BibTeX records: Martín Abadi

download as .bib file

@article{DBLP:journals/lmcs/AbadiP23,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {Smart Choices and the Selection Monad},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {19},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.46298/lmcs-19(2:3)2023},
  doi          = {10.46298/LMCS-19(2:3)2023},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lmcs/AbadiP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud/GogIA21,
  author       = {Ionel Gog and
                  Michael Isard and
                  Mart{\'{\i}}n Abadi},
  editor       = {Carlo Curino and
                  Georgia Koutrika and
                  Ravi Netravali},
  title        = {Falkirk Wheel: Rollback Recovery for Dataflow Systems},
  booktitle    = {SoCC '21: {ACM} Symposium on Cloud Computing, Seattle, WA, USA, November
                  1 - 4, 2021},
  pages        = {373--387},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3472883.3487011},
  doi          = {10.1145/3472883.3487011},
  timestamp    = {Sun, 31 Oct 2021 09:45:45 +0100},
  biburl       = {https://dblp.org/rec/conf/cloud/GogIA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/AbadiP21,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {Smart Choices and the Selection Monad},
  booktitle    = {36th Annual {ACM/IEEE} Symposium on Logic in Computer Science, {LICS}
                  2021, Rome, Italy, June 29 - July 2, 2021},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/LICS52264.2021.9470641},
  doi          = {10.1109/LICS52264.2021.9470641},
  timestamp    = {Fri, 09 Jul 2021 14:04:16 +0200},
  biburl       = {https://dblp.org/rec/conf/lics/AbadiP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/AbadiP20,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {A simple differentiable programming language},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {4},
  number       = {{POPL}},
  pages        = {38:1--38:28},
  year         = {2020},
  url          = {https://doi.org/10.1145/3371106},
  doi          = {10.1145/3371106},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/AbadiP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-08926,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {Smart Choices and the Selection Monad},
  journal      = {CoRR},
  volume       = {abs/2007.08926},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.08926},
  eprinttype    = {arXiv},
  eprint       = {2007.08926},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-08926.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-04523,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {A Simple Differentiable Programming Language},
  journal      = {CoRR},
  volume       = {abs/1911.04523},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.04523},
  eprinttype    = {arXiv},
  eprint       = {1911.04523},
  timestamp    = {Mon, 02 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-04523.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/AbadiBF18,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet and
                  C{\'{e}}dric Fournet},
  title        = {The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication},
  journal      = {J. {ACM}},
  volume       = {65},
  number       = {1},
  pages        = {1:1--1:41},
  year         = {2018},
  url          = {https://doi.org/10.1145/3127586},
  doi          = {10.1145/3127586},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/AbadiBF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/YuABBBDDGHHIKMM18,
  author       = {Yuan Yu and
                  Mart{\'{\i}}n Abadi and
                  Paul Barham and
                  Eugene Brevdo and
                  Mike Burrows and
                  Andy Davis and
                  Jeff Dean and
                  Sanjay Ghemawat and
                  Tim Harley and
                  Peter Hawkins and
                  Michael Isard and
                  Manjunath Kudlur and
                  Rajat Monga and
                  Derek Gordon Murray and
                  Xiaoqiang Zheng},
  editor       = {Rui Oliveira and
                  Pascal Felber and
                  Y. Charlie Hu},
  title        = {Dynamic control flow in large-scale machine learning},
  booktitle    = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto,
                  Portugal, April 23-26, 2018},
  pages        = {18:1--18:15},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3190508.3190551},
  doi          = {10.1145/3190508.3190551},
  timestamp    = {Thu, 23 Jun 2022 19:57:07 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/YuABBBDDGHHIKMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-01772,
  author       = {Yuan Yu and
                  Mart{\'{\i}}n Abadi and
                  Paul Barham and
                  Eugene Brevdo and
                  Mike Burrows and
                  Andy Davis and
                  Jeff Dean and
                  Sanjay Ghemawat and
                  Tim Harley and
                  Peter Hawkins and
                  Michael Isard and
                  Manjunath Kudlur and
