Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Martín Abadi
@article{DBLP:journals/lmcs/AbadiP23, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {Smart Choices and the Selection Monad}, journal = {Log. Methods Comput. Sci.}, volume = {19}, number = {2}, year = {2023}, url = {https://doi.org/10.46298/lmcs-19(2:3)2023}, doi = {10.46298/LMCS-19(2:3)2023}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lmcs/AbadiP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/GogIA21, author = {Ionel Gog and Michael Isard and Mart{\'{\i}}n Abadi}, editor = {Carlo Curino and Georgia Koutrika and Ravi Netravali}, title = {Falkirk Wheel: Rollback Recovery for Dataflow Systems}, booktitle = {SoCC '21: {ACM} Symposium on Cloud Computing, Seattle, WA, USA, November 1 - 4, 2021}, pages = {373--387}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3472883.3487011}, doi = {10.1145/3472883.3487011}, timestamp = {Sun, 31 Oct 2021 09:45:45 +0100}, biburl = {https://dblp.org/rec/conf/cloud/GogIA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/AbadiP21, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {Smart Choices and the Selection Monad}, booktitle = {36th Annual {ACM/IEEE} Symposium on Logic in Computer Science, {LICS} 2021, Rome, Italy, June 29 - July 2, 2021}, pages = {1--14}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/LICS52264.2021.9470641}, doi = {10.1109/LICS52264.2021.9470641}, timestamp = {Fri, 09 Jul 2021 14:04:16 +0200}, biburl = {https://dblp.org/rec/conf/lics/AbadiP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/AbadiP20, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {A simple differentiable programming language}, journal = {Proc. {ACM} Program. Lang.}, volume = {4}, number = {{POPL}}, pages = {38:1--38:28}, year = {2020}, url = {https://doi.org/10.1145/3371106}, doi = {10.1145/3371106}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/AbadiP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-08926, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {Smart Choices and the Selection Monad}, journal = {CoRR}, volume = {abs/2007.08926}, year = {2020}, url = {https://arxiv.org/abs/2007.08926}, eprinttype = {arXiv}, eprint = {2007.08926}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-08926.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-04523, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {A Simple Differentiable Programming Language}, journal = {CoRR}, volume = {abs/1911.04523}, year = {2019}, url = {http://arxiv.org/abs/1911.04523}, eprinttype = {arXiv}, eprint = {1911.04523}, timestamp = {Mon, 02 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-04523.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/AbadiBF18, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet and C{\'{e}}dric Fournet}, title = {The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication}, journal = {J. {ACM}}, volume = {65}, number = {1}, pages = {1:1--1:41}, year = {2018}, url = {https://doi.org/10.1145/3127586}, doi = {10.1145/3127586}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/AbadiBF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/YuABBBDDGHHIKMM18, author = {Yuan Yu and Mart{\'{\i}}n Abadi and Paul Barham and Eugene Brevdo and Mike Burrows and Andy Davis and Jeff Dean and Sanjay Ghemawat and Tim Harley and Peter Hawkins and Michael Isard and Manjunath Kudlur and Rajat Monga and Derek Gordon Murray and Xiaoqiang Zheng}, editor = {Rui Oliveira and Pascal Felber and Y. Charlie Hu}, title = {Dynamic control flow in large-scale machine learning}, booktitle = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, April 23-26, 2018}, pages = {18:1--18:15}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3190508.3190551}, doi = {10.1145/3190508.3190551}, timestamp = {Thu, 23 Jun 2022 19:57:07 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/YuABBBDDGHHIKMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-01772, author = {Yuan Yu and Mart{\'{\i}}n Abadi and Paul Barham and Eugene Brevdo and Mike Burrows and Andy Davis and Jeff Dean and Sanjay Ghemawat and Tim Harley and Peter Hawkins and Michael Isard and Manjunath Kudlur and Rajat Monga and Derek Gordon Murray and Xiaoqiang Zheng}, title = {Dynamic Control Flow in Large-Scale Machine Learning}, journal = {CoRR}, volume = {abs/1805.01772}, year = {2018}, url = {http://arxiv.org/abs/1805.01772}, eprinttype = {arXiv}, eprint = {1805.01772}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-01772.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AbadiEGMMPTZ17, author = {Mart{\'{\i}}n Abadi and {\'{U}}lfar Erlingsson and Ian J. Goodfellow and H. Brendan McMahan and Ilya Mironov and Nicolas Papernot and Kunal Talwar and Li Zhang}, title = {On the Protection of Private Information in Machine Learning Systems: Two Recent Approches}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.10}, doi = {10.1109/CSF.2017.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AbadiEGMMPTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/NeelakantanLAMA17, author = {Arvind Neelakantan and Quoc V. Le and Mart{\'{\i}}n Abadi and Andrew McCallum and Dario Amodei}, title = {Learning a Natural Language Interface with Neural Programmer}, booktitle = {5th International Conference on Learning Representations, {ICLR} 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings}, publisher = {OpenReview.net}, year = {2017}, url = {https://openreview.net/forum?id=ry2YOrcge}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/NeelakantanLAMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/PapernotAEGT17, author = {Nicolas Papernot and Mart{\'{\i}}n Abadi and {\'{U}}lfar Erlingsson and Ian J. Goodfellow and Kunal Talwar}, title = {Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data}, booktitle = {5th International Conference on Learning Representations, {ICLR} 2017, Toulon, France, April 24-26, 2017, Conference Track Proceedings}, publisher = {OpenReview.net}, year = {2017}, url = {https://openreview.net/forum?id=HkwoSDPgg}, timestamp = {Thu, 04 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/PapernotAEGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/AbadiIM17, author = {Mart{\'{\i}}n Abadi and Michael Isard and Derek Gordon Murray}, editor = {Tatiana Shpeisman and Justin Gottschlich}, title = {A computational model for TensorFlow: an introduction}, booktitle = {Proceedings of the 1st {ACM} {SIGPLAN} International Workshop on Machine Learning and Programming Languages, MAPL@PLDI 2017, Barcelona, Spain, June 18, 2017}, pages = {1--7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3088525.3088527}, doi = {10.1145/3088525.3088527}, timestamp = {Tue, 06 Nov 2018 16:59:30 +0100}, biburl = {https://dblp.org/rec/conf/pldi/AbadiIM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-08022, author = {Mart{\'{\i}}n Abadi and {\'{U}}lfar Erlingsson and Ian J. Goodfellow and H. Brendan McMahan and Ilya Mironov and Nicolas Papernot and Kunal Talwar and Li Zhang}, title = {On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches}, journal = {CoRR}, volume = {abs/1708.08022}, year = {2017}, url = {http://arxiv.org/abs/1708.08022}, eprinttype = {arXiv}, eprint = {1708.08022}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-08022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-09665, author = {Tom B. Brown and Dandelion Man{\'{e}} and Aurko Roy and Mart{\'{\i}}n Abadi and Justin Gilmer}, title = {Adversarial Patch}, journal = {CoRR}, volume = {abs/1712.09665}, year = {2017}, url = {http://arxiv.org/abs/1712.09665}, eprinttype = {arXiv}, eprint = {1712.09665}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-09665.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/MurrayMIIBA16, author = {Derek Gordon Murray and Frank McSherry and Michael Isard and Rebecca Isaacs and Paul Barham and Mart{\'{\i}}n Abadi}, title = {Incremental, iterative data processing with timely dataflow}, journal = {Commun. {ACM}}, volume = {59}, number = {10}, pages = {75--83}, year = {2016}, url = {https://doi.org/10.1145/2983551}, doi = {10.1145/2983551}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/MurrayMIIBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbadiCGMMT016, author = {Mart{\'{\i}}n Abadi and Andy Chu and Ian J. Goodfellow and H. Brendan McMahan and Ilya Mironov and Kunal Talwar and Li Zhang}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Deep Learning with Differential Privacy}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {308--318}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978318}, doi = {10.1145/2976749.2978318}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AbadiCGMMT016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfp/Abadi16, author = {Mart{\'{\i}}n Abadi}, editor = {Jacques Garrigue and Gabriele Keller and Eijiro Sumii}, title = {TensorFlow: learning functions at scale}, booktitle = {Proceedings of the 21st {ACM} {SIGPLAN} International Conference on Functional Programming, {ICFP} 2016, Nara, Japan, September 18-22, 2016}, pages = {1}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2951913.2976746}, doi = {10.1145/2951913.2976746}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfp/Abadi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/AbadiBCCDDDGIIK16, author = {Mart{\'{\i}}n Abadi and Paul Barham and Jianmin Chen and Zhifeng Chen and Andy Davis and Jeffrey Dean and Matthieu Devin and Sanjay Ghemawat and Geoffrey Irving and Michael Isard and Manjunath Kudlur and Josh Levenberg and Rajat Monga and Sherry Moore and Derek Gordon Murray and Benoit Steiner and Paul A. Tucker and Vijay Vasudevan and Pete Warden and Martin Wicke and Yuan Yu and Xiaoqiang Zheng}, editor = {Kimberly Keeton and Timothy Roscoe}, title = {TensorFlow: {A} System for Large-Scale Machine Learning}, booktitle = {12th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2016, Savannah, GA, USA, November 2-4, 2016}, pages = {265--283}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/osdi16/technical-sessions/presentation/abadi}, timestamp = {Tue, 02 Feb 2021 08:06:02 +0100}, biburl = {https://dblp.org/rec/conf/osdi/AbadiBCCDDDGIIK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AbadiABBCCCDDDG16, author = {Mart{\'{\i}}n Abadi and Ashish Agarwal and Paul Barham and Eugene Brevdo and Zhifeng Chen and Craig Citro and Gregory S. Corrado and Andy Davis and Jeffrey Dean and Matthieu Devin and Sanjay Ghemawat and Ian J. Goodfellow and Andrew Harp and Geoffrey Irving and Michael Isard and Yangqing Jia and Rafal J{\'{o}}zefowicz and Lukasz Kaiser and Manjunath Kudlur and Josh Levenberg and Dan Man{\'{e}} and Rajat Monga and Sherry Moore and Derek Gordon Murray and Chris Olah and Mike Schuster and Jonathon Shlens and Benoit Steiner and Ilya Sutskever and Kunal Talwar and Paul A. Tucker and Vincent Vanhoucke and Vijay Vasudevan and Fernanda B. Vi{\'{e}}gas and Oriol Vinyals and Pete Warden and Martin Wattenberg and Martin Wicke and Yuan Yu and Xiaoqiang Zheng}, title = {TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems}, journal = {CoRR}, volume = {abs/1603.04467}, year = {2016}, url = {http://arxiv.org/abs/1603.04467}, eprinttype = {arXiv}, eprint = {1603.04467}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AbadiABBCCCDDDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AbadiBCCDDDGIIK16, author = {Mart{\'{\i}}n Abadi and Paul Barham and Jianmin Chen and Zhifeng Chen and Andy Davis and Jeffrey Dean and Matthieu Devin and Sanjay Ghemawat and Geoffrey Irving and Michael Isard and Manjunath Kudlur and Josh Levenberg and Rajat Monga and Sherry Moore and Derek Gordon Murray and Benoit Steiner and Paul A. Tucker and Vijay Vasudevan and Pete Warden and Martin Wicke and Yuan Yu and Xiaoqiang Zhang}, title = {TensorFlow: {A} system for large-scale machine learning}, journal = {CoRR}, volume = {abs/1605.08695}, year = {2016}, url = {http://arxiv.org/abs/1605.08695}, eprinttype = {arXiv}, eprint = {1605.08695}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AbadiBCCDDDGIIK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AbadiCGMMTZ16, author = {Mart{\'{\i}}n Abadi and Andy Chu and Ian J. Goodfellow and H. Brendan McMahan and Ilya Mironov and Kunal Talwar and Li Zhang}, title = {Deep Learning with Differential Privacy}, journal = {CoRR}, volume = {abs/1607.00133}, year = {2016}, url = {http://arxiv.org/abs/1607.00133}, eprinttype = {arXiv}, eprint = {1607.00133}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AbadiCGMMTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AbadiBF16, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet and C{\'{e}}dric Fournet}, title = {The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication}, journal = {CoRR}, volume = {abs/1609.03003}, year = {2016}, url = {http://arxiv.org/abs/1609.03003}, eprinttype = {arXiv}, eprint = {1609.03003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AbadiBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PapernotAEGT16, author = {Nicolas Papernot and Mart{\'{\i}}n Abadi and {\'{U}}lfar Erlingsson and Ian J. Goodfellow and Kunal Talwar}, title = {Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data}, journal = {CoRR}, volume = {abs/1610.05755}, year = {2016}, url = {http://arxiv.org/abs/1610.05755}, eprinttype = {arXiv}, eprint = {1610.05755}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PapernotAEGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AbadiA16, author = {Mart{\'{\i}}n Abadi and David G. Andersen}, title = {Learning to Protect Communications with Adversarial Neural Cryptography}, journal = {CoRR}, volume = {abs/1610.06918}, year = {2016}, url = {http://arxiv.org/abs/1610.06918}, eprinttype = {arXiv}, eprint = {1610.06918}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AbadiA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NeelakantanLAMA16, author = {Arvind Neelakantan and Quoc V. Le and Mart{\'{\i}}n Abadi and Andrew McCallum and Dario Amodei}, title = {Learning a Natural Language Interface with Neural Programmer}, journal = {CoRR}, volume = {abs/1611.08945}, year = {2016}, url = {http://arxiv.org/abs/1611.08945}, eprinttype = {arXiv}, eprint = {1611.08945}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NeelakantanLAMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/AbadiBPSST15, author = {Mart{\'{\i}}n Abadi and Mike Burrows and Himabindu Pucha and Adam Sadovsky and Asim Shankar and Ankur Taly}, editor = {Chiara Bodei and Gian{-}Luigi Ferrari and Corrado Priami}, title = {Distributed Authorization with Distributed Grammars}, booktitle = {Programming Languages with Applications to Biology and Security - Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9465}, pages = {10--26}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25527-9\_3}, doi = {10.1007/978-3-319-25527-9\_3}, timestamp = {Fri, 23 Jun 2023 22:30:53 +0200}, biburl = {https://dblp.org/rec/conf/birthday/AbadiBPSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/Abadi15, author = {Mart{\'{\i}}n Abadi}, editor = {Stephan Kreutzer}, title = {The Prophecy of Timely Rollback (Invited Talk)}, booktitle = {24th {EACSL} Annual Conference on Computer Science Logic, {CSL} 2015, September 7-10, 2015, Berlin, Germany}, series = {LIPIcs}, volume = {41}, pages = {1--1}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2015}, url = {https://doi.org/10.4230/LIPIcs.CSL.2015.1}, doi = {10.4230/LIPICS.CSL.2015.1}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/csl/Abadi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/Abadi15, author = {Mart{\'{\i}}n Abadi}, editor = {Alexander Egyed and Ina Schaefer}, title = {The Prophecy of Undo}, booktitle = {Fundamental Approaches to Software Engineering - 18th International Conference, {FASE} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9033}, pages = {347--361}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46675-9\_23}, doi = {10.1007/978-3-662-46675-9\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fase/Abadi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/AbadiI15, author = {Mart{\'{\i}}n Abadi and Michael Isard}, editor = {Susanne Graf and Mahesh Viswanathan}, title = {Timely Dataflow: {A} Model}, booktitle = {Formal Techniques for Distributed Objects, Components, and Systems - 35th {IFIP} {WG} 6.1 International Conference, {FORTE} 2015, Held as Part of the 10th International Federated Conference on Distributed Computing Techniques, DisCoTec 2015, Grenoble, France, June 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9039}, pages = {131--145}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19195-9\_9}, doi = {10.1007/978-3-319-19195-9\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/forte/AbadiI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/AbadiMP15, author = {Mart{\'{\i}}n Abadi and Frank McSherry and Gordon D. Plotkin}, editor = {Andrew M. Pitts}, title = {Foundations of Differential Dataflow}, booktitle = {Foundations of Software Science and Computation Structures - 18th International