-
3
-
-
0003761061
-
-
TechnicaJ Report 414, University of Cambridge Computer Laboratory, January 1997. Extended version of both [4] and [5]. A revised version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998, and an abridged version will appear in Information and Computation
-
Martin Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The spi calculus. TechnicaJ Report 414, University of Cambridge Computer Laboratory, January 1997. Extended version of both [4] and [5]. A revised version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998, and an abridged version will appear in Information and Computation.
-
A Calculus for Cryptographic Protocols: The Spi Calculus
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
84957872542
-
Reasoning about cryptographic protocols in the spi calculus
-
volume 1243 of Lecture Notes in Computer Science, Springer-Verlag, July
-
Martin Abadi and Andrew D. Gordon. Reasoning about cryptographic protocols in the spi calculus. In Proceedings of the 8th International Conference on Concurrency Theory, volume 1243 of Lecture Notes in Computer Science, pages 59-73. Springer-Verlag, July 1997.
-
(1997)
Proceedings of the 8Th International Conference on Concurrency Theory
, pp. 59-73
-
-
Abadi, M.1
Gordon, A.D.2
-
7
-
-
0022015288
-
Birrell. Secure communication using remote procedure calls
-
Andrew D. Birrell. Secure communication using remote procedure calls. ACM Transactions on Computer Systems, 3(1):1-14, February 1985.
-
(1985)
ACM Transactions on Computer Systems
, vol.3
, Issue.1
, pp. 1-14
-
-
Andrew, D.1
-
8
-
-
0000036723
-
Testing equivalence for mobile processes
-
Michele Boreale and Rocco De Nicola. Testing equivalence for mobile processes. Information and Computation, 120(2):279-303, August 1995.
-
(1995)
Information and Computation
, vol.120
, Issue.2
, pp. 279-303
-
-
Boreale, M.1
Nicola, R.D.2
-
9
-
-
84983017718
-
-
Obras completas 1923-1972, pages 499-507. Emece Editores, Buenos Aires, 1974. Titled "Death and the compass" in English translations
-
Jorge Luis Borges. La muerte y la briijula. In Obras completas 1923-1972, pages 499-507. Emece Editores, Buenos Aires, 1974. Titled "Death and the compass" in English translations.
-
La Muerte Y La Briijula
-
-
Borges, J.L.1
-
12
-
-
0037974167
-
Java security: Web browsers and beyond
-
Dorothy E. Denning and Peter J. Denning, editors
-
Drew Dean, Edwcird W. Felten, Dan S. Wallach, and Dirk Balfanz. Java security: Web browsers and beyond. In Dorothy E. Denning and Peter J. Denning, editors, Internet besieged: countering cyberspace scofflaws, pages 241-269. ACM Press, 1998.
-
(1998)
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 241-269
-
-
Dean, D.1
Felten, E.W.2
Wallach, D.S.3
Balfanz, D.4
-
14
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Whitfield Diflie, Paul C. van Oorschot, and Michael J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2:107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diflie, W.1
Oorschot, P.C.V.2
Wiener, M.J.3
-
16
-
-
0346246659
-
A type system for object initialization in the Java bytecode language
-
Stephen N. Freund and John C. Mitchell. A type system for object initialization in the Java bytecode language. In OOPSLA '98 Conference Proceedings: Object-Oriented Programming, Systems, Languages, and Applications, pages 310-327, 1998.
-
(1998)
OOPSLA '98 Conference Proceedings: Object-Oriented Programming, Systems, Languages, and Applications
, pp. 310-327
-
-
Freund, S.N.1
Mitchell, J.C.2
-
19
-
-
0015482118
-
Proof of correctness of data representations
-
C. A. R. Hoare. Proof of correctness of data representations. Acta Informatica, 1:271-281, 1972.
-
(1972)
Acta Informatica
, vol.1
, pp. 271-281
-
-
Hoare, C.A.R.1
-
20
-
-
0017971337
-
A language extension for expressing constraints on data access
-
Anita K. Jones and Barbara H. Liskov. A language extension for expressing constraints on data access. Communications of the ACM, 21(5):358-367, May 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.5
, pp. 358-367
-
-
Jones, A.K.1
Liskov, B.H.2
-
21
-
-
0024304753
-
A simple approach to specifying concurrent systems
-
Leslie Lamport. A simple approach to specifying concurrent systems. Com.m.unications of the ACM, 32(l):32-45, January 1989.
-
(1989)
Com.M.Unications of the ACM
, vol.32
, Issue.1
, pp. 32-45
-
-
Lamport, L.1
-
23
-
-
0021100078
-
Hints for computer system design
-
October 1983. Proceedings of the Ninth ACM Symposium on Operating System Principles
-
Butler W. Lampson. Hints for computer system design. Operating Systems Review, 17(5):33-48, October 1983. Proceedings of the Ninth ACM Symposium on Operating System Principles.
