, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, 1994. Also appeared as SRC Research Report 117.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Abadi, M.1
Wobber, E.2
Burrows, M.3
Lampson, B.4
-
10
-
-
84982899264
-
The role of trust management in distributed systems security
-
J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Springer-Verlag
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The role of trust management in distributed systems security. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects, volume 1603 of Lecture Notes in Computer Science. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1603
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
13
-
-
16244416053
-
A calculus of secure mobile computations
-
Internet Programming Languages, Springer-Verlag
-
G. Castagna and J. Vitek. A calculus of secure mobile computations. In Internet Programming Languages, Lecture Notes in Computer Science. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
-
-
Castagna, G.1
Vitek, J.2
-
16
-
-
0003546303
-
-
Internet Draft draft-ietf-spki-cert-structure-05.txt
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. Simple public key certificate. Internet Draft draft-ietf-spki-cert-structure-05.txt, 1998.
-
(1998)
Simple Public Key Certificate
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
19
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
ACM, editor, New York, NY, USA, ACM Press
-
N. Heintze and J. G. Riecke. The SLam calculus: programming with secrecy and integrity. In ACM, editor, Conference record of POPL '98: the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, California, 19-21 January 1998, pages 365-377, New York, NY, USA, 1998. ACM Press.
-
(1998)
Conference Record of POPL '98: The 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, California, 19-21 January 1998
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
20
-
-
84983001862
-
Type-safe execution of mobile agents in anonymous networks
-
Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Springer-Verlag
-
M. Hennessy and J. Riely. Type-safe execution of mobile agents in anonymous networks. In Secure Internet Programming: Security Issues for Distributed and Mobile Objects, Lecture Notes in Computer Science. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
-
-
Hennessy, M.1
Riely, J.2
-
21
-
-
35248840989
-
Handling encryption in an analysis for secure information flow
-
P. Laud. Handling encryption in an analysis for secure information flow. In European Symposium on Programming, pages 159-173, 2003.
-
(2003)
European Symposium on Programming
, pp. 159-173
-
-
Laud, P.1
-
23
-
-
0001425265
-
From System F to typed assembly language
-
G. Morrisett, D. Walker, K. Crary, and N. Glew. From System F to typed assembly language. ACM TOPLAS, 21(3):528-569, 1999.
-
(1999)
ACM TOPLAS
, vol.21
, Issue.3
, pp. 528-569
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
33
-
-
0019658399
-
Access flow: A protection model which integrates access control and information flow
-
A. Stoughton. Access flow: A protection model which integrates access control and information flow. IEEE Symposium on Security and Privacy, pages 9-18, 1981.
-
(1981)
IEEE Symposium on Security and Privacy
, pp. 9-18
-
-
Stoughton, A.1
|