Conference, FoSSaCS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9034}, pages = {71--83}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46678-0\_5}, doi = {10.1007/978-3-662-46678-0\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/AbadiMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfm/AbadiI15, author = {Mart{\'{\i}}n Abadi and Michael Isard}, editor = {Klaus Havelund and Gerard J. Holzmann and Rajeev Joshi}, title = {Timely Rollback: Specification and Verification}, booktitle = {{NASA} Formal Methods - 7th International Symposium, {NFM} 2015, Pasadena, CA, USA, April 27-29, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9058}, pages = {19--34}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17524-9\_3}, doi = {10.1007/978-3-319-17524-9\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/nfm/AbadiI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/AbadiI15, author = {Mart{\'{\i}}n Abadi and Michael Isard}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {On the Flow of Data, Information, and Time}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {73--92}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_5}, doi = {10.1007/978-3-662-46666-7\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/AbadiI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/IsardA15, author = {Michael Isard and Mart{\'{\i}}n Abadi}, title = {Falkirk Wheel: Rollback Recovery for Dataflow Systems}, journal = {CoRR}, volume = {abs/1503.08877}, year = {2015}, url = {http://arxiv.org/abs/1503.08877}, eprinttype = {arXiv}, eprint = {1503.08877}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/IsardA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbadiBMRS15, author = {Mart{\'{\i}}n Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev}, title = {Message-Locked Encryption for Lock-Dependent Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2015}, url = {http://eprint.iacr.org/2015/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbadiBMRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/AbadiPP14, author = {Mart{\'{\i}}n Abadi and J{\'{e}}r{\'{e}}my Planul and Gordon D. Plotkin}, editor = {Franck van Breugel and Elham Kashefi and Catuscia Palamidessi and Jan Rutten}, title = {Layout Randomization and Nondeterminism}, booktitle = {Horizons of the Mind. {A} Tribute to Prakash Panangaden - Essays Dedicated to Prakash Panangaden on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {8464}, pages = {1--39}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06880-0\_1}, doi = {10.1007/978-3-319-06880-0\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/AbadiPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/BiermanAT14, author = {Gavin M. Bierman and Mart{\'{\i}}n Abadi and Mads Torgersen}, editor = {Richard E. Jones}, title = {Understanding TypeScript}, booktitle = {{ECOOP} 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28 - August 1, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8586}, pages = {257--281}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44202-9\_11}, doi = {10.1007/978-3-662-44202-9\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/BiermanAT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Delignat-LavaudABMWXR14, author = {Antoine Delignat{-}Lavaud and Mart{\'{\i}}n Abadi and Andrew Birrell and Ilya Mironov and Ted Wobber and Yinglian Xie}, title = {Web {PKI:} Closing the Gap between Guidelines and Practices}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/web-pki-closing-gap-between-guidelines-and-practices}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Delignat-LavaudABMWXR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/post/2014, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8}, doi = {10.1007/978-3-642-54792-8}, isbn = {978-3-642-54791-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tgc/2013, editor = {Mart{\'{\i}}n Abadi and Alberto Lluch{-}Lafuente}, title = {Trustworthy Global Computing - 8th International Symposium, {TGC} 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8358}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05119-2}, doi = {10.1007/978-3-319-05119-2}, isbn = {978-3-319-05118-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tgc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeontjevaGXYA13, author = {Anna Leontjeva and Mois{\'{e}}s Goldszmidt and Yinglian Xie and Fang Yu and Mart{\'{\i}}n Abadi}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {Early security classification of skype users via machine learning}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {35--44}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517322}, doi = {10.1145/2517312.2517322}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeontjevaGXYA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangXYKAGM13, author = {Junxian Huang and Yinglian Xie and Fang Yu and Qifa Ke and Mart{\'{\i}}n Abadi and Eliot Gillum and Zhuoqing Morley Mao}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {SocialWatch: detection of online service abuse via large-scale social graphs}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {143--148}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484330}, doi = {10.1145/2484313.2484330}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuangXYKAGM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbadiBMRS13, author = {Mart{\'{\i}}n Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev}, editor = {Ran Canetti and Juan A. Garay}, title = {Message-Locked Encryption for Lock-Dependent Messages}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {374--391}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_21}, doi = {10.1007/978-3-642-40041-4\_21}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbadiBMRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/AbadiMMR13, author = {Mart{\'{\i}}n Abadi and Frank McSherry and Derek Gordon Murray and Thomas L. Rodeheffer}, editor = {Dirk Beyer and Michele Boreale}, title = {Formal Analysis of a Distributed Algorithm for Tracking Progress}, booktitle = {Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1 International Conference, {FMOODS/FORTE} 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7892}, pages = {5--19}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38592-6\_2}, doi = {10.1007/978-3-642-38592-6\_2}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/forte/AbadiMMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/AbadiBMWX13, author = {Mart{\'{\i}}n Abadi and Andrew Birrell and Ilya Mironov and Ted Wobber and Yinglian Xie}, editor = {Petros Maniatis}, title = {Global Authentication in an Untrustworthy World}, booktitle = {14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa Ana Pueblo, New Mexico, USA, May 13-15, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/hotos13/session/abadi}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/hotos/AbadiBMWX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/AbadiP13, author = {Mart{\'{\i}}n Abadi and J{\'{e}}r{\'{e}}my Planul}, editor = {David A. Basin and John C. Mitchell}, title = {On Layout Randomization for Arrays and Functions}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {167--185}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_9}, doi = {10.1007/978-3-642-36830-1\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/AbadiP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/MurrayMIIBA13, author = {Derek Gordon Murray and Frank McSherry and Rebecca Isaacs and Michael Isard and Paul Barham and Mart{\'{\i}}n Abadi}, editor = {Michael Kaminsky and Mike Dahlin}, title = {Naiad: a timely dataflow system}, booktitle = {{ACM} {SIGOPS} 24th Symposium on Operating Systems Principles, {SOSP} '13, Farmington, PA, USA, November 3-6, 2013}, pages = {439--455}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517349.2522738}, doi = {10.1145/2517349.2522738}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sosp/MurrayMIIBA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AbadiPP13, author = {Mart{\'{\i}}n Abadi and J{\'{e}}r{\'{e}}my Planul and Gordon D. Plotkin}, editor = {Dexter Kozen and Michael W. Mislove}, title = {Layout Randomization and Nondeterminism}, booktitle = {Proceedings of the Twenty-ninth Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2013, New Orleans, LA, USA, June 23-25, 2013}, series = {Electronic Notes in Theoretical Computer Science}, volume = {298}, pages = {29--50}, publisher = {Elsevier}, year = {2013}, url = {https://doi.org/10.1016/j.entcs.2013.09.006}, doi = {10.1016/J.ENTCS.2013.09.006}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/AbadiPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbadiP12, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {On Protection by Layout Randomization}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {2}, pages = {8:1--8:29}, year = {2012}, url = {https://doi.org/10.1145/2240276.2240279}, doi = {10.1145/2240276.2240279}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AbadiP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aplas/AustinFA12, author = {Thomas H. Austin and Cormac Flanagan and Mart{\'{\i}}n Abadi}, editor = {Ranjit Jhala and Atsushi Igarashi}, title = {A Functional View of Imperative Information Flow}, booktitle = {Programming Languages and Systems - 10th Asian Symposium, {APLAS} 2012, Kyoto, Japan, December 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7705}, pages = {34--49}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35182-2\_4}, doi = {10.1007/978-3-642-35182-2\_4}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/aplas/AustinFA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XieYKAGVWHM12, author = {Yinglian Xie and Fang Yu and Qifa Ke and Mart{\'{\i}}n Abadi and Eliot Gillum and Krish Vitaldevaria and Jason Walter and Junxian Huang and Zhuoqing Morley Mao}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Innocent by association: early recognition of legitimate users}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {353--364}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382235}, doi = {10.1145/2382196.2382235}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XieYKAGVWHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/Abadi12, author = {Mart{\'{\i}}n Abadi}, editor = {Dimitra Giannakopoulou and Dominique M{\'{e}}ry}, title = {Software Security: {A} Formal Perspective - (Notes for a Talk)}, booktitle = {{FM} 2012: Formal Methods - 18th International Symposium, Paris, France, August 27-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7436}, pages = {1--5}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32759-9\_1}, doi = {10.1007/978-3-642-32759-9\_1}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/Abadi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/YenXYYA12, author = {Ting{-}Fang Yen and Yinglian Xie and Fang Yu and Roger Peng Yu and Mart{\'{\i}}n Abadi}, title = {Host Fingerprinting and Tracking on the Web: Privacy and Security Implications}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/host-fingerprinting-and-tracking-web-privacy-and-security-implications}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/YenXYYA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/AbadiBHI11, author = {Mart{\'{\i}}n Abadi and Andrew Birrell and Tim Harris and Michael Isard}, title = {Semantics of transactional memory and automatic mutual exclusion}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {33}, number = {1}, pages = {2:1--2:50}, year = {2011}, url = {https://doi.org/10.1145/1889997.1889999}, doi = {10.1145/1889997.1889999}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/AbadiBHI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/HarrisAIM11, author = {Tim Harris and Mart{\'{\i}}n Abadi and Rebecca Isaacs and Ross McIlroy}, editor = {Cristina Videira Lopes and Kathleen Fisher}, title = {{AC:} composable asynchronous {IO} for native languages}, booktitle = {Proceedings of the 26th Annual {ACM} {SIGPLAN} Conference on Object-Oriented Programming, Systems, Languages, and Applications, {OOPSLA} 2011, part of {SPLASH} 2011, Portland, OR, USA, October 22 - 27, 2011}, pages = {903--920}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2048066.2048134}, doi = {10.1145/2048066.2048134}, timestamp = {Thu, 24 Jun 2021 16:19:30 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/HarrisAIM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/BirgissonMA11, author = {Arnar Birgisson and Frank McSherry and Mart{\'{\i}}n Abadi}, editor = {Aslan Askarov and Joshua D. Guttman}, title = {Differential privacy with information flow control}, booktitle = {Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011}, pages = {2}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2166956.2166958}, doi = {10.1145/2166956.2166958}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/BirgissonMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JohnYXKA11, author = {John P. John and Fang Yu and Yinglian Xie and Arvind Krishnamurthy and Mart{\'{\i}}n Abadi}, title = {deSEO: Combating Search-Result Poisoning}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/John.pdf}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JohnYXKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/JohnYXKA11, author = {John P. John and Fang Yu and Yinglian Xie and Arvind Krishnamurthy and Mart{\'{\i}}n Abadi}, editor = {Sadagopan Srinivasan and Krithi Ramamritham and Arun Kumar and M. P. Ravindra and Elisa Bertino and Ravi Kumar}, title = {Heat-seeking honeypots: design and experience}, booktitle = {Proceedings of the 20th International Conference on World Wide Web, {WWW} 2011, Hyderabad, India, March 28 - April 1, 2011}, pages = {207--216}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1963405.1963437}, doi = {10.1145/1963405.1963437}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/JohnYXKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1009-2405, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {A Model of Cooperative Threads}, journal = {Log. Methods Comput. Sci.}, volume = {6}, number = {4}, year = {2010}, url = {https://doi.org/10.2168/LMCS-6(4:2)2010}, doi = {10.2168/LMCS-6(4:2)2010}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1009-2405.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AbadiHM10, author = {Mart{\'{\i}}n Abadi and Tim Harris and Katherine F. Moore}, title = {A model of dynamic separation for transactional memory}, journal = {Inf. Comput.}, volume = {208}, number = {10}, pages = {1093--1117}, year = {2010}, url = {https://doi.org/10.1016/j.ic.2009.09.004}, doi = {10.1016/J.IC.2009.09.004}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/AbadiHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BaudetWA10, author = {Mathieu Baudet and Bogdan Warinschi and Mart{\'{\i}}n Abadi}, title = {Guessing attacks and the computational soundness of static equivalence}, journal = {J. Comput. Secur.}, volume = {18}, number = {5}, pages = {909--968}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0386}, doi = {10.3233/JCS-2009-0386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BaudetWA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AbadiP10, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {On Protection by Layout Randomization}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {337--351}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.30}, doi = {10.1109/CSF.2010.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AbadiP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotnets/PitsillidisXYAVS10, author = {Andreas Pitsillidis and Yinglian Xie and Fang Yu and Mart{\'{\i}}n Abadi and Geoffrey M. Voelker and Stefan Savage}, editor = {Geoffrey G. Xie and Robert Beverly and Robert Tappan Morris and Bruce Davie}, title = {How to tell an airport from a home: techniques and applications}, booktitle = {Proceedings of the 9th {ACM} Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, {USA} - October 20 - 21, 2010}, pages = {13}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1868447.1868460}, doi = {10.1145/1868447.1868460}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotnets/PitsillidisXYAVS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/Abadi10, author = {Mart{\'{\i}}n Abadi}, title = {The Fine Print of Security}, booktitle = {Proceedings of the 25th Annual {IEEE} Symposium on Logic in Computer Science, {LICS} 2010, 11-14 July 2010, Edinburgh, United Kingdom}, pages = {110}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/LICS.2010.9}, doi = {10.1109/LICS.2010.