-
Operating Systems Review
, vol.17
, Issue.5
, pp. 33-48
-
-
Lampson, B.W.1
-
24
-
-
0016952844
-
Reflections on an operating system design
-
Butler W. Lampson and Howard E. Sturgis. Reflections on an operating system design. Communications of the ACM, 19(5):251-265, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 251-265
-
-
Lampson, B.W.1
Sturgis, H.E.2
-
26
-
-
18944378106
-
The Java Virtual Machine Specification
-
Tim Lindholm and Frank Yellin. The Java Virtual Machine Specification. Addison-Wesley, 1996.
-
(1996)
Addison-Wesley
-
-
Lindholm, T.1
Yellin, F.2
-
27
-
-
0006133752
-
Logical full abstraction and PCF
-
Jonathan Ginzburg, Zurab Khasidashvili, Carl Vogel, Jean-Jacques Levy, and Enric Vallduvi, editors, CSLI Pubhcations and FoLLI
-
John Longley and Gordon Plotkin. Logical full abstraction and PCF. In Jonathan Ginzburg, Zurab Khasidashvili, Carl Vogel, Jean-Jacques Levy, and Enric Vallduvi, editors, The Tbilisi Symposium on Logic, Language and Computation: Selected Papers, pages 333-352. CSLI Pubhcations and FoLLI, 1998.
-
(1998)
The Tbilisi Symposium on Logic, Language and Computation: Selected Papers
, pp. 333-352
-
-
Longley, J.1
Plotkin, G.2
-
28
-
-
0002426876
-
A general theory of composition for a class of "possibilistic" properties
-
John McLean. A general theory of composition for a class of "possibilistic" properties. IEEE Transactions on Software Engineering, 22(l):53-66, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-66
-
-
McLean, J.1
-
30
-
-
0001862336
-
Fully abstract models of typed A-calculi
-
Robin Milner. Fully abstract models of typed A-calculi. Theoretical Computer Science, 4:1-22, 1977.
-
(1977)
Theoretical Computer Science
, vol.4
, pp. 1-22
-
-
Milner, R.1
-
33
-
-
0000511698
-
The polyadic 7r-calculus: A tutorial
-
Bauer, Brauer, and Schwichtenberg, editors,. Springer-Verlag
-
Robin Milner. The polyadic 7r-calculus: a tutorial. In Bauer, Brauer, and Schwichtenberg, editors, Logic and Algebra of Specification. Springer-Verlag, 1993.
-
(1993)
Logic and Algebra of Specification
-
-
Milner, R.1
-
34
-
-
44049114041
-
A calculus of mobile processes, parts I and II
-
Robin Milner, Joachim Parrow, and David Walker. A calculus of mobile processes, parts I and II. Information and Computation, 100:1-40 and 41-77, September 1992.
-
(1992)
Information and Computation
, pp. 41-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
35
-
-
0027684079
-
Mitchell. On abstraction and the expressive power of programming languages
-
John C. Mitchell. On abstraction and the expressive power of programming languages. Science of Computer Programming, 21(2):141-163, October 1993.
-
(1993)
Science of Computer Programming
, vol.21
, Issue.2
, pp. 141-163
-
-
John, C.1
-
36
-
-
0015561577
-
Jr. Protection in programming languages
-
James H. Morris, Jr. Protection in programming languages. Communications of the ACM, 16(1):15-21, January 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.1
, pp. 15-21
-
-
Morris, J.H.1
-
37
-
-
0031679751
-
Prom System F to Typed Assembly Language
-
Greg Morrisett, David Walker, Karl Crary, and Neal Glew. Prom System F to Typed Assembly Language. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages, pages 85-97, 1998.
-
(1998)
Proceedings of the 25Th ACM Symposium on Principles of Programming Languages
, pp. 85-97
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
40
-
-
0000230630
-
LCF considered as a programming language
-
Gordon Plotkin. LCF considered as a programming language. Theoretical Computer Science, 5:223-256, 1977.
-
(1977)
Theoretical Computer Science
, vol.5
, pp. 223-256
-
-
Plotkin, G.1
-
42
-
-
84971179364
-
Fully abstract translations between functional languages
-
Jon G. Riecke. Fully abstract translations between functional languages. Mathematical Structures in Computer Science, 3(4):387-415, December 1993.
-
(1993)
Mathematical Structures in Computer Science
, vol.3
, Issue.4
, pp. 387-415
-
-
Riecke, J.G.1
-
47
-
-
0029697576
-
Secure network objects
-
Leendert van Doom, Martin Abadi, Mike Burrows, and Edward Webber. Secure network objects. In Proceedings 1996 IEEE Symposium on Security and Privacy, pages 211-221, May 1996.
-
(1996)
Proceedings 1996 IEEE Symposium on Security and Privacy
, pp. 211-221
-
-
Doom, L.V.1
Abadi, M.2
Burrows, M.3
Webber, E.4
-
49
-
-
0028380781
-
Authentication in the Taos operating system
-
Edward Wobber, Martin Abadi, Michael Burrows, and Butler Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(l):3-32, February 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
50
-
-
0001259536
-
A distributed object model for the Java system
-
Ann Wollrath, Roger Riggs, and Jim Waldo. A distributed object model for the Java system. Computing Systems, 9(4):265-290, Fall 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.4
, pp. 265-290
-
-
Wollrath, A.1
Riggs, R.2
Waldo, J.3
|