                  Rajat Monga and
                  Derek Gordon Murray and
                  Xiaoqiang Zheng},
  title        = {Dynamic Control Flow in Large-Scale Machine Learning},
  journal      = {CoRR},
  volume       = {abs/1805.01772},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.01772},
  eprinttype    = {arXiv},
  eprint       = {1805.01772},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-01772.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AbadiEGMMPTZ17,
  author       = {Mart{\'{\i}}n Abadi and
                  {\'{U}}lfar Erlingsson and
                  Ian J. Goodfellow and
                  H. Brendan McMahan and
                  Ilya Mironov and
                  Nicolas Papernot and
                  Kunal Talwar and
                  Li Zhang},
  title        = {On the Protection of Private Information in Machine Learning Systems:
                  Two Recent Approches},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.10},
  doi          = {10.1109/CSF.2017.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AbadiEGMMPTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/NeelakantanLAMA17,
  author       = {Arvind Neelakantan and
                  Quoc V. Le and
                  Mart{\'{\i}}n Abadi and
                  Andrew McCallum and
                  Dario Amodei},
  title        = {Learning a Natural Language Interface with Neural Programmer},
  booktitle    = {5th International Conference on Learning Representations, {ICLR} 2017,
                  Toulon, France, April 24-26, 2017, Conference Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2017},
  url          = {https://openreview.net/forum?id=ry2YOrcge},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/NeelakantanLAMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/PapernotAEGT17,
  author       = {Nicolas Papernot and
                  Mart{\'{\i}}n Abadi and
                  {\'{U}}lfar Erlingsson and
                  Ian J. Goodfellow and
                  Kunal Talwar},
  title        = {Semi-supervised Knowledge Transfer for Deep Learning from Private
                  Training Data},
  booktitle    = {5th International Conference on Learning Representations, {ICLR} 2017,
                  Toulon, France, April 24-26, 2017, Conference Track Proceedings},
  publisher    = {OpenReview.net},
  year         = {2017},
  url          = {https://openreview.net/forum?id=HkwoSDPgg},
  timestamp    = {Thu, 04 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/PapernotAEGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/AbadiIM17,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Isard and
                  Derek Gordon Murray},
  editor       = {Tatiana Shpeisman and
                  Justin Gottschlich},
  title        = {A computational model for TensorFlow: an introduction},
  booktitle    = {Proceedings of the 1st {ACM} {SIGPLAN} International Workshop on Machine
                  Learning and Programming Languages, MAPL@PLDI 2017, Barcelona, Spain,
                  June 18, 2017},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3088525.3088527},
  doi          = {10.1145/3088525.3088527},
  timestamp    = {Tue, 06 Nov 2018 16:59:30 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/AbadiIM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-08022,
  author       = {Mart{\'{\i}}n Abadi and
                  {\'{U}}lfar Erlingsson and
                  Ian J. Goodfellow and
                  H. Brendan McMahan and
                  Ilya Mironov and
                  Nicolas Papernot and
                  Kunal Talwar and
                  Li Zhang},
  title        = {On the Protection of Private Information in Machine Learning Systems:
                  Two Recent Approaches},
  journal      = {CoRR},
  volume       = {abs/1708.08022},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.08022},
  eprinttype    = {arXiv},
  eprint       = {1708.08022},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-08022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-09665,
  author       = {Tom B. Brown and
                  Dandelion Man{\'{e}} and
                  Aurko Roy and
                  Mart{\'{\i}}n Abadi and
                  Justin Gilmer},
  title        = {Adversarial Patch},
  journal      = {CoRR},
  volume       = {abs/1712.09665},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.09665},
  eprinttype    = {arXiv},
  eprint       = {1712.09665},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-09665.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/MurrayMIIBA16,
  author       = {Derek Gordon Murray and
                  Frank McSherry and
                  Michael Isard and
                  Rebecca Isaacs and
                  Paul Barham and
                  Mart{\'{\i}}n Abadi},
  title        = {Incremental, iterative data processing with timely dataflow},
  journal      = {Commun. {ACM}},
  volume       = {59},
  number       = {10},
  pages        = {75--83},
  year         = {2016},
  url          = {https://doi.org/10.1145/2983551},