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/Abadi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JohnYXAK10, author = {John P. John and Fang Yu and Yinglian Xie and Mart{\'{\i}}n Abadi and Arvind Krishnamurthy}, title = {Searching the Searchers with SearchAudit}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {127--142}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/John.pdf}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JohnYXAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbadiBEL09, author = {Mart{\'{\i}}n Abadi and Mihai Budiu and {\'{U}}lfar Erlingsson and Jay Ligatti}, title = {Control-flow integrity principles, implementations, and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {4:1--4:40}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609960}, doi = {10.1145/1609956.1609960}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AbadiBEL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/AbadiBC09, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet and Hubert Comon{-}Lundh}, editor = {Ahmed Bouajjani and Oded Maler}, title = {Models and Proofs of Protocol Security: {A} Progress Report}, booktitle = {Computer Aided Verification, 21st International Conference, {CAV} 2009, Grenoble, France, June 26 - July 2, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5643}, pages = {35--49}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02658-4\_5}, doi = {10.1007/978-3-642-02658-4\_5}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/AbadiBC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cc/AbadiBHHI09, author = {Mart{\'{\i}}n Abadi and Andrew Birrell and Tim Harris and Johnson Hsieh and Michael Isard}, editor = {Oege de Moor and Michael I. Schwartzbach}, title = {Implementation and Use of Transactional Memory with Dynamic Separation}, booktitle = {Compiler Construction, 18th International Conference, {CC} 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2009, York, UK, March 22-29, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5501}, pages = {63--77}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00722-4\_6}, doi = {10.1007/978-3-642-00722-4\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/cc/AbadiBHHI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/AbadiH09, author = {Mart{\'{\i}}n Abadi and Tim Harris}, editor = {Mario Bravetti and Gianluigi Zavattaro}, title = {Perspectives on Transactional Memory}, booktitle = {{CONCUR} 2009 - Concurrency Theory, 20th International Conference, {CONCUR} 2009, Bologna, Italy, September 1-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5710}, pages = {1--14}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04081-8\_1}, doi = {10.1007/978-3-642-04081-8\_1}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/AbadiH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/Abadi09, author = {Mart{\'{\i}}n Abadi}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Logic in Access Control (Tutorial Notes)}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {145--165}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03829-7\_5}, doi = {10.1007/978-3-642-03829-7\_5}, timestamp = {Thu, 14 Oct 2021 10:12:35 +0200}, biburl = {https://dblp.org/rec/conf/fosad/Abadi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/ZhouMLA09, author = {Wenchao Zhou and Yun Mao and Boon Thau Loo and Mart{\'{\i}}n Abadi}, editor = {Yannis E. Ioannidis and Dik Lun Lee and Raymond T. Ng}, title = {Unified Declarative Platform for Secure Netwoked Information Systems}, booktitle = {Proceedings of the 25th International Conference on Data Engineering, {ICDE} 2009, March 29 2009 - April 2 2009, Shanghai, China}, pages = {150--161}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDE.2009.58}, doi = {10.1109/ICDE.2009.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/ZhouMLA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiP09, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, editor = {Zhong Shao and Benjamin C. Pierce}, title = {A model of cooperative threads}, booktitle = {Proceedings of the 36th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, {POPL} 2009, Savannah, GA, USA, January 21-23, 2009}, pages = {29--40}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1480881.1480887}, doi = {10.1145/1480881.1480887}, timestamp = {Fri, 25 Jun 2021 14:48:54 +0200}, biburl = {https://dblp.org/rec/conf/popl/AbadiP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppopp/AbadiHM09, author = {Mart{\'{\i}}n Abadi and Tim Harris and Mojtaba Mehrara}, editor = {Daniel A. Reed and Vivek Sarkar}, title = {Transactional memory with strong atomicity using off-the-shelf memory protection hardware}, booktitle = {Proceedings of the 14th {ACM} {SIGPLAN} Symposium on Principles and Practice of Parallel Programming, {PPOPP} 2009, Raleigh, NC, USA, February 14-18, 2009}, pages = {185--196}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1504176.1504203}, doi = {10.1145/1504176.1504203}, timestamp = {Sun, 12 Jun 2022 19:46:08 +0200}, biburl = {https://dblp.org/rec/conf/ppopp/AbadiHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/XieYA09, author = {Yinglian Xie and Fang Yu and Mart{\'{\i}}n Abadi}, editor = {Pablo Rodriguez and Ernst W. Biersack and Konstantina Papagiannaki and Luigi Rizzo}, title = {De-anonymizing the internet using unreliable IDs}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2009 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Barcelona, Spain, August 16-21, 2009}, pages = {75--86}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1592568.1592579}, doi = {10.1145/1592568.1592579}, timestamp = {Wed, 12 Jan 2022 13:48:25 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/XieYA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/AbadiW08, author = {Mart{\'{\i}}n Abadi and Bogdan Warinschi}, title = {Security analysis of cryptographically controlled access to {XML} documents}, journal = {J. {ACM}}, volume = {55}, number = {2}, pages = {6:1--6:29}, year = {2008}, url = {https://doi.org/10.1145/1346330.1346331}, doi = {10.1145/1346330.1346331}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/AbadiW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/BlanchetAF08, author = {Bruno Blanchet and Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet}, title = {Automated verification of selected equivalences for security protocols}, journal = {J. Log. Algebraic Methods Program.}, volume = {75}, number = {1}, pages = {3--51}, year = {2008}, url = {https://doi.org/10.1016/j.jlap.2007.06.002}, doi = {10.1016/J.JLAP.2007.06.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/BlanchetAF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Abadi08, author = {Mart{\'{\i}}n Abadi}, editor = {Pierpaolo Degano and Rocco De Nicola and Jos{\'{e}} Meseguer}, title = {Automatic Mutual Exclusion and Atomicity Checks}, booktitle = {Concurrency, Graphs and Models, Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {5065}, pages = {510--526}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68679-8\_32}, doi = {10.1007/978-3-540-68679-8\_32}, timestamp = {Thu, 21 Sep 2023 09:08:34 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Abadi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Abadi08, author = {Mart{\'{\i}}n Abadi}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {The good, the bad, and the provable}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455772}, doi = {10.1145/1455770.1455772}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Abadi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/AbadiHM08, author = {Mart{\'{\i}}n Abadi and Tim Harris and Katherine F. Moore}, editor = {Franck van Breugel and Marsha Chechik}, title = {A Model of Dynamic Separation for Transactional Memory}, booktitle = {{CONCUR} 2008 - Concurrency Theory, 19th International Conference, {CONCUR} 2008, Toronto, Canada, August 19-22, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5201}, pages = {6--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85361-9\_5}, doi = {10.1007/978-3-540-85361-9\_5}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/AbadiHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/deon/Abadi08, author = {Mart{\'{\i}}n Abadi}, editor = {Ron van der Meyden and Leendert W. N. van der Torre}, title = {Variations in Access Control Logic}, booktitle = {Deontic Logic in Computer Science, 9th International Conference, {DEON} 2008, Luxembourg, Luxembourg, July 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5076}, pages = {96--109}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70525-3\_9}, doi = {10.1007/978-3-540-70525-3\_9}, timestamp = {Thu, 14 Oct 2021 10:16:00 +0200}, biburl = {https://dblp.org/rec/conf/deon/Abadi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaffeisAFG08, author = {Sergio Maffeis and Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet and Andrew D. Gordon}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Code-Carrying Authorization}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {563--579}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_36}, doi = {10.1007/978-3-540-88313-5\_36}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MaffeisAFG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/GargA08, author = {Deepak Garg and Mart{\'{\i}}n Abadi}, editor = {Roberto M. Amadio}, title = {A Modal Deconstruction of Access Control Logics}, booktitle = {Foundations of Software Science and Computational Structures, 11th International Conference, {FOSSACS} 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2008, Budapest, Hungary, March 29 - April 6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4962}, pages = {216--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78499-9\_16}, doi = {10.1007/978-3-540-78499-9\_16}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/GargA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiBHI08, author = {Mart{\'{\i}}n Abadi and Andrew Birrell and Tim Harris and Michael Isard}, editor = {George C. Necula and Philip Wadler}, title = {Semantics of transactional memory and automatic mutual exclusion}, booktitle = {Proceedings of the 35th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, {POPL} 2008, San Francisco, California, USA, January 7-12, 2008}, pages = {63--74}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1328438.1328449}, doi = {10.1145/1328438.1328449}, timestamp = {Fri, 25 Jun 2021 14:48:54 +0200}, biburl = {https://dblp.org/rec/conf/popl/AbadiBHI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbadiR07, author = {Mart{\'{\i}}n Abadi and Phillip Rogaway}, title = {Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)}, journal = {J. Cryptol.}, volume = {20}, number = {3}, pages = {395}, year = {2007}, url = {https://doi.org/10.1007/s00145-007-0203-0}, doi = {10.1007/S00145-007-0203-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbadiR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbadiBF07, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet and C{\'{e}}dric Fournet}, title = {Just fast keying in the pi calculus}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {3}, pages = {9}, year = {2007}, url = {https://doi.org/10.1145/1266977.1266978}, doi = {10.1145/1266977.1266978}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AbadiBF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/AbadiP07, author = {Mart{\'{\i}}n Abadi and Jens Palsberg}, title = {Editorial}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {29}, number = {3}, pages = {14}, year = {2007}, url = {https://doi.org/10.1145/1232420.1232421}, doi = {10.1145/1232420.1232421}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/AbadiP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/WhiteheadJA07, author = {Nathan Whitehead and Jordan Johnson and Mart{\'{\i}}n Abadi}, editor = {Kedar S. Namjoshi and Tomohiro Yoneda and Teruo Higashino and Yoshio Okamura}, title = {Policies and Proofs for Code Auditing}, booktitle = {Automated Technology for Verification and Analysis, 5th International Symposium, {ATVA} 2007, Tokyo, Japan, October 22-25, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4762}, pages = {1--14}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75596-8\_1}, doi = {10.1007/978-3-540-75596-8\_1}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/atva/WhiteheadJA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/WobberYABS07, author = {Ted Wobber and Aydan R. Yumerefendi and Mart{\'{\i}}n Abadi and Andrew Birrell and Daniel R. Simon}, editor = {Paulo Ferreira and Thomas R. Gross and Lu{\'{\i}}s Veiga}, title = {Authorizing applications in singularity}, booktitle = {Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007}, pages = {355--368}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1272996.1273033}, doi = {10.1145/1272996.1273033}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/WobberYABS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/Abadi07, author = {Mart{\'{\i}}n Abadi}, editor = {Alessandro Aldini and Roberto Gorrieri}, title = {Security Protocols: Principles and Calculi}, booktitle = {Foundations of Security Analysis and Design IV, {FOSAD} 2006/2007 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {4677}, pages = {1--23}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74810-6\_1}, doi = {10.1007/978-3-540-74810-6\_1}, timestamp = {Thu, 14 Oct 2021 10:12:35 +0200}, biburl = {https://dblp.org/rec/conf/fosad/Abadi07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/AbadiL07, author = {Mart{\'{\i}}n Abadi and Boon Thau Loo}, editor = {Brian Cooper and Nick Feamster}, title = {Towards a Declarative Language and System for Secure Networking}, booktitle = {Third International Workshop on Networking Meets Databases, NetDB'07, Cambridge, MA, USA, April 10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/netdb-07/towards-declarative-language-and-system-secure-networking}, timestamp = {Tue, 02 Feb 2021 08:05:49 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/AbadiL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Abadi07, author = {Mart{\'{\i}}n Abadi}, editor = {Luca Cardelli and Marcelo Fiore and Glynn Winskel}, title = {Access Control in a Core Calculus of Dependency}, booktitle = {Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin}, series = {Electronic Notes in Theoretical Computer Science}, volume = {172}, pages = {5--31}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.02.002}, doi = {10.1016/J.ENTCS.2007.02.002}, timestamp = {Tue, 24 Jan 2023 11:36:28 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Abadi07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AbadiC06, author = {Mart{\'{\i}}n Abadi and V{\'{e}}ronique Cortier}, title = {Deciding knowledge in security protocols under equational theories}, journal = {Theor. Comput. Sci.}, volume = {367}, number = {1-2}, pages = {2--32}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2006.08.032}, doi = {10.1016/J.TCS.2006.08.032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/AbadiC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/AbadiFF06, author = {Mart{\'{\i}}n Abadi and Cormac Flanagan and Stephen N. Freund}, title = {Types for safe locking: Static race detection for Java}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {28}, number = {2}, pages = {207--255}, year = {2006}, url = {https://doi.org/10.1145/1119479.1119480}, doi = {10.1145/1119479.1119480}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/AbadiFF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aplas/AbadiCF06, author = {Mart{\'{\i}}n Abadi and Ricardo Corin and C{\'{e}}dric Fournet}, editor = {Naoki Kobayashi}, title = {Computational Secrecy by Typing for the Pi Calculus}, booktitle = {Programming Languages and Systems, 4th Asian Symposium, {APLAS} 2006, Sydney, Australia, November 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4279}, pages = {253--269}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11924661\_16}, doi = {10.1007/11924661\_16}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/aplas/AbadiCF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/BudiuEA06, author = {Mihai Budiu and {\'{U}}lfar Erlingsson and Mart{\'{\i}}n Abadi}, editor = {Josep Torrellas}, title = {Architectural support for software-based protection}, booktitle = {Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, {ASID} 2006, San Jose, California, USA, October 21, 2006}, pages = {42--51}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1181309.1181316}, doi = {10.1145/1181309.1181316}, timestamp = {Wed, 07 Jul 2021 13:23:08 +0200}, biburl = {https://dblp.org/rec/conf/asplos/BudiuEA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChaudhuriA06, author = {Avik Chaudhuri and Mart{\'{\i}}n Abadi}, title = {Secrecy by Typing and File-Access Control}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {112--123}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.28}, doi = {10.1109/CSFW.2006.