-
1
-
-
84957668700
-
Secrecy by typing in security protocols
-
volume 1281 of Lecture Notes in Computer Science, Springer-Verlag
-
M. Abadi. Secrecy by typing in security protocols. In Theoretical Aspects of Computer Software, volume 1281 of Lecture Notes in Computer Science, pages 611{ 638. Springer-Verlag, 1997.
-
(1997)
Theoretical Aspects of Computer Software
, pp. 611-638
-
-
Abadi, M.1
-
3
-
-
0012625874
-
-
Manuscript, full version of this paper, on the Web at
-
M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Manuscript, full version of this paper, on the Web at http://pauillac.inria.fr/join, 1998.
-
(1998)
Secure Implementation of Channel Abstractions
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
4
-
-
0003761061
-
A calculus for cryptographic protocols: The spi calculus
-
Jan. Extended version of both [5] and [6]. A revised version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998, and an abridged version will appear in Information and Computation
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Technical Report 414, University of Cambridge Computer Laboratory, Jan. 1997. Extended version of both [5] and [6]. A revised version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998, and an abridged version will appear in Information and Computation.
-
(1997)
Technical Report 414, University of Cambridge Computer Laboratory
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
84957872542
-
Reasoning about cryptographic protocols in the spi calculus
-
A. Mazurkiewicz and J. Winkowski, editors, volume 1243 of Lecture Notes in Computer Science, Springer-Verlag, July
-
M. Abadi and A. D. Gordon. Reasoning about cryptographic protocols in the spi calculus. In A. Mazurkiewicz and J. Winkowski, editors, Proceedings of the 8th International Conference on Concurrency Theory, volume 1243 of Lecture Notes in Computer Science, pages 59{73. Springer-Verlag, July 1997.
-
(1997)
Proceedings of the 8th International Conference on Concurrency Theory
, pp. 59-73
-
-
Abadi, M.1
Gordon, A.D.2
-
7
-
-
0031332010
-
The AltaVista tunnel: Using the Internet to extend corporate networks
-
Oct. On the Web at
-
K. F. Alden and E. P. Wobber. The AltaVista tunnel: Using the Internet to extend corporate networks. Digital Technical Journal, 9(2):5{15, Oct. 1997. On the Web at http://www.digital.com/info/DTJQ01/DTJQ01HM.HTM.
-
(1997)
Digital Technical Journal
, vol.9
, Issue.2
, pp. 5-15
-
-
Alden, K.F.1
Wobber, E.P.2
-
9
-
-
0022015288
-
Secure communication using remote procedure calls
-
Feb
-
A. D. Birrell. Secure communication using remote procedure calls. ACM Transactions on Computer Systems, 3(1):1{14, Feb. 1985.
-
(1985)
ACM Transactions on Computer Systems
, vol.3
, Issue.1
, pp. 1-14
-
-
Birrell, A.D.1
-
10
-
-
84947814301
-
Fair testing
-
I. Lee and S. A. Smolka, editors, volume 962 of Lecture Notes in Computer Science, Springer-Verlag
-
E. Brinksma, A. Rensink, and W. Vogler. Fair testing. In I. Lee and S. A. Smolka, editors, Proceedings of the 6th International Conference on Concurrency Theory, volume 962 of Lecture Notes in Computer Science, pages 313{327. Springer-Verlag, 1995.
-
(1995)
Proceedings of the 6th International Conference on Concurrency Theory
, pp. 313-327
-
-
Brinksma, E.1
Rensink, A.2
Vogler, W.3
-
13
-
-
85043700514
-
Proving trust in systems of second-order processes: Preliminary results
-
M. Dam. Proving trust in systems of second-order processes: Preliminary results. Draft, 1997.
-
(1997)
Draft
-
-
Dam, M.1
-
15
-
-
0029703268
-
The reflexive chemical abstract machine and the join-calculus
-
ACM, Jan
-
C. Fournet and G. Gonthier. The reflexive chemical abstract machine and the join-calculus. In Proceedings of POPL '96, pages 372{385. ACM, Jan. 1996.
-
(1996)
Proceedings of POPL '96
, pp. 372-385
-
-
Fournet, C.1
Gonthier, G.2
-
16
-
-
84955565479
-
A calculus of mobile agents
-
U. Montanari and V. Sassone, editors, volume 1119 of Lecture Notes in Computer Science. Springer- Verlag, Aug
-
C. Fournet, G. Gonthier, J.-J. Levy, L. Maranget, and D. Remy. A calculus of mobile agents. In U. Montanari and V. Sassone, editors, Proceedings of the 7th International Conference on Concurrency Theory, volume 1119 of Lecture Notes in Computer Science. Springer- Verlag, Aug. 1996.