  doi          = {10.1145/2983551},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/MurrayMIIBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbadiCGMMT016,
  author       = {Mart{\'{\i}}n Abadi and
                  Andy Chu and
                  Ian J. Goodfellow and
                  H. Brendan McMahan and
                  Ilya Mironov and
                  Kunal Talwar and
                  Li Zhang},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Deep Learning with Differential Privacy},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {308--318},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978318},
  doi          = {10.1145/2976749.2978318},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AbadiCGMMT016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfp/Abadi16,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Jacques Garrigue and
                  Gabriele Keller and
                  Eijiro Sumii},
  title        = {TensorFlow: learning functions at scale},
  booktitle    = {Proceedings of the 21st {ACM} {SIGPLAN} International Conference on
                  Functional Programming, {ICFP} 2016, Nara, Japan, September 18-22,
                  2016},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2951913.2976746},
  doi          = {10.1145/2951913.2976746},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfp/Abadi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/AbadiBCCDDDGIIK16,
  author       = {Mart{\'{\i}}n Abadi and
                  Paul Barham and
                  Jianmin Chen and
                  Zhifeng Chen and
                  Andy Davis and
                  Jeffrey Dean and
                  Matthieu Devin and
                  Sanjay Ghemawat and
                  Geoffrey Irving and
                  Michael Isard and
                  Manjunath Kudlur and
                  Josh Levenberg and
                  Rajat Monga and
                  Sherry Moore and
                  Derek Gordon Murray and
                  Benoit Steiner and
                  Paul A. Tucker and
                  Vijay Vasudevan and
                  Pete Warden and
                  Martin Wicke and
                  Yuan Yu and
                  Xiaoqiang Zheng},
  editor       = {Kimberly Keeton and
                  Timothy Roscoe},
  title        = {TensorFlow: {A} System for Large-Scale Machine Learning},
  booktitle    = {12th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2016, Savannah, GA, USA, November 2-4, 2016},
  pages        = {265--283},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/osdi16/technical-sessions/presentation/abadi},
  timestamp    = {Tue, 02 Feb 2021 08:06:02 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/AbadiBCCDDDGIIK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AbadiABBCCCDDDG16,
  author       = {Mart{\'{\i}}n Abadi and
                  Ashish Agarwal and
                  Paul Barham and
                  Eugene Brevdo and
                  Zhifeng Chen and
                  Craig Citro and
                  Gregory S. Corrado and
                  Andy Davis and
                  Jeffrey Dean and
                  Matthieu Devin and
                  Sanjay Ghemawat and
                  Ian J. Goodfellow and
                  Andrew Harp and
                  Geoffrey Irving and
                  Michael Isard and
                  Yangqing Jia and
                  Rafal J{\'{o}}zefowicz and
                  Lukasz Kaiser and
                  Manjunath Kudlur and
                  Josh Levenberg and
                  Dan Man{\'{e}} and
                  Rajat Monga and
                  Sherry Moore and
                  Derek Gordon Murray and
                  Chris Olah and
                  Mike Schuster and
                  Jonathon Shlens and
                  Benoit Steiner and
                  Ilya Sutskever and
                  Kunal Talwar and
                  Paul A. Tucker and
                  Vincent Vanhoucke and
                  Vijay Vasudevan and
                  Fernanda B. Vi{\'{e}}gas and
                  Oriol Vinyals and
                  Pete Warden and
                  Martin Wattenberg and
                  Martin Wicke and
                  Yuan Yu and
                  Xiaoqiang Zheng},
  title        = {TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1603.04467},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.04467},
  eprinttype    = {arXiv},
  eprint       = {1603.04467},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AbadiABBCCCDDDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AbadiBCCDDDGIIK16,
  author       = {Mart{\'{\i}}n Abadi and
                  Paul Barham and
                  Jianmin Chen and
                  Zhifeng Chen and
                  Andy Davis and
                  Jeffrey Dean and
                  Matthieu Devin and
                  Sanjay Ghemawat and
                  Geoffrey Irving and
                  Michael Isard and
                  Manjunath Kudlur and
                  Josh Levenberg and
                  Rajat Monga and
                  Sherry Moore and