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChaudhuriA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/ChaudhuriA06, author = {Avik Chaudhuri and Mart{\'{\i}}n Abadi}, editor = {Elie Najm and Jean{-}Fran{\c{c}}ois Pradat{-}Peyre and V{\'{e}}ronique Donzeau{-}Gouge}, title = {Formal Analysis of Dynamic, Distributed File-System Access Controls}, booktitle = {Formal Techniques for Networked and Distributed Systems - {FORTE} 2006, 26th {IFIP} {WG} 6.1 International Conference, Paris, France, September 26-29, 2006}, series = {Lecture Notes in Computer Science}, volume = {4229}, pages = {99--114}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11888116\_8}, doi = {10.1007/11888116\_8}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/forte/ChaudhuriA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/AbadiBW06, author = {Mart{\'{\i}}n Abadi and Mathieu Baudet and Bogdan Warinschi}, editor = {Luca Aceto and Anna Ing{\'{o}}lfsd{\'{o}}ttir}, title = {Guessing Attacks and the Computational Soundness of Static Equivalence}, booktitle = {Foundations of Software Science and Computation Structures, 9th International Conference, {FOSSACS} 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2006, Vienna, Austria, March 25-31, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3921}, pages = {398--412}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11690634\_27}, doi = {10.1007/11690634\_27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/AbadiBW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfp/Abadi06, author = {Mart{\'{\i}}n Abadi}, editor = {John H. Reppy and Julia Lawall}, title = {Access control in a core calculus of dependency}, booktitle = {Proceedings of the 11th {ACM} {SIGPLAN} International Conference on Functional Programming, {ICFP} 2006, Portland, Oregon, USA, September 16-21, 2006}, pages = {263--273}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1159803.1159839}, doi = {10.1145/1159803.1159839}, timestamp = {Mon, 17 Jan 2022 15:20:18 +0100}, biburl = {https://dblp.org/rec/conf/icfp/Abadi06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/ErlingssonAVBN06, author = {{\'{U}}lfar Erlingsson and Mart{\'{\i}}n Abadi and Michael Vrable and Mihai Budiu and George C. Necula}, editor = {Brian N. Bershad and Jeffrey C. Mogul}, title = {{XFI:} Software Guards for System Address Spaces}, booktitle = {7th Symposium on Operating Systems Design and Implementation {(OSDI} '06), November 6-8, Seattle, WA, {USA}}, pages = {75--88}, publisher = {{USENIX} Association}, year = {2006}, url = {http://www.usenix.org/events/osdi06/tech/erlingsson.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/osdi/ErlingssonAVBN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/AbadiB05, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet}, title = {Analyzing security protocols with secrecy types and logic programs}, journal = {J. {ACM}}, volume = {52}, number = {1}, pages = {102--146}, year = {2005}, url = {https://doi.org/10.1145/1044731.1044735}, doi = {10.1145/1044731.1044735}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/AbadiB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/AbadiMS05, author = {Mart{\'{\i}}n Abadi and Greg Morrisett and Andrei Sabelfeld}, title = {"Language-Based Security"}, journal = {J. Funct. Program.}, volume = {15}, number = {2}, pages = {129}, year = {2005}, url = {https://doi.org/10.1017/S0956796804005428}, doi = {10.1017/S0956796804005428}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/AbadiMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/AbadiB05, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet}, title = {Computer-assisted verification of a protocol for certified email}, journal = {Sci. Comput. Program.}, volume = {58}, number = {1-2}, pages = {3--27}, year = {2005}, url = {https://doi.org/10.1016/j.scico.2005.02.002}, doi = {10.1016/J.SCICO.2005.02.002}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/AbadiB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/AbadiBMW05, author = {Mart{\'{\i}}n Abadi and Michael Burrows and Mark S. Manasse and Ted Wobber}, title = {Moderately hard, memory-bound functions}, journal = {{ACM} Trans. Internet Techn.}, volume = {5}, number = {2}, pages = {299--327}, year = {2005}, url = {https://doi.org/10.1145/1064340.1064341}, doi = {10.1145/1064340.1064341}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/AbadiBMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChaudhuriA05, author = {Avik Chaudhuri and Mart{\'{\i}}n Abadi}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {Formal security analysis of basic network-attached storage}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {43--52}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103583}, doi = {10.1145/1103576.1103583}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChaudhuriA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbadiBEL05, author = {Mart{\'{\i}}n Abadi and Mihai Budiu and {\'{U}}lfar Erlingsson and Jay Ligatti}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Control-flow integrity}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {340--353}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102165}, doi = {10.1145/1102120.1102165}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AbadiBEL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/AbadiC05, author = {Mart{\'{\i}}n Abadi and V{\'{e}}ronique Cortier}, title = {Deciding Knowledge in Security Protocols under (Many More) Equational Theories}, booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, pages = {62--76}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSFW.2005.14}, doi = {10.1109/CSFW.2005.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/AbadiC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/AbadiBW05, author = {Mart{\'{\i}}n Abadi and Andrew Birrell and Ted Wobber}, title = {Access Control in a World of Software Diversity}, booktitle = {Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating Systems, June 12-15, 2005, Santa Fe, New Mexico, {USA}}, publisher = {{USENIX} Association}, year = {2005}, url = {http://www.usenix.org/events/hotos05/final\_papers/full\_papers/abadi/abadi.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotos/AbadiBW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AbadiW05, author = {Mart{\'{\i}}n Abadi and Bogdan Warinschi}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Password-Based Encryption Analyzed}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {664--676}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_54}, doi = {10.1007/11523468\_54}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AbadiW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/AbadiBEL05, author = {Mart{\'{\i}}n Abadi and Mihai Budiu and {\'{U}}lfar Erlingsson and Jay Ligatti}, editor = {Kung{-}Kiu Lau and Richard Banach}, title = {A Theory of Secure Control Flow}, booktitle = {Formal Methods and Software Engineering, 7th International Conference on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November 1-4, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3785}, pages = {111--124}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576280\_9}, doi = {10.1007/11576280\_9}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/icfem/AbadiBEL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/BlanchetAF05, author = {Bruno Blanchet and Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet}, title = {Automated Verification of Selected Equivalences for Security Protocols}, booktitle = {20th {IEEE} Symposium on Logic in Computer Science {(LICS} 2005), 26-29 June 2005, Chicago, IL, USA, Proceedings}, pages = {331--340}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/LICS.2005.8}, doi = {10.1109/LICS.2005.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/BlanchetAF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/AbadiW05, author = {Mart{\'{\i}}n Abadi and Bogdan Warinschi}, editor = {Chen Li}, title = {Security analysis of cryptographically controlled access to {XML} documents}, booktitle = {Proceedings of the Twenty-fourth {ACM} {SIGACT-SIGMOD-SIGART} Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, {USA}}, pages = {108--117}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1065167.1065182}, doi = {10.1145/1065167.1065182}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pods/AbadiW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/concur/2005, editor = {Mart{\'{\i}}n Abadi and Luca de Alfaro}, title = {{CONCUR} 2005 - Concurrency Theory, 16th International Conference, {CONCUR} 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3653}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11539452}, doi = {10.1007/11539452}, isbn = {3-540-28309-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/popl/2005, editor = {Jens Palsberg and Mart{\'{\i}}n Abadi}, title = {Proceedings of the 32nd {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, {POPL} 2005, Long Beach, California, USA, January 12-14, 2005}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1040305}, doi = {10.1145/1040305}, isbn = {1-58113-830-X}, timestamp = {Sat, 31 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AbadiF04, author = {Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet}, title = {Private authentication}, journal = {Theor. Comput. Sci.}, volume = {322}, number = {3}, pages = {427--476}, year = {2004}, url = {https://doi.org/10.1016/j.tcs.2003.12.023}, doi = {10.1016/J.TCS.2003.12.023}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AbadiF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/WhiteheadAN04, author = {Nathan Whitehead and Mart{\'{\i}}n Abadi and George C. Necula}, title = {By Reason and Authority: {A} System for Authorization of Proof-Carrying Code}, booktitle = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004), 28-30 June 2004, Pacific Grove, CA, {USA}}, pages = {236--250}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.6}, doi = {10.1109/CSFW.2004.6}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/WhiteheadAN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/AbadiBF04, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet and C{\'{e}}dric Fournet}, editor = {David A. Schmidt}, title = {Just Fast Keying in the Pi Calculus}, booktitle = {Programming Languages and Systems, 13th European Symposium on Programming, {ESOP} 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2986}, pages = {340--354}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24725-8\_24}, doi = {10.1007/978-3-540-24725-8\_24}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/AbadiBF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/AbadiW04, author = {Mart{\'{\i}}n Abadi and Ted Wobber}, editor = {David de Frutos{-}Escrig and Manuel N{\'{u}}{\~{n}}ez}, title = {A Logical Account of {NGSCB}}, booktitle = {Formal Techniques for Networked and Distributed Systems - {FORTE} 2004, 24th {IFIP} {WG} 6.1 International Conference, Madrid Spain, September 27-30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3235}, pages = {1--12}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30232-2\_1}, doi = {10.1007/978-3-540-30232-2\_1}, timestamp = {Mon, 03 Jan 2022 22:19:32 +0100}, biburl = {https://dblp.org/rec/conf/forte/AbadiW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/AbadiGW04, author = {Mart{\'{\i}}n Abadi and Georges Gonthier and Benjamin Werner}, editor = {Igor Walukiewicz}, title = {Choice in Dynamic Linking}, booktitle = {Foundations of Software Science and Computation Structures, 7th International Conference, {FOSSACS} 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2987}, pages = {12--26}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24727-2\_3}, doi = {10.1007/978-3-540-24727-2\_3}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/AbadiGW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AbadiC04, author = {Mart{\'{\i}}n Abadi and V{\'{e}}ronique Cortier}, editor = {Josep D{\'{\i}}az and Juhani Karhum{\"{a}}ki and Arto Lepist{\"{o}} and Donald Sannella}, title = {Deciding Knowledge in Security Protocols Under Equational Theories}, booktitle = {Automata, Languages and Programming: 31st International Colloquium, {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3142}, pages = {46--58}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27836-8\_7}, doi = {10.1007/978-3-540-27836-8\_7}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AbadiC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/WhiteheadA04, author = {Nathan Whitehead and Mart{\'{\i}}n Abadi}, editor = {Franz Baader and Andrei Voronkov}, title = {BCiC: {A} System for Code Authentication and Verification}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning, 11th International Conference, {LPAR} 2004, Montevideo, Uruguay, March 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3452}, pages = {110--124}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-32275-7\_8}, doi = {10.1007/978-3-540-32275-7\_8}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/lpar/WhiteheadA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/HayatiA04, author = {Katia Hayati and Mart{\'{\i}}n Abadi}, editor = {David M. Martin Jr. and Andrei Serjantov}, title = {Language-Based Enforcement of Privacy Policies}, booktitle = {Privacy Enhancing Technologies, 4th International Workshop, {PET} 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3424}, pages = {302--313}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11423409\_19}, doi = {10.1007/11423409\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/HayatiA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Abadi04, author = {Mart{\'{\i}}n Abadi}, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Trusted Computing, Trusted Third Parties, and Verified Communications}, booktitle = {Security and Protection in Information Processing Systems, {IFIP} 18th WorldComputer Congress, {TC11} 19th International Information Security Conference, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {147}, pages = {291--308}, publisher = {Kluwer / Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8143-X\_19}, doi = {10.1007/1-4020-8143-X\_19}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Abadi04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KakkarGA03, author = {Pankaj Kakkar and Carl A. Gunter and Mart{\'{\i}}n Abadi}, title = {Reasoning About Secrecy for Active Networks}, journal = {J. Comput. Secur.}, volume = {11}, number = {2}, pages = {245--287}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11205}, doi = {10.3233/JCS-2003-11205}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KakkarGA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AbadiB03, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet}, title = {Secrecy types for asymmetric communication}, journal = {Theor. Comput. Sci.}, volume = {298}, number = {3}, pages = {387--415}, year = {2003}, url = {https://doi.org/10.1016/S0304-3975(02)00863-0}, doi = {10.1016/S0304-3975(02)00863-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AbadiB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/AbadiBBDW03, author = {Mart{\'{\i}}n Abadi and Andrew Birrell and Michael Burrows and Frank Dabek and Ted Wobber}, editor = {Vijay A. Saraswat}, title = {Bankable Postage for Network Services}, booktitle = {Advances in Computing Science - {ASIAN} 2003 Programming Languages and Distributed Computation, 8th Asian Computing Science Conference, Mumbai, India, December 10-14, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2896}, pages = {72--90}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40965-6\_6}, doi = {10.1007/978-3-540-40965-6\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/AbadiBBDW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/AbadiL03, author = {Mart{\'{\i}}n Abadi and K. Rustan M. Leino}, editor = {Nachum Dershowitz}, title = {A Logic of Object-Oriented Programs}, booktitle = {Verification: Theory and Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday}, series = {Lecture Notes in Computer Science}, volume = {2772}, pages = {11--41}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39910-0\_2}, doi = {10.1007/978-3-540-39910-0\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/AbadiL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/Abadi03, author = {Mart{\'{\i}}n Abadi}, editor = {Luca Cardelli}, title = {Built-in Object Security}, booktitle = {{ECOOP} 2003 - Object-Oriented Programming, 17th European Conference, Darmstadt, Germany, July 21-25, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2743}, pages = {1}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45070-2\_1}, doi = {10.1007/978-3-540-45070-2\_1}, timestamp = {Sun, 02 Jun 2019 21:16:57 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/Abadi03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/Abadi03, author = {Mart{\'{\i}}n Abadi}, title = {Logic in Access Control}, booktitle = {18th {IEEE} Symposium on Logic in Computer Science {(LICS} 2003), 22-25 June 2003, Ottawa, Canada, Proceedings}, pages = {228}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/LICS.2003.1210062}, doi = {10.1109/LICS.2003.1210062}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/Abadi03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AbadiBW03, author = {Mart{\'{\i}}n Abadi and Michael Burrows and Ted Wobber}, title = {Moderately Hard, Memory-Bound Functions}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2003, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2003}, url = {https://www.ndss-symposium.org/ndss2003/moderately-hard-memory-bound-functions/}, timestamp = {Mon, 01 Feb 2021 08:42:24 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AbadiBW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AbadiF03, author = {Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet}, title = {Access Control Based on Execution History}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2003, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2003}, url = {https://www.ndss-symposium.org/ndss2003/access-control-based-execution-history/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AbadiF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sas/AbadiB03, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet}, editor = {Radhia Cousot}, title = {Computer-Assisted Verification of a Protocol for Certified Email}, booktitle = {Static Analysis, 10th International Symposium, {SAS} 2003, San Diego, CA, USA, June 11-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2694}, pages = {316--335}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44898-5\_17}, doi = {10.1007/3-540-44898-5\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sas/AbadiB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AbadiFG02, author = {Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet and Georges Gonthier}, title = {Secure Implementation of Channel Abstractions}, journal = {Inf. Comput.