-
(1996)
Proceedings of the 7th International Conference on Concurrency Theory
-
-
Fournet, C.1
Gonthier, G.2
Levy, J.-J.3
Maranget, L.4
Remy, D.5
-
17
-
-
84957891695
-
Implicit typing a la ML for the join-calculus
-
A. Mazurkiewicz and J. Winkowski, editors, volume 1243 of Lecture Notes in Computer Science, Springer-Verlag, July
-
C. Fournet, C. Laneve, L. Maranget, and D. Remy. Implicit typing a la ML for the join-calculus. In A. Mazurkiewicz and J. Winkowski, editors, Proceedings of the 8th International Conference on Concurrency Theory, volume 1243 of Lecture Notes in Computer Science, pages 196{212. Springer-Verlag, July 1997.
-
(1997)
Proceedings of the 8th International Conference on Concurrency Theory
, pp. 196-212
-
-
Fournet, C.1
Laneve, C.2
Maranget, L.3
Remy, D.4
-
19
-
-
0015482118
-
Proof of correctness of data representations
-
C. A. R. Hoare. Proof of correctness of data representations. Acta Inf., 1:271{281, 1972.
-
(1972)
Acta Inf.
, vol.1
, pp. 271-281
-
-
Hoare, C.A.R.1
-
20
-
-
0029404929
-
On reduction-based process semantics
-
K. Honda and N. Yoshida. On reduction-based process semantics. Theoretical Comput. Sci., 151:437{486, 1995.
-
(1995)
Theoretical Comput. Sci.
, vol.151
, pp. 437-486
-
-
Honda, K.1
Yoshida, N.2
-
21
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
Nov
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265{310, Nov. 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
23
-
-
0028468205
-
Generic interface to security services
-
July
-
J. Linn. Generic interface to security services. Computer Communications, 17(7):476{482, July 1994.
-
(1994)
Computer Communications
, vol.17
, Issue.7
, pp. 476-482
-
-
Linn, J.1
-
24
-
-
0012735033
-
A socket-based key management API (and surrounding infrastructure)
-
On the Web at
-
D. L. McDonald, B. G. Phan, and R. J. Atkinson. A socket-based key management API (and surrounding infrastructure). In Proceedings of INET96, 1996. On the Web at http://www.isoc.org/isoc/whatis/conferences/inet/96/proceedings/.
-
(1996)
Proceedings of INET96
-
-
McDonald, D.L.1
Phan, B.G.2
Atkinson, R.J.3
-
26
-
-
85043701681
-
-
Microsoft. Web pages at
-
Microsoft. CryptoAPI. Web pages at http://www.microsoft.com/security/tech/.
-
CryptoAPI
-
-
-
29
-
-
0000511698
-
The polyadic π-calculus: A tutorial
-
Bauer, Brauer, and Schwichtenberg, editors, Springer-Verlag
-
R. Milner. The polyadic π-calculus: A tutorial. In Bauer, Brauer, and Schwichtenberg, editors, Logic and Algebra of Specification. Springer-Verlag, 1993.
-
(1993)
Logic and Algebra of Specification
-
-
Milner, R.1
-
30
-
-
44049113210
-
A calculus of mobile processes, parts I and II
-
and 41{77, Sept
-
R. Milner, J. Parrow, and D.Walker. A calculus of mobile processes, parts I and II. Information and Computation, 100:1{40 and 41{77, Sept. 1992.
-
(1992)
Information and Computation
, vol.100
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
31
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993{999, Dec. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
32
-
-
84955567248
-
The problem of weak bisimulation up to
-
W. R. Cleaveland, editor, volume 630 of Lecture Notes in Computer Science, Springer-Verlag
-
D. Sangiorgi and R. Milner. The problem of "weak bisimulation up to". In W. R. Cleaveland, editor, Proceedings of CONCUR'92, volume 630 of Lecture Notes in Computer Science, pages 32{46. Springer-Verlag, 1992.
-
(1992)
Proceedings of CONCUR'92
, pp. 32-46
-
-
Sangiorgi, D.1
Milner, R.2
-
33
-
-
0012731605
-
-
Sun Microsystems, Inc. Web pages at
-
Sun Microsystems, Inc. RMI enhancements. Web pages at http://java.sun.com/products/jdk/1.2/docs/guide/rmi/index.html 1997.
-
(1997)
RMI Enhancements
-
-
-
34
-
-
0029697576
-
Secure network objects
-
May
-
L. van Doorn, M. Abadi, M. Burrows, and E. Wobber. Secure network objects. In Proceedings 1996 IEEE Symposium on Security and Privacy, pages 211{221, May 1996.
-
(1996)
Proceedings 1996 IEEE Symposium on Security and Privacy
, pp. 211-221
-
-
Van Doorn, L.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
35
-
-
0001259536
-
A distributed object model for the Java system
-
Fall
-
A. Wollrath, R. Riggs, and J. Waldo. A distributed object model for the Java system. Computing Systems, 9(4):265{290, Fall 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.4
, pp. 265-290
-
-
Wollrath, A.1
Riggs, R.2
Waldo, J.3
|