                  Derek Gordon Murray and
                  Benoit Steiner and
                  Paul A. Tucker and
                  Vijay Vasudevan and
                  Pete Warden and
                  Martin Wicke and
                  Yuan Yu and
                  Xiaoqiang Zhang},
  title        = {TensorFlow: {A} system for large-scale machine learning},
  journal      = {CoRR},
  volume       = {abs/1605.08695},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.08695},
  eprinttype    = {arXiv},
  eprint       = {1605.08695},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AbadiBCCDDDGIIK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AbadiCGMMTZ16,
  author       = {Mart{\'{\i}}n Abadi and
                  Andy Chu and
                  Ian J. Goodfellow and
                  H. Brendan McMahan and
                  Ilya Mironov and
                  Kunal Talwar and
                  Li Zhang},
  title        = {Deep Learning with Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/1607.00133},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.00133},
  eprinttype    = {arXiv},
  eprint       = {1607.00133},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AbadiCGMMTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AbadiBF16,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet and
                  C{\'{e}}dric Fournet},
  title        = {The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication},
  journal      = {CoRR},
  volume       = {abs/1609.03003},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.03003},
  eprinttype    = {arXiv},
  eprint       = {1609.03003},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AbadiBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotAEGT16,
  author       = {Nicolas Papernot and
                  Mart{\'{\i}}n Abadi and
                  {\'{U}}lfar Erlingsson and
                  Ian J. Goodfellow and
                  Kunal Talwar},
  title        = {Semi-supervised Knowledge Transfer for Deep Learning from Private
                  Training Data},
  journal      = {CoRR},
  volume       = {abs/1610.05755},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.05755},
  eprinttype    = {arXiv},
  eprint       = {1610.05755},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotAEGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AbadiA16,
  author       = {Mart{\'{\i}}n Abadi and
                  David G. Andersen},
  title        = {Learning to Protect Communications with Adversarial Neural Cryptography},
  journal      = {CoRR},
  volume       = {abs/1610.06918},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.06918},
  eprinttype    = {arXiv},
  eprint       = {1610.06918},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AbadiA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NeelakantanLAMA16,
  author       = {Arvind Neelakantan and
                  Quoc V. Le and
                  Mart{\'{\i}}n Abadi and
                  Andrew McCallum and
                  Dario Amodei},
  title        = {Learning a Natural Language Interface with Neural Programmer},
  journal      = {CoRR},
  volume       = {abs/1611.08945},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.08945},
  eprinttype    = {arXiv},
  eprint       = {1611.08945},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NeelakantanLAMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/AbadiBPSST15,
  author       = {Mart{\'{\i}}n Abadi and
                  Mike Burrows and
                  Himabindu Pucha and
                  Adam Sadovsky and
                  Asim Shankar and
                  Ankur Taly},
  editor       = {Chiara Bodei and
                  Gian{-}Luigi Ferrari and
                  Corrado Priami},
  title        = {Distributed Authorization with Distributed Grammars},
  booktitle    = {Programming Languages with Applications to Biology and Security -
                  Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9465},
  pages        = {10--26},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25527-9\_3},
  doi          = {10.1007/978-3-319-25527-9\_3},
  timestamp    = {Fri, 23 Jun 2023 22:30:53 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/AbadiBPSST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/Abadi15,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Stephan Kreutzer},
  title        = {The Prophecy of Timely Rollback (Invited Talk)},
  booktitle    = {24th {EACSL} Annual Conference on Computer Science Logic, {CSL} 2015,
                  September 7-10, 2015, Berlin, Germany},
  series       = {LIPIcs},
  volume       = {41},
  pages        = {1--1},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2015},
  url          = {https://doi.org/10.4230/LIPIcs.CSL.2015.1},
  doi          = {10.4230/LIPICS.CSL.2015.1},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csl/Abadi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fase/Abadi15,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Alexander Egyed and
                  Ina Schaefer},
  title        = {The Prophecy of Undo},