}, volume = {174}, number = {1}, pages = {37--83}, year = {2002}, url = {https://doi.org/10.1006/inco.2002.3086}, doi = {10.1006/INCO.2002.3086}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/AbadiFG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbadiR02, author = {Mart{\'{\i}}n Abadi and Phillip Rogaway}, title = {Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)}, journal = {J. Cryptol.}, volume = {15}, number = {2}, pages = {103--127}, year = {2002}, url = {https://doi.org/10.1007/s00145-001-0014-7}, doi = {10.1007/S00145-001-0014-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbadiR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/AbadiLP02, author = {Mart{\'{\i}}n Abadi and Leonid Libkin and Frank Pfenning}, title = {Editorial}, journal = {{ACM} Trans. Comput. Log.}, volume = {3}, number = {3}, pages = {335--335}, year = {2002}, url = {https://doi.org/10.1145/507382.507383}, doi = {10.1145/507382.507383}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocl/AbadiLP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isss2/FournetA02, author = {C{\'{e}}dric Fournet and Mart{\'{\i}}n Abadi}, editor = {Mitsuhiro Okada and Benjamin C. Pierce and Andre Scedrov and Hideyuki Tokuda and Akinori Yonezawa}, title = {Hiding Names: Private Authentication in the Applied Pi Calculus}, booktitle = {Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2609}, pages = {317--338}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36532-X\_20}, doi = {10.1007/3-540-36532-X\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/isss2/FournetA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/Abadi02, author = {Mart{\'{\i}}n Abadi}, editor = {Roger Dingledine and Paul F. Syverson}, title = {Private Authentication}, booktitle = {Privacy Enhancing Technologies, Second International Workshop, {PET} 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2482}, pages = {27--40}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36467-6\_3}, doi = {10.1007/3-540-36467-6\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/Abadi02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiB02, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet}, editor = {John Launchbury and John C. Mitchell}, title = {Analyzing security protocols with secrecy types and logic programs}, booktitle = {Conference Record of {POPL} 2002: The 29th {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, Portland, OR, USA, January 16-18, 2002}, pages = {33--44}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/503272.503277}, doi = {10.1145/503272.503277}, timestamp = {Wed, 07 Jul 2021 17:30:33 +0200}, biburl = {https://dblp.org/rec/conf/popl/AbadiB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/AbadiG02, author = {Mart{\'{\i}}n Abadi and Neal Glew}, editor = {David Lassner and David De Roure and Arun Iyengar}, title = {Certified email with a light on-line trusted third party: design and implementation}, booktitle = {Proceedings of the Eleventh International World Wide Web Conference, {WWW} 2002, May 7-11, 2002, Honolulu, Hawaii, {USA}}, pages = {387--395}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/511446.511497}, doi = {10.1145/511446.511497}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/AbadiG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FioreA01, author = {Marcelo P. Fiore and Mart{\'{\i}}n Abadi}, title = {Computing Symbolic Models for Verifying Cryptographic Protocols}, booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, pages = {160--173}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSFW.2001.930144}, doi = {10.1109/CSFW.2001.930144}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FioreA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/AbadiB01, author = {Mart{\'{\i}}n Abadi and Bruno Blanchet}, editor = {Furio Honsell and Marino Miculan}, title = {Secrecy Types for Asymmetric Communication}, booktitle = {Foundations of Software Science and Computation Structures, 4th International Conference, {FOSSACS} 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April 2-6, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2030}, pages = {25--41}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45315-6\_2}, doi = {10.1007/3-540-45315-6\_2}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/AbadiB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Abadi01, author = {Mart{\'{\i}}n Abadi}, editor = {Ajay D. Kshemkalyani and Nir Shavit}, title = {Leslie Lamport's properties and actions}, booktitle = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA, August 26-29, 2001}, pages = {15}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/383962.383973}, doi = {10.1145/383962.383973}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/Abadi01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiF01, author = {Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet}, editor = {Chris Hankin and Dave Schmidt}, title = {Mobile values, new names, and secure communication}, booktitle = {Conference Record of {POPL} 2001: The 28th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, London, UK, January 17-19, 2001}, pages = {104--115}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/360204.360213}, doi = {10.1145/360204.360213}, timestamp = {Wed, 07 Jul 2021 17:30:33 +0200}, biburl = {https://dblp.org/rec/conf/popl/AbadiF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/AbadiJ01, author = {Mart{\'{\i}}n Abadi and Jan J{\"{u}}rjens}, editor = {Naoki Kobayashi and Benjamin C. Pierce}, title = {Formal Eavesdropping and Its Computational Interpretation}, booktitle = {Theoretical Aspects of Computer Software, 4th International Symposium, {TACS} 2001, Sendai, Japan, October 29-31, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2215}, pages = {82--94}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45500-0\_4}, doi = {10.1007/3-540-45500-0\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/tacs/AbadiJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mscs/Abadi00, author = {Mart{\'{\i}}n Abadi}, title = {top-top-closed relations and admissibility}, journal = {Math. Struct. Comput. Sci.}, volume = {10}, number = {3}, pages = {313--320}, year = {2000}, url = {http://journals.cambridge.org/action/displayAbstract?aid=44649}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mscs/Abadi00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Abadi00, author = {Mart{\'{\i}}n Abadi}, editor = {Mihir Bellare}, title = {Taming the Adversary}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {353--358}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_22}, doi = {10.1007/3-540-44598-6\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Abadi00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KakkarGA00, author = {Pankaj Kakkar and Carl A. Gunter and Mart{\'{\i}}n Abadi}, title = {Reasoning about Secrecy for Active Networks}, booktitle = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, pages = {118--129}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CSFW.2000.856931}, doi = {10.1109/CSFW.2000.856931}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KakkarGA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifipTCS/AbadiR00, author = {Mart{\'{\i}}n Abadi and Phillip Rogaway}, editor = {Jan van Leeuwen and Osamu Watanabe and Masami Hagiya and Peter D. Mosses and Takayasu Ito}, title = {Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)}, booktitle = {Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics, International Conference {IFIP} {TCS} 2000, Sendai, Japan, August 17-19, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1872}, pages = {3--22}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44929-9\_1}, doi = {10.1007/3-540-44929-9\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/ifipTCS/AbadiR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiFG00, author = {Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet and Georges Gonthier}, editor = {Mark N. Wegman and Thomas W. Reps}, title = {Authentication Primitives and Their Compilation}, booktitle = {{POPL} 2000, Proceedings of the 27th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, Boston, Massachusetts, USA, January 19-21, 2000}, pages = {302--315}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/325694.325734}, doi = {10.1145/325694.325734}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/AbadiFG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AbadiG99, author = {Mart{\'{\i}}n Abadi and Andrew D. Gordon}, title = {A Calculus for Cryptographic Protocols: The spi Calculus}, journal = {Inf. Comput.}, volume = {148}, number = {1}, pages = {1--70}, year = {1999}, url = {https://doi.org/10.1006/inco.1998.2740}, doi = {10.1006/INCO.1998.2740}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/AbadiG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/StataA99, author = {Raymie Stata and Mart{\'{\i}}n Abadi}, title = {A Type System for Java Bytecode Subroutines}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {21}, number = {1}, pages = {90--137}, year = {1999}, url = {https://doi.org/10.1145/314602.314606}, doi = {10.1145/314602.314606}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/StataA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/FlanaganA99, author = {Cormac Flanagan and Mart{\'{\i}}n Abadi}, editor = {Jos C. M. Baeten and Sjouke Mauw}, title = {Object Types against Races}, booktitle = {{CONCUR} '99: Concurrency Theory, 10th International Conference, Eindhoven, The Netherlands, August 24-27, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1664}, pages = {288--303}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48320-9\_21}, doi = {10.1007/3-540-48320-9\_21}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/FlanaganA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoopw/Abadi99, author = {Mart{\'{\i}}n Abadi}, editor = {Jan Vitek and Christian Damsgaard Jensen}, title = {Protection in Programming-Language Translations}, booktitle = {Secure Internet Programming, Security Issues for Mobile and Distributed Objects}, series = {Lecture Notes in Computer Science}, volume = {1603}, pages = {19--34}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48749-2\_2}, doi = {10.1007/3-540-48749-2\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ecoopw/Abadi99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoopw/DoornABW99, author = {Leendert van Doorn and Mart{\'{\i}}n Abadi and Michael Burrows and Edward Wobber}, editor = {Jan Vitek and Christian Damsgaard Jensen}, title = {Secure Network Objects}, booktitle = {Secure Internet Programming, Security Issues for Mobile and Distributed Objects}, series = {Lecture Notes in Computer Science}, volume = {1603}, pages = {395--412}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48749-2\_18}, doi = {10.1007/3-540-48749-2\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecoopw/DoornABW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/FlanaganA99, author = {Cormac Flanagan and Mart{\'{\i}}n Abadi}, editor = {S. Doaitse Swierstra}, title = {Types for Safe Locking}, booktitle = {Programming Languages and Systems, 8th European Symposium on Programming, ESOP'99, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99, Amsterdam, The Netherlands, 22-28 March, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1576}, pages = {91--108}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49099-X\_7}, doi = {10.1007/3-540-49099-X\_7}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/FlanaganA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/Abadi99, author = {Mart{\'{\i}}n Abadi}, editor = {Wolfgang Thomas}, title = {Security Protocols and Specifications}, booktitle = {Foundations of Software Science and Computation Structure, Second International Conference, FoSSaCS'99, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99, Amsterdam, The Netherlands, March 22-28, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1578}, pages = {1--13}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49019-1\_1}, doi = {10.1007/3-540-49019-1\_1}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/Abadi99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/AbadiFG99, author = {Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet and Georges Gonthier}, editor = {C. Pandu Rangan and Venkatesh Raman and Ramaswamy Ramanujam}, title = {A Top-Down Look at a Secure Message}, booktitle = {Foundations of Software Technology and Theoretical Computer Science, 19th Conference, Chennai, India, December 13-15, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1738}, pages = {122--141}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46691-6\_10}, doi = {10.1007/3-540-46691-6\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/AbadiFG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiBHR99, author = {Mart{\'{\i}}n Abadi and Anindya Banerjee and Nevin Heintze and Jon G. Riecke}, editor = {Andrew W. Appel and Alex Aiken}, title = {A Core Calculus of Dependency}, booktitle = {{POPL} '99, Proceedings of the 26th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, San Antonio, TX, USA, January 20-22, 1999}, pages = {147--160}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/292540.292555}, doi = {10.1145/292540.292555}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/AbadiBHR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AbadiFG99, author = {Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet and Georges Gonthier}, title = {Secure Communications Processing for Distributed Languages}, booktitle = {1999 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 9-12, 1999}, pages = {74--88}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/SECPRI.1999.766719}, doi = {10.1109/SECPRI.1999.766719}, timestamp = {Thu, 21 Sep 2023 15:57:37 +0200}, biburl = {https://dblp.org/rec/conf/sp/AbadiFG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Abadi99, author = {Mart{\'{\i}}n Abadi}, editor = {Stephen D. Brookes and Achim Jung and Michael W. Mislove and Andre Scedrov}, title = {Secrecy in Programming-Language Semantics}, booktitle = {Fifteenth Conference on Mathematical Foundations of Progamming Semantics, {MFPS} 1999, Tulane University, New Orleans, LA, USA, April 28 - May 1, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {20}, pages = {80--94}, publisher = {Elsevier}, year = {1999}, url = {https://doi.org/10.1016/S1571-0661(04)80068-9}, doi = {10.1016/S1571-0661(04)80068-9}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Abadi99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AbadiBSW98, author = {Mart{\'{\i}}n Abadi and Andrew Birrell and Raymie Stata and Edward Wobber}, title = {Secure Web Tunneling}, journal = {Comput. Networks}, volume = {30}, number = {1-7}, pages = {531--539}, year = {1998}, url = {https://doi.org/10.1016/S0169-7552(98)00048-8}, doi = {10.1016/S0169-7552(98)00048-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AbadiBSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Abadi98, author = {Mart{\'{\i}}n Abadi}, title = {On SDSI's Linked Local Name Spaces}, journal = {J. Comput. Secur.}, volume = {6}, number = {1-2}, pages = {3--22}, year = {1998}, url = {https://doi.org/10.3233/jcs-1998-61-202}, doi = {10.3233/JCS-1998-61-202}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Abadi98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/njc/AbadiG98, author = {Mart{\'{\i}}n Abadi and Andrew D. Gordon}, title = {A Bisimulation Method for Cryptographic Protocols}, journal = {Nord. J. Comput.