  booktitle    = {Fundamental Approaches to Software Engineering - 18th International
                  Conference, {FASE} 2015, Held as Part of the European Joint Conferences
                  on Theory and Practice of Software, {ETAPS} 2015, London, UK, April
                  11-18, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9033},
  pages        = {347--361},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46675-9\_23},
  doi          = {10.1007/978-3-662-46675-9\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fase/Abadi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/AbadiI15,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Isard},
  editor       = {Susanne Graf and
                  Mahesh Viswanathan},
  title        = {Timely Dataflow: {A} Model},
  booktitle    = {Formal Techniques for Distributed Objects, Components, and Systems
                  - 35th {IFIP} {WG} 6.1 International Conference, {FORTE} 2015, Held
                  as Part of the 10th International Federated Conference on Distributed
                  Computing Techniques, DisCoTec 2015, Grenoble, France, June 2-4, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9039},
  pages        = {131--145},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19195-9\_9},
  doi          = {10.1007/978-3-319-19195-9\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/AbadiI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/AbadiMP15,
  author       = {Mart{\'{\i}}n Abadi and
                  Frank McSherry and
                  Gordon D. Plotkin},
  editor       = {Andrew M. Pitts},
  title        = {Foundations of Differential Dataflow},
  booktitle    = {Foundations of Software Science and Computation Structures - 18th
                  International Conference, FoSSaCS 2015, Held as Part of the European
                  Joint Conferences on Theory and Practice of Software, {ETAPS} 2015,
                  London, UK, April 11-18, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9034},
  pages        = {71--83},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46678-0\_5},
  doi          = {10.1007/978-3-662-46678-0\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/AbadiMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nfm/AbadiI15,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Isard},
  editor       = {Klaus Havelund and
                  Gerard J. Holzmann and
                  Rajeev Joshi},
  title        = {Timely Rollback: Specification and Verification},
  booktitle    = {{NASA} Formal Methods - 7th International Symposium, {NFM} 2015, Pasadena,
                  CA, USA, April 27-29, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9058},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17524-9\_3},
  doi          = {10.1007/978-3-319-17524-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/nfm/AbadiI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/AbadiI15,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Isard},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {On the Flow of Data, Information, and Time},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {73--92},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_5},
  doi          = {10.1007/978-3-662-46666-7\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/AbadiI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/IsardA15,
  author       = {Michael Isard and
                  Mart{\'{\i}}n Abadi},
  title        = {Falkirk Wheel: Rollback Recovery for Dataflow Systems},
  journal      = {CoRR},
  volume       = {abs/1503.08877},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.08877},
  eprinttype    = {arXiv},
  eprint       = {1503.08877},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/IsardA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbadiBMRS15,
  author       = {Mart{\'{\i}}n Abadi and
                  Dan Boneh and
                  Ilya Mironov and
                  Ananth Raghunathan and
                  Gil Segev},
  title        = {Message-Locked Encryption for Lock-Dependent Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbadiBMRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/AbadiPP14,
  author       = {Mart{\'{\i}}n Abadi and
                  J{\'{e}}r{\'{e}}my Planul and
                  Gordon D. Plotkin},
  editor       = {Franck van Breugel and
                  Elham Kashefi and
                  Catuscia Palamidessi and
                  Jan Rutten},
  title        = {Layout Randomization and Nondeterminism},
  booktitle    = {Horizons of the Mind. {A} Tribute to Prakash Panangaden - Essays Dedicated
                  to Prakash Panangaden on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {8464},
  pages        = {1--39},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06880-0\_1},
  doi          = {10.1007/978-3-319-06880-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/AbadiPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/BiermanAT14,
  author       = {Gavin M. Bierman and
                  Mart{\'{\i}}n Abadi and
                  Mads Torgersen},
  editor       = {Richard E. Jones},