}, volume = {5}, number = {4}, pages = {267}, year = {1998}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/njc/AbadiG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Abadi98, author = {Mart{\'{\i}}n Abadi}, title = {Two Facets of Authentication}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {27--32}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSFW.1998.683152}, doi = {10.1109/CSFW.1998.683152}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Abadi98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GorrieriSAFGLM98, author = {Roberto Gorrieri and Paul F. Syverson and Mart{\'{\i}}n Abadi and Riccardo Focardi and Dieter Gollmann and Gavin Lowe and Catherine Meadows}, title = {Panel Introduction: Varieties of Authentication}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {79--82}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.1998.10000}, doi = {10.1109/CSFW.1998.10000}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/GorrieriSAFGLM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoopw/Abadi98, author = {Mart{\'{\i}}n Abadi}, editor = {Serge Demeyer and Jan Bosch}, title = {Protection in Programming-Language Translations: Mobile Object Systems (Abstract)}, booktitle = {Object-Oriented Technology, ECOOP'98 Workshop Reader, ECOOP'98 Workshops, Demos, and Posters, Brussels, Belgium, July 20-24, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1543}, pages = {291}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49255-0\_70}, doi = {10.1007/3-540-49255-0\_70}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ecoopw/Abadi98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/AbadiG98, author = {Mart{\'{\i}}n Abadi and Andrew D. Gordon}, editor = {Chris Hankin}, title = {A Bisimulation Method for Cryptographic Protocols}, booktitle = {Programming Languages and Systems - ESOP'98, 7th European Symposium on Programming, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1381}, pages = {12--26}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053560}, doi = {10.1007/BFB0053560}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esop/AbadiG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Abadi98, author = {Mart{\'{\i}}n Abadi}, editor = {Kim Guldstrand Larsen and Sven Skyum and Glynn Winskel}, title = {Protection in Programming-Language Translations}, booktitle = {Automata, Languages and Programming, 25th International Colloquium, ICALP'98, Aalborg, Denmark, July 13-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1443}, pages = {868--883}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055109}, doi = {10.1007/BFB0055109}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Abadi98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/AbadiFG98, author = {Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet and Georges Gonthier}, title = {Secure Implementation of Channel Abstractions}, booktitle = {Thirteenth Annual {IEEE} Symposium on Logic in Computer Science, Indianapolis, Indiana, USA, June 21-24, 1998}, pages = {105--116}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/LICS.1998.705647}, doi = {10.1109/LICS.1998.705647}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/AbadiFG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/StataA98, author = {Raymie Stata and Mart{\'{\i}}n Abadi}, editor = {David B. MacQueen and Luca Cardelli}, title = {A Type System for Java Bytecode Subroutines}, booktitle = {{POPL} '98, Proceedings of the 25th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, San Diego, CA, USA, January 19-21, 1998}, pages = {149--160}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/268946.268959}, doi = {10.1145/268946.268959}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/StataA98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/Abadi97, author = {Mart{\'{\i}}n Abadi}, title = {Explicit Communication Revisited: Two New Attacks on Authentication Protocols}, journal = {{IEEE} Trans. Software Eng.}, volume = {23}, number = {3}, pages = {185--186}, year = {1997}, url = {https://doi.org/10.1109/32.585505}, doi = {10.1109/32.585505}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/Abadi97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbadiG97, author = {Mart{\'{\i}}n Abadi and Andrew D. Gordon}, editor = {Richard Graveman and Philippe A. Janson and Clifford Neuman and Li Gong}, title = {A Calculus for Cryptographic Protocols: The Spi Calculus}, booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997}, pages = {36--47}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266420.266432}, doi = {10.1145/266420.266432}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AbadiG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/AbadiG97, author = {Mart{\'{\i}}n Abadi and Andrew D. Gordon}, editor = {Antoni W. Mazurkiewicz and J{\'{o}}zef Winkowski}, title = {Reasoning about Cryptographic Protocols in the Spi Calculus}, booktitle = {{CONCUR} '97: Concurrency Theory, 8th International Conference, Warsaw, Poland, July 1-4, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1243}, pages = {59--73}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63141-0\_5}, doi = {10.1007/3-540-63141-0\_5}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/concur/AbadiG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Abadi97, author = {Mart{\'{\i}}n Abadi}, title = {On SDSI's Linked Local Name Spaces}, booktitle = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12, 1997, Rockport, Massachusetts, {USA}}, pages = {98--108}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CSFW.1997.596794}, doi = {10.1109/CSFW.1997.596794}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Abadi97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/Abadi97, author = {Mart{\'{\i}}n Abadi}, editor = {Mart{\'{\i}}n Abadi and Takayasu Ito}, title = {Secrecy by Typing inSecurity Protocols}, booktitle = {Theoretical Aspects of Computer Software, Third International Symposium, {TACS} '97, Sendai, Japan, September 23-26, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1281}, pages = {611--638}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0014571}, doi = {10.1007/BFB0014571}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/tacs/Abadi97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapsoft/AbadiL97, author = {Mart{\'{\i}}n Abadi and K. Rustan M. Leino}, editor = {Michel Bidoit and Max Dauchet}, title = {A Logic of Object-Oriented Programs}, booktitle = {TAPSOFT'97: Theory and Practice of Software Development, 7th International Joint Conference CAAP/FASE, Lille, France, April 14-18, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1214}, pages = {682--696}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030634}, doi = {10.1007/BFB0030634}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/tapsoft/AbadiL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AbadiFG97, author = {Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet and Georges Gonthier}, editor = {Andrew D. Gordon and Andrew M. Pitts and Carolyn L. Talcott}, title = {Secure Implementation of Channel Abstractions}, booktitle = {Second Workshop on Higher-Order Operational Techniques in Semantics, {HOOTS} 1997, Stanford, CA, USA, December 8-12, 1997}, series = {Electronic Notes in Theoretical Computer Science}, volume = {10}, pages = {202--203}, publisher = {Elsevier}, year = {1997}, url = {https://doi.org/10.1016/S1571-0661(05)82514-9}, doi = {10.1016/S1571-0661(05)82514-9}, timestamp = {Fri, 11 Nov 2022 13:29:29 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AbadiFG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tacs/1997, editor = {Mart{\'{\i}}n Abadi and Takayasu Ito}, title = {Theoretical Aspects of Computer Software, Third International Symposium, {TACS} '97, Sendai, Japan, September 23-26, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1281}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0014544}, doi = {10.1007/BFB0014544}, isbn = {3-540-63388-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tacs/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0084624, author = {Mart{\'{\i}}n Abadi and Luca Cardelli}, title = {A Theory of Objects}, series = {Monographs in Computer Science}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/978-1-4419-8598-9}, doi = {10.1007/978-1-4419-8598-9}, isbn = {978-0-387-94775-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0084624.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AbadiC96, author = {Mart{\'{\i}}n Abadi and Luca Cardelli}, title = {A Theory of Primitive Objects: Untyped and First-Order Systems}, journal = {Inf. Comput.}, volume = {125}, number = {2}, pages = {78--102}, year = {1996}, url = {https://doi.org/10.1006/inco.1996.0024}, doi = {10.1006/INCO.1996.0024}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/AbadiC96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/AbadiC96, author = {Mart{\'{\i}}n Abadi and Luca Cardelli}, title = {On Subtyping and Matching}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {18}, number = {4}, pages = {401--423}, year = {1996}, url = {https://doi.org/10.1145/233561.233563}, doi = {10.1145/233561.233563}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/AbadiC96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/AbadiN96, author = {Mart{\'{\i}}n Abadi and Roger M. Needham}, title = {Prudent Engineering Practice for Cryptographic Protocols}, journal = {{IEEE} Trans. Software Eng.}, volume = {22}, number = {1}, pages = {6--15}, year = {1996}, url = {https://doi.org/10.1109/32.481513}, doi = {10.1109/32.481513}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/AbadiN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wwwj/GlassmanMAGS96, author = {Steven C. Glassman and Mark S. Manasse and Mart{\'{\i}}n Abadi and Paul Gauthier and Patrick Sobalvarro}, title = {The Millicent Protocol for Inexpensive Electronic Commerce}, journal = {World Wide Web J.}, volume = {1}, number = {1}, year = {1996}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wwwj/GlassmanMAGS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfp/AbadiLL96, author = {Mart{\'{\i}}n Abadi and Butler W. Lampson and Jean{-}Jacques L{\'{e}}vy}, editor = {Robert Harper and Richard L. Wexelblat}, title = {Analysis and Caching of Dependencies}, booktitle = {Proceedings of the 1996 {ACM} {SIGPLAN} International Conference on Functional Programming, {ICFP} 1996, Philadelphia, Pennsylvania, USA, May 24-26, 1996}, pages = {83--91}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/232627.232638}, doi = {10.1145/232627.232638}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/icfp/AbadiLL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/AbadiF96, author = {Mart{\'{\i}}n Abadi and Marcelo P. Fiore}, title = {Syntactic Considerations on Recursive Types}, booktitle = {Proceedings, 11th Annual {IEEE} Symposium on Logic in Computer Science, New Brunswick, New Jersey, USA, July 27-30, 1996}, pages = {242--252}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/LICS.1996.561324}, doi = {10.1109/LICS.1996.561324}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/AbadiF96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nato/AbadiM96, author = {Mart{\'{\i}}n Abadi and Stephan Merz}, editor = {Manfred Broy}, title = {On {TLA} as a logic}, booktitle = {Proceedings of the {NATO} Advanced Study Institute on Deductive Program Design, Marktoberdorf, Germany}, pages = {235--271}, year = {1996}, timestamp = {Tue, 14 Nov 2006 16:17:55 +0100}, biburl = {https://dblp.org/rec/conf/nato/AbadiM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiCV96, author = {Mart{\'{\i}}n Abadi and Luca Cardelli and Ramesh Viswanathan}, editor = {Hans{-}Juergen Boehm and Guy L. Steele Jr.}, title = {An Interpretation of Objects and Object Types}, booktitle = {Conference Record of POPL'96: The 23rd {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, Papers Presented at the Symposium, St. Petersburg Beach, Florida, USA, January 21-24, 1996}, pages = {396--409}, publisher = {{ACM} Press}, year = {1996}, url = {https://doi.org/10.1145/237721.237809}, doi = {10.1145/237721.237809}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/AbadiCV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DoornABW96, author = {Leendert van Doorn and Mart{\'{\i}}n Abadi and Michael Burrows and Edward Wobber}, title = {Secure Network Objects}, booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, pages = {211--221}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SECPRI.1996.502683}, doi = {10.1109/SECPRI.1996.502683}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/DoornABW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/AbadiCPR95, author = {Mart{\'{\i}}n Abadi and Luca Cardelli and Benjamin C. Pierce and Didier R{\'{e}}my}, title = {Dynamic Typing in Polymorphic Languages}, journal = {J. Funct. Program.}, volume = {5}, number = {1}, pages = {111--130}, year = {1995}, url = {https://doi.org/10.1017/S095679680000126X}, doi = {10.1017/S095679680000126X}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jfp/AbadiCPR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/AbadiC95, author = {Mart{\'{\i}}n Abadi and Luca Cardelli}, title = {A Theory of Primitive Objects: Second-Order Systems}, journal = {Sci. Comput. Program.}, volume = {25}, number = {2-3}, pages = {81--116}, year = {1995}, url = {https://doi.org/10.1016/0167-6423(95)00010-0}, doi = {10.1016/0167-6423(95)00010-0}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/AbadiC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tapos/LampingA95, author = {John Lamping and Mart{\'{\i}}n Abadi}, title = {Methods as Assertions}, journal = {Theory Pract. Object Syst.}, volume = {1}, number = {1}, pages = {5--18}, year = {1995}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tapos/LampingA95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tapos/AbadiC95, author = {Mart{\'{\i}}n Abadi and Luca Cardelli}, title = {An Imperative Object Calculus (Invited Paper)}, journal = {Theory Pract. Object Syst.}, volume = {1}, number = {3}, pages = {151--166}, year = {1995}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tapos/AbadiC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/AbadiL95, author = {Mart{\'{\i}}n Abadi and Leslie Lamport}, title = {Conjoining Specifications}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {17}, number = {3}, pages = {507--534}, year = {1995}, url = {https://doi.org/10.1145/203095.201069}, doi = {10.1145/203095.201069}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/AbadiL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/AbadiC95, author = {Mart{\'{\i}}n Abadi and Luca Cardelli}, editor = {Walter G. Olthoff}, title = {On Subtyping and Matching}, booktitle = {ECOOP'95 - Object-Oriented Programming, 9th European Conference, {\AA}rhus, Denmark, August 7-11, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {952}, pages = {145--167}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49538-X\_8}, doi = {10.1007/3-540-49538-X\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/AbadiC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/AbadiM95, author = {Mart{\'{\i}}n Abadi and Stephan Merz}, editor = {Jir{\'{\i}} Wiedermann and Petr H{\'{a}}jek}, title = {An Abstract Account of Composition}, booktitle = {Mathematical Foundations of Computer Science 1995, 20th International Symposium, MFCS'95, Prague, Czech Republic, August 28 - September 1, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {969}, pages = {499--508}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60246-1\_155}, doi = {10.1007/3-540-60246-1\_155}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/AbadiM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapsoft/AbadiC95, author = {Mart{\'{\i}}n Abadi and Luca Cardelli}, editor = {Peter D. Mosses and Mogens Nielsen and Michael I. Schwartzbach}, title = {An Imperative Object Calculus}, booktitle = {TAPSOFT'95: Theory and Practice of Software Development, 6th International Joint Conference CAAP/FASE, Aarhus, Denmark, May 22-26, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {915}, pages = {471--485}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-59293-8\_214}, doi = {10.1007/3-540-59293-8\_214}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/tapsoft/AbadiC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tlca/BellucciAC95, author = {Roberto Bellucci and Mart{\'{\i}}n Abadi and Pierre{-}Louis Curien}, editor = {Mariangiola Dezani{-}Ciancaglini and Gordon D. Plotkin}, title = {A Model for Formal Parametric Polymorphism: {A} {PER} Interpretation for System {R}}, booktitle = {Typed Lambda Calculi and Applications, Second International Conference on Typed Lambda Calculi and Applications, {TLCA} '95, Edinburgh, UK, April 10-12, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {902}, pages = {32--46}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0014043}, doi = {10.1007/BFB0014043}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/tlca/BellucciAC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/GlassmanMAGS95, author = {Steven C. Glassman and Mark S. Manasse and Mart{\'{\i}}n Abadi and Paul Gauthier and Patrick Sobalvarro}, editor = {Albert Vezza and Ira Goldstein and Tim Berners{-}Lee}, title = {The Millicent Protocol for Inexpensive Electronic Commerce}, booktitle = {Proceedings of the Fourth International Conference on World Wide Web, WWW4, Boston, Massachusetts, USA, December 11-14, 1995}, pages = {603--618}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/3592626.3592675}, doi = {10.1145/3592626.3592675}, timestamp = {Thu, 21 Sep 2023 16:48:52 +0200}, biburl = {https://dblp.org/rec/conf/www/GlassmanMAGS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Abadi94, author = {Mart{\'{\i}}n Abadi}, title = {A Semantics for Static Type Inference in a Nondeterministic Language}, journal = {Inf. Comput.}, volume = {109}, number = {1/2}, pages = {300--306}, year = {1994}, url = {https://doi.org/10.1006/inco.1994.1019}, doi = {10.1006/INCO.1994.1019}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Abadi94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AbadiH94, author = {Mart{\'{\i}}n Abadi and Joseph Y. Halpern}, title = {Decidability and Expressiveness for First-Order Logics of Probability}, journal = {Inf. Comput.}, volume = {112}, number = {1}, pages = {1--36}, year = {1994}, url = {https://doi.org/10.1006/inco.1994.1049}, doi = {10.1006/INCO.1994.1049}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/AbadiH94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/Abadi94, author = {Mart{\'{\i}}n Abadi}, title = {Baby Modula-3 and a Theory of Objects}, journal = {J. Funct. Program.}, volume = {4}, number = {2}, pages = {249--283}, year = {1994}, url = {https://doi.org/10.1017/S0956796800001052}, doi = {10.1017/S0956796800001052}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/Abadi94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/WobberAB94, author = {Edward Wobber and Mart{\'{\i}}n Abadi and Michael Burrows}, title = {Authentication in the Taos Operating System}, journal = {{ACM} Trans. Comput. Syst.}, volume = {12}, number = {1}, pages = {3--32}, year = {1994}, url = {https://doi.org/10.1145/174613.174614}, doi = {10.1145/174613.174614}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/WobberAB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/AbadiL94, author = {Mart{\'{\i}}n Abadi and Leslie Lamport}, title = {An Old-Fashined Recipe for Real-Time}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {16}, number = {5}, pages = {1543--1571}, year = {1994}, url = {https://doi.org/10.1145/186025.186058}, doi = {10.1145/186025.186058}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/AbadiL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/AbadiLM94, author = {Mart{\'{\i}}n Abadi and Leslie Lamport and Stephan Merz}, editor = {Manfred Broy and Stephan Merz and Katharina Spies}, title = {A {TLA} Solution to the RPC-Memory Specification Problem}, booktitle = {Formal Systems Specification, The RPC-Memory Specification Case Study (the book grow out of a Dagstuhl Seminar, September 1994)}, series = {Lecture Notes in Computer Science}, volume = {1169}, pages = {21--66}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0024426}, doi = {10.1007/BFB0024426}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/AbadiLM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/LampingA94, author = {John Lamping and Mart{\'{\i}}n Abadi}, editor = {Mario Tokoro and Remo Pareschi}, title = {Methods as Assertions}, booktitle = {Object-Oriented Programming, Proceedings of the 8th European Conference, {ECOOP} '94, Bologna, Italy, July 4-8, 1994}, series = {Lecture Notes in Computer Science}, volume = {821}, pages = {60--80}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0052176}, doi = {10.1007/BFB0052176}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/LampingA94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/AbadiC94, author = {Mart{\'{\i}}n Abadi and Luca Cardelli}, editor = {Donald Sannella}, title = {A Theory of Primitive Objects - Scond-Order Systems}, booktitle = {Programming Languages and Systems - ESOP'94, 5th European Symposium on Programming, Edinburgh, UK, April 11-13, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {788}, pages = {1--25}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-57880-3\_1}, doi = {10.1007/3-540-57880-3\_1}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/AbadiC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/PlotkinAC94, author = {Gordon D. Plotkin and Mart{\'{\i}}n Abadi and Luca Cardelli}, title = {Subtyping and Parametricity}, booktitle = {Proceedings of the Ninth Annual Symposium on Logic in Computer Science {(LICS} '94), Paris, France, July 4-7, 1994}, pages = {310--319}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/LICS.1994.316058}, doi = {10.1109/LICS.1994.316058}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/PlotkinAC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/AbadiC94, author = {Mart{\'{\i}}n Abadi and Luca Cardelli}, title = {A Semantics of Object Types}, booktitle = {Proceedings of the Ninth Annual Symposium on Logic in Computer Science {(LICS} '94), Paris, France, July 4-7, 1994}, pages = {332--341}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/LICS.1994.316056}, doi = {10.1109/LICS.1994.316056}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/AbadiC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/AbadiL94, author = {Mart{\'{\i}}n Abadi and Leslie Lamport}, editor = {James H. Anderson and David Peleg and Elizabeth Borowsky}, title = {Open Systems in {TLA}}, booktitle = {Proceedings of the Thirteenth Annual {ACM} Symposium on Principles of Distributed Computing, Los Angeles, California, USA, August 14-17, 1994}, pages = {81--90}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/197917.197960}, doi = {10.1145/197917.197960}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/AbadiL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/procomet/AbadiL94, author = {Mart{\'{\i}}n Abadi and Leslie Lamport}, editor = {Ernst{-}R{\"{u}}diger Olderog}, title = {Decomposing Specifications of Concurrent Systems}, booktitle = {Programming Concepts, Methods and Calculi, Proceedings of the {IFIP} {TC2/WG2.1/WG2.2/WG2.3} Working Conference on Programming Concepts, Methods and Calculi {(PROCOMET} '94) San Miniato, Italy, 6-10 June, 1994}, series = {{IFIP} Transactions}, volume = {{A-56}}, pages = {327--340}, publisher = {North-Holland}, year = {1994}, timestamp = {Thu, 03 Jan 2002 12:07:43 +0100}, biburl = {https://dblp.org/rec/conf/procomet/AbadiL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AbadiN94, author = {Mart{\'{\i}}n Abadi and Roger M. Needham}, title = {Prudent engineering practice for cryptographic protocols}, booktitle = {1994 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 16-18, 1994}, pages = {122--136}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/RISP.1994.296587}, doi = {10.1109/RISP.1994.296587}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/AbadiN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/AbadiC94, author = {Mart{\'{\i}}n Abadi and Luca Cardelli}, editor = {Masami Hagiya and John C. Mitchell}, title = {A Theory of Primitive Objects - Untyped and First-Order Systems}, booktitle = {Theoretical Aspects of Computer Software, International Conference {TACS} '94, Sendai, Japan, April 19-22, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {789}, pages = {296--320}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-57887-0\_101}, doi = {10.1007/3-540-57887-0\_101}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/tacs/AbadiC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/AbadiBKL93, author = {Mart{\'{\i}}n Abadi and Michael Burrows and C. Kaufman and Butler W. Lampson}, title = {Authentification and Delegation with Smart-Cards}, journal = {Sci. Comput. Program.}, volume = {21}, number = {2}, pages = {93--113}, year = {1993}, url = {https://doi.org/10.1016/0167-6423(93)90002-7}, doi = {10.1016/0167-6423(93)90002-7}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/AbadiBKL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AbadiP93, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {A Logical View of Composition}, journal = {Theor. Comput. Sci.}, volume = {114}, number = {1}, pages = {3--30}, year = {1993}, url = {https://doi.org/10.1016/0304-3975(93)90151-I}, doi = {10.1016/0304-3975(93)90151-I}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AbadiP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AbadiCC93, author = {Mart{\'{\i}}n Abadi and Luca Cardelli and Pierre{-}Louis Curien}, title = {Formal Parametric Polymorphism}, journal = {Theor. Comput. Sci.}, volume = {121}, number = {1{\&}2}, pages = {9--58}, year = {1993}, url = {https://doi.org/10.1016/0304-3975(93)90082-5}, doi = {10.1016/0304-3975(93)90082-5}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AbadiCC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/AbadiL93, author = {Mart{\'{\i}}n Abadi and Leslie Lamport}, title = {Composing Specifications}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {15}, number = {1}, pages = {73--132}, year = {1993}, url = {https://doi.org/10.1145/151646.151649}, doi = {10.1145/151646.151649}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toplas/AbadiL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/AbadiBLP93, author = {Mart{\'{\i}}n Abadi and Michael Burrows and Butler W. Lampson and Gordon D. Plotkin}, title = {A Calculus for Access Control in Distributed Systems}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {15}, number = {4}, pages = {706--734}, year = {1993}, url = {https://doi.org/10.1145/155183.155225}, doi = {10.1145/155183.155225}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/AbadiBLP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbpl/CardelliMA93, author = {Luca Cardelli and Florian Matthes and Mart{\'{\i}}n Abadi}, editor = {Catriel Beeri and Atsushi Ohori and Dennis E. Shasha}, title = {Extensible Grammars for Language Specialization}, booktitle = {Database Programming Languages (DBPL-4), Proceedings of the Fourth International Workshop on Database Programming Languages - Object Models and Languages, Manhattan, New York City, USA, 30 August - 1 September 1993}, series = {Workshops in Computing}, pages = {11--31}, publisher = {Springer}, year = {1993}, timestamp = {Thu, 11 Aug 2016 11:10:45 +0200}, biburl = {https://dblp.org/rec/conf/dbpl/CardelliMA93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiCC93, author = {Mart{\'{\i}}n Abadi and Luca Cardelli and Pierre{-}Louis Curien}, editor = {Mary S. Van Deusen and Bernard Lang}, title = {Formal Parametric Polymorphism}, booktitle = {Conference Record of the Twentieth Annual {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, Charleston, South Carolina, USA, January 1993}, pages = {157--170}, publisher = {{ACM} Press}, year = {1993}, url = {https://doi.org/10.1145/158511.158622}, doi = {10.1145/158511.158622}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/AbadiCC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/WobberABL93, author = {Edward Wobber and Mart{\'{\i}}n Abadi and Michael Burrows and Butler W. Lampson}, editor = {Andrew P. Black and Barbara Liskov}, title = {Authentication in the Taos Operating System}, booktitle = {Proceedings of the Fourteenth {ACM} Symposium on Operating System Principles, {SOSP} 1993, The Grove Park Inn and Country Club, Asheville, North Carolina, USA, December 5-8, 1993}, pages = {256--269}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168619.168640}, doi = {10.1145/168619.168640}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/WobberABL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tlca/PlotkinA93, author = {Gordon D. Plotkin and Mart{\'{\i}}n Abadi}, editor = {Marc Bezem and Jan Friso Groote}, title = {A Logic for Parametric Polymorphism}, booktitle = {Typed Lambda Calculi and Applications, International Conference on Typed Lambda Calculi and Applications, {TLCA} '93, Utrecht, The Netherlands, March 16-18, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {664}, pages = {361--375}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/BFb0037118}, doi = {10.1007/BFB0037118}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/tlca/PlotkinA93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/LampsonABW92, author = {Butler W. Lampson and Mart{\'{\i}}n Abadi and Michael Burrows and Edward Wobber}, title = {Authentication in Distributed Systems: Theory and Practice}, journal = {{ACM} Trans. Comput. Syst.}, volume = {10}, number = {4}, pages = {265--310}, year = {1992}, url = {https://doi.org/10.1145/138873.138874}, doi = {10.1145/138873.138874}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/LampsonABW92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/GonthierAL92, author = {Georges Gonthier and Mart{\'{\i}}n Abadi and Jean{-}Jacques L{\'{e}}vy}, title = {Linear Logic Without Boxes}, booktitle = {Proceedings of the Seventh Annual Symposium on Logic in Computer Science {(LICS} '92), Santa Cruz, California, USA, June 22-25, 1992}, pages = {223--234}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/LICS.1992.185535}, doi = {10.1109/LICS.1992.185535}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/GonthierAL92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/GonthierAL92, author = {Georges Gonthier and Mart{\'{\i}}n Abadi and Jean{-}Jacques L{\'{e}}vy}, editor = {Ravi Sethi}, title = {The Geometry of Optimal Lambda Reduction}, booktitle = {Conference Record of the Nineteenth Annual {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, Albuquerque, New Mexico, USA, January 19-22, 1992}, pages = {15--26}, publisher = {{ACM} Press}, year = {1992}, url = {https://doi.org/10.1145/143165.143172}, doi = {10.1145/143165.143172}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/GonthierAL92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/AbadiPP91, author = {Mart{\'{\i}}n Abadi and Benjamin C. Pierce and Gordon D. Plotkin}, title = {Faithful Ideal Models for Recursive Polymorphic Types}, journal = {Int. J. Found. Comput. Sci.}, volume = {2}, number = {1}, pages = {1--21}, year = {1991}, url = {https://doi.org/10.1142/S0129054191000029}, doi = {10.1142/S0129054191000029}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/AbadiPP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/AbadiAAFKLS91, author = {Mart{\'{\i}}n Abadi and Bowen Alpern and Krzysztof R. Apt and Nissim Francez and Shmuel Katz and Leslie Lamport and Fred B. Schneider}, title = {Preserving Liveness: Comments on "Safety and Liveness from a Methodological Point of View"}, journal = {Inf. Process. Lett.}, volume = {40}, number = {3}, pages = {141--142}, year = {1991}, url = {https://doi.org/10.1016/0020-0190(91)90168-H}, doi = {10.1016/0020-0190(91)90168-H}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/AbadiAAFKLS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/AbadiCCL91, author = {Mart{\'{\i}}n Abadi and Luca Cardelli and Pierre{-}Louis Curien and Jean{-}Jacques L{\'{e}}vy}, title = {Explicit Substitutions}, journal = {J. Funct. Program.}, volume = {1}, number = {4}, pages = {375--416}, year = {1991}, url = {https://doi.org/10.1017/S0956796800000186}, doi = {10.1017/S0956796800000186}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/AbadiCCL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AbadiL91, author = {Mart{\'{\i}}n Abadi and Leslie Lamport}, title = {The Existence of Refinement Mappings}, journal = {Theor. Comput. Sci.}, volume = {82}, number = {2}, pages = {253--284}, year = {1991}, url = {https://doi.org/10.1016/0304-3975(91)90224-P}, doi = {10.1016/0304-3975(91)90224-P}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AbadiL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/AbadiCPP91, author = {Mart{\'{\i}}n Abadi and Luca Cardelli and Benjamin C. Pierce and Gordon D. Plotkin}, title = {Dynamic Typing in a Statically Typed Language}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {13}, number = {2}, pages = {237--268}, year = {1991}, url = {https://doi.org/10.1145/103135.103138}, doi = {10.1145/103135.103138}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/AbadiCPP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbadiBLP91, author = {Mart{\'{\i}}n Abadi and Michael Burrows and Butler W. Lampson and Gordon D. Plotkin}, editor = {Joan Feigenbaum}, title = {A Calculus for Access Control in Distributed Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {1--23}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_1}, doi = {10.1007/3-540-46766-1\_1}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbadiBLP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/AbadiT91, author = {Mart{\'{\i}}n Abadi and Mark R. Tuttle}, editor = {Luigi Logrippo}, title = {A Semantics for a Logic of Authentication (Extended Abstract)}, booktitle = {Proceedings of the Tenth Annual {ACM} Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, August 19-21, 1991}, pages = {201--216}, publisher = {{ACM}}, year = {1991}, url = {https://doi.org/10.1145/112600.112618}, doi = {10.1145/112600.112618}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/AbadiT91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiP91, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, editor = {David S. Wise}, title = {A Logical View of Composition and Refinement}, booktitle = {Conference Record of the Eighteenth Annual {ACM} Symposium on Principles of Programming Languages, Orlando, Florida, USA, January 21-23, 1991}, pages = {323--332}, publisher = {{ACM} Press}, year = {1991}, url = {https://doi.org/10.1145/99583.99626}, doi = {10.1145/99583.99626}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/AbadiP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rex/AbadiL91, author = {Mart{\'{\i}}n Abadi and Leslie Lamport}, editor = {J. W. de Bakker and Cornelis Huizing and Willem P. de Roever and Grzegorz Rozenberg}, title = {An Old-Fashioned Recipe for Real Time}, booktitle = {Real-Time: Theory in Practice, {REX} Workshop, Mook, The Netherlands, June 3-7, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {600}, pages = {1--27}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/BFb0031985}, doi = {10.1007/BFB0031985}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/rex/AbadiL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/LampsonABW91, author = {Butler W. Lampson and Mart{\'{\i}}n Abadi and Michael Burrows and Edward Wobber}, editor = {Henry M. Levy}, title = {Authentication in Distributed Systems: Theory and Practice}, booktitle = {Proceedings of the Thirteenth {ACM} Symposium on Operating System Principles, {SOSP} 1991, Asilomar Conference Center, Pacific Grove, California, USA, October 13-16, 1991}, pages = {165--182}, publisher = {{ACM}}, year = {1991}, url = {https://doi.org/10.1145/121132.121160}, doi = {10.1145/121132.121160}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/LampsonABW91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacs/AbadiBKL91, author = {Mart{\'{\i}}n Abadi and Michael Burrows and C. Kaufman and Butler W. Lampson}, editor = {Takayasu Ito and Albert R. Meyer}, title = {Authentication and Delegation with Smart-cards}, booktitle = {Theoretical Aspects of Computer Software, International Conference {TACS} '91, Sendai, Japan, September 24-27, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {526}, pages = {326--345}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54415-1\_53}, doi = {10.1007/3-540-54415-1\_53}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/tacs/AbadiBKL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/AbadiM90, author = {Mart{\'{\i}}n Abadi and Zohar Manna}, title = {Nonclausal Deduction in First-Order Temporal Logic}, journal = {J. {ACM}}, volume = {37}, number = {2}, pages = {279--317}, year = {1990}, url = {https://doi.org/10.1145/77600.77617}, doi = {10.1145/77600.77617}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/AbadiM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbadiF90, author = {Mart{\'{\i}}n Abadi and Joan Feigenbaum}, title = {Secure Circuit Evaluation}, journal = {J. Cryptol.}, volume = {2}, number = {1}, pages = {1--12}, year = {1990}, url = {https://doi.org/10.1007/BF02252866}, doi = {10.1007/BF02252866}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbadiF90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/BurrowsAN90, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, title = {Rejoinder to Nessett}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {24}, number = {2}, pages = {39--40}, year = {1990}, url = {https://doi.org/10.1145/382258.382790}, doi = {10.1145/382258.382790}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/BurrowsAN90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Abadi90, author = {Mart{\'{\i}}n Abadi}, title = {Corrigendum: The Power of Temporal Proofs}, journal = {Theor. Comput. Sci.}, volume = {70}, number = {2}, pages = {275}, year = {1990}, url = {https://doi.org/10.1016/0304-3975(90)90128-5}, doi = {10.1016/0304-3975(90)90128-5}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Abadi90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/BurrowsAN90, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, title = {A Logic of Authentication}, journal = {{ACM} Trans. Comput. Syst.}, volume = {8}, number = {1}, pages = {18--36}, year = {1990}, url = {https://doi.org/10.1145/77648.77649}, doi = {10.1145/77648.77649}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/BurrowsAN90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/Abadi90, author = {Mart{\'{\i}}n Abadi}, editor = {Jos C. M. Baeten and Jan Willem Klop}, title = {An Axiomatization of Lamport's Temporal Logic of Actions}, booktitle = {{CONCUR} '90, Theories of Concurrency: Unification and Extension, Amsterdam, The Netherlands, August 27-30, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {458}, pages = {57--69}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0039051}, doi = {10.1007/BFB0039051}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/Abadi90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/AbadiP90, author = {Mart{\'{\i}}n Abadi and Gordon D. Plotkin}, title = {A Per Model of Polymorphism and Recursive Types}, booktitle = {Proceedings of the Fifth Annual Symposium on Logic in Computer Science {(LICS} '90), Philadelphia, Pennsylvania, USA, June 4-7, 1990}, pages = {355--365}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/LICS.1990.113761}, doi = {10.1109/LICS.1990.113761}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/AbadiP90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiCCL90, author = {Mart{\'{\i}}n Abadi and Luca Cardelli and Pierre{-}Louis Curien and Jean{-}Jacques L{\'{e}}vy}, editor = {Frances E. Allen}, title = {Explicit Substitutions}, booktitle = {Conference Record of the Seventeenth Annual {ACM} Symposium on Principles of Programming Languages, San Francisco, California, USA, January 1990}, pages = {31--46}, publisher = {{ACM} Press}, year = {1990}, url = {https://doi.org/10.1145/96709.96712}, doi = {10.1145/96709.96712}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/AbadiCCL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/AbadiFK89, author = {Mart{\'{\i}}n Abadi and Joan Feigenbaum and Joe Kilian}, title = {On Hiding Information from an Oracle}, journal = {J. Comput. Syst. Sci.}, volume = {39}, number = {1}, pages = {21--50}, year = {1989}, url = {https://doi.org/10.1016/0022-0000(89)90018-4}, doi = {10.1016/0022-0000(89)90018-4}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/AbadiFK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/AbadiM89, author = {Mart{\'{\i}}n Abadi and Zohar Manna}, title = {Temporal Logic Programming}, journal = {J. Symb. Comput.}, volume = {8}, number = {3}, pages = {277--295}, year = {1989}, url = {https://doi.org/10.1016/S0747-7171(89)80070-7}, doi = {10.1016/S0747-7171(89)80070-7}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/AbadiM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Abadi89, author = {Mart{\'{\i}}n Abadi}, title = {The Power of Temporal Proofs}, journal = {Theor. Comput. Sci.}, volume = {65}, number = {1}, pages = {35--83}, year = {1989}, url = {https://doi.org/10.1016/0304-3975(89)90138-2}, doi = {10.1016/0304-3975(89)90138-2}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Abadi89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/BurrowsAN89, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, editor = {Joan Feigenbaum and Michael Merritt}, title = {The Scope of a Logic of Authentication}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {119--126}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/07}, doi = {10.1090/DIMACS/002/07}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/BurrowsAN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/AbadiH89, author = {Mart{\'{\i}}n Abadi and Joseph Y. Halpern}, title = {Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract)}, booktitle = {30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989}, pages = {148--153}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SFCS.1989.63470}, doi = {10.1109/SFCS.1989.63470}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/AbadiH89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AbadiLW89, author = {Mart{\'{\i}}n Abadi and Leslie Lamport and Pierre Wolper}, editor = {Giorgio Ausiello and Mariangiola Dezani{-}Ciancaglini and Simona Ronchi Della Rocca}, title = {Realizable and Unrealizable Specifications of Reactive Systems}, booktitle = {Automata, Languages and Programming, 16th International Colloquium, ICALP89, Stresa, Italy, July 11-15, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {372}, pages = {1--17}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/BFb0035748}, doi = {10.1007/BFB0035748}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalp/AbadiLW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/AbadiPP89, author = {Mart{\'{\i}}n Abadi and Benjamin C. Pierce and Gordon D. Plotkin}, title = {Faithful Ideal Models for Recursive Polymorphic Types}, booktitle = {Proceedings of the Fourth Annual Symposium on Logic in Computer Science {(LICS} '89), Pacific Grove, California, USA, June 5-8, 1989}, pages = {216--225}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/LICS.1989.39176}, doi = {10.1109/LICS.1989.39176}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/AbadiPP89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/AbadiCPP89, author = {Mart{\'{\i}}n Abadi and Luca Cardelli and Benjamin C. Pierce and Gordon D. Plotkin}, title = {Dynamic Typing in a Statically-Typed Language}, booktitle = {Conference Record of the Sixteenth Annual {ACM} Symposium on Principles of Programming Languages, Austin, Texas, USA, January 11-13, 1989}, pages = {213--227}, publisher = {{ACM} Press}, year = {1989}, url = {https://doi.org/10.1145/75277.75296}, doi = {10.1145/75277.75296}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/AbadiCPP89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rex/AbadiL89, author = {Mart{\'{\i}}n Abadi and Leslie Lamport}, editor = {J. W. de Bakker and Willem P. de Roever and Grzegorz Rozenberg}, title = {Composing Specifications}, booktitle = {Stepwise Refinement of Distributed Systems, Models, Formalisms, Correctness, {REX} Workshop, Mook, The Netherlands, May 29 - June 2, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {430}, pages = {1--41}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-52559-9\_59}, doi = {10.1007/3-540-52559-9\_59}, timestamp = {Fri, 17 Jul 2020 16:12:47 +0200}, biburl = {https://dblp.org/rec/conf/rex/AbadiL89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/BurrowsAN89, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, editor = {Gregory R. Andrews}, title = {A Logic of Authentication}, booktitle = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles, {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6, 1989}, pages = {1--13}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/74850.74852}, doi = {10.1145/74850.74852}, timestamp = {Tue, 06 Nov 2018 16:59:32 +0100}, biburl = {https://dblp.org/rec/conf/sosp/BurrowsAN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbadiABFH88, author = {Mart{\'{\i}}n Abadi and Eric Allender and Andrei Z. Broder and Joan Feigenbaum and Lane A. Hemachandra}, editor = {Shafi Goldwasser}, title = {On Generating Solved Instances of Computational Problems}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {297--310}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_23}, doi = {10.1007/0-387-34799-2\_23}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbadiABFH88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/AbadiL88, author = {Mart{\'{\i}}n Abadi and Leslie Lamport}, title = {The Existence of Refinement Mappings}, booktitle = {Proceedings of the Third Annual Symposium on Logic in Computer Science {(LICS} '88), Edinburgh, Scotland, UK, July 5-8, 1988}, pages = {165--175}, publisher = {{IEEE} Computer Society}, year = {1988}, url = {https://doi.org/10.1109/LICS.1988.5115}, doi = {10.1109/LICS.1988.5115}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/AbadiL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/AbadiF88, author = {Mart{\'{\i}}n Abadi and Joan Feigenbaum}, editor = {Robert Cori and Martin Wirsing}, title = {A Simple Protocol for Secure Circuit Evaluation}, booktitle = {{STACS} 88, 5th Annual Symposium on Theoretical Aspects of Computer Science, Bordeaux, France, February 11-13, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {294}, pages = {264--272}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/BFb0035850}, doi = {10.1007/BFB0035850}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/stacs/AbadiF88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tark/BurrowsAN88, author = {Michael Burrows and Mart{\'{\i}}n Abadi and Roger M. Needham}, editor = {Moshe Y. Vardi}, title = {Authentication: {A} Practical Study in Belief and Action}, booktitle = {Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, Pacific Grove, CA, USA, March 1988}, pages = {325--342}, publisher = {Morgan Kaufmann}, year = {1988}, timestamp = {Thu, 21 Jun 2018 07:50:39 +0200}, biburl = {https://dblp.org/rec/conf/tark/BurrowsAN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Abadi87, author = {Mart{\'{\i}}n Abadi}, title = {Temporal-logic theorem proving}, school = {Stanford University, {USA}}, year = {1987}, url = {https://searchworks.stanford.edu/view/1271086}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Abadi87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/AbadiFK87, author = {Mart{\'{\i}}n Abadi and Joan Feigenbaum and Joe Kilian}, title = {On hiding information from an oracle}, booktitle = {Proceedings of the Second Annual Conference on Structure in Complexity Theory, Cornell University, Ithaca, New York, USA, June 16-19, 1987}, pages = {9}, publisher = {{IEEE} Computer Society}, year = {1987}, url = {https://ieeexplore.ieee.org/document/10319247}, timestamp = {Tue, 21 Nov 2023 11:59:25 +0100}, biburl = {https://dblp.org/rec/conf/coco/AbadiFK87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/Abadi87, author = {Mart{\'{\i}}n Abadi}, title = {The Power of Temporal Proofs}, booktitle = {Proceedings of the Symposium on Logic in Computer Science {(LICS} '87), Ithaca, New York, USA, June 22-25, 1987}, pages = {123--130}, publisher = {{IEEE} Computer Society}, year = {1987}, timestamp = {Thu, 22 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/Abadi87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/slp/AbadiM87, author = {Mart{\'{\i}}n Abadi and Zohar Manna}, title = {Temporal Logic Programming}, booktitle = {Proceedings of the 1987 Symposium on Logic Programming, San Francisco, California, USA, August 31 - September 4, 1987}, pages = {4--16}, publisher = {{IEEE-CS}}, year = {1987}, timestamp = {Wed, 04 Dec 2013 14:42:58 +0100}, biburl = {https://dblp.org/rec/conf/slp/AbadiM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/AbadiFK87, author = {Mart{\'{\i}}n Abadi and Joan Feigenbaum and Joe Kilian}, editor = {Alfred V. Aho}, title = {On Hiding Information from an Oracle (Extended Abstract)}, booktitle = {Proceedings of the 19th Annual {ACM} Symposium on Theory of Computing, 1987, New York, New York, {USA}}, pages = {195--203}, publisher = {{ACM}}, year = {1987}, url = {https://doi.org/10.1145/28395.28417}, doi = {10.1145/28395.28417}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/AbadiFK87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/AbadiM86, author = {Mart{\'{\i}}n Abadi and Zohar Manna}, editor = {J{\"{o}}rg H. Siekmann}, title = {Modal Theorem Proving}, booktitle = {8th International Conference on Automated Deduction, Oxford, England, July 27 - August 1, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {230}, pages = {172--189}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-16780-3\_89}, doi = {10.1007/3-540-16780-3\_89}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/AbadiM86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/AbadiM86, author = {Mart{\'{\i}}n Abadi and Zohar Manna}, title = {A Timely Resolution}, booktitle = {Proceedings of the Symposium on Logic in Computer Science {(LICS} '86), Cambridge, Massachusetts, USA, June 16-18, 1986}, pages = {176--186}, publisher = {{IEEE} Computer Society}, year = {1986}, timestamp = {Thu, 22 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/AbadiM86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lop/AbadiM85, author = {Mart{\'{\i}}n Abadi and Zohar Manna}, editor = {Rohit Parikh}, title = {Nonclausal Temporal Deduction}, booktitle = {Logics of Programs, Conference, Brooklyn College, New York, NY, USA, June 17-19, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {193}, pages = {1--15}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-15648-8\_1}, doi = {10.1007/3-540-15648-8\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/lop/AbadiM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.