  title        = {Understanding TypeScript},
  booktitle    = {{ECOOP} 2014 - Object-Oriented Programming - 28th European Conference,
                  Uppsala, Sweden, July 28 - August 1, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8586},
  pages        = {257--281},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44202-9\_11},
  doi          = {10.1007/978-3-662-44202-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoop/BiermanAT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Delignat-LavaudABMWXR14,
  author       = {Antoine Delignat{-}Lavaud and
                  Mart{\'{\i}}n Abadi and
                  Andrew Birrell and
                  Ilya Mironov and
                  Ted Wobber and
                  Yinglian Xie},
  title        = {Web {PKI:} Closing the Gap between Guidelines and Practices},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/web-pki-closing-gap-between-guidelines-and-practices},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Delignat-LavaudABMWXR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2014,
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8},
  doi          = {10.1007/978-3-642-54792-8},
  isbn         = {978-3-642-54791-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tgc/2013,
  editor       = {Mart{\'{\i}}n Abadi and
                  Alberto Lluch{-}Lafuente},
  title        = {Trustworthy Global Computing - 8th International Symposium, {TGC}
                  2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8358},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-05119-2},
  doi          = {10.1007/978-3-319-05119-2},
  isbn         = {978-3-319-05118-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tgc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeontjevaGXYA13,
  author       = {Anna Leontjeva and
                  Mois{\'{e}}s Goldszmidt and
                  Yinglian Xie and
                  Fang Yu and
                  Mart{\'{\i}}n Abadi},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {Early security classification of skype users via machine learning},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517322},
  doi          = {10.1145/2517312.2517322},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeontjevaGXYA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangXYKAGM13,
  author       = {Junxian Huang and
                  Yinglian Xie and
                  Fang Yu and
                  Qifa Ke and
                  Mart{\'{\i}}n Abadi and
                  Eliot Gillum and
                  Zhuoqing Morley Mao},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {SocialWatch: detection of online service abuse via large-scale social
                  graphs},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {143--148},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484330},
  doi          = {10.1145/2484313.2484330},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangXYKAGM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbadiBMRS13,
  author       = {Mart{\'{\i}}n Abadi and
                  Dan Boneh and
                  Ilya Mironov and
                  Ananth Raghunathan and
                  Gil Segev},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Message-Locked Encryption for Lock-Dependent Messages},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {374--391},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_21},
  doi          = {10.1007/978-3-642-40041-4\_21},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbadiBMRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/AbadiMMR13,
  author       = {Mart{\'{\i}}n Abadi and
                  Frank McSherry and
                  Derek Gordon Murray and
                  Thomas L. Rodeheffer},
  editor       = {Dirk Beyer and
                  Michele Boreale},
  title        = {Formal Analysis of a Distributed Algorithm for Tracking Progress},
  booktitle    = {Formal Techniques for Distributed Systems - Joint {IFIP} {WG} 6.1
                  International Conference, {FMOODS/FORTE} 2013, Held as Part of the
                  8th International Federated Conference on Distributed Computing Techniques,
                  DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7892},
  pages        = {5--19},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38592-6\_2},
  doi          = {10.1007/978-3-642-38592-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/AbadiMMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/AbadiBMWX13,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew Birrell and
                  Ilya Mironov and
                  Ted Wobber and
                  Yinglian Xie},
  editor       = {Petros Maniatis},
  title        = {Global Authentication in an Untrustworthy World},
  booktitle    = {14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa
                  Ana Pueblo, New Mexico, USA, May 13-15, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/hotos13/session/abadi},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/AbadiBMWX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/AbadiP13,
  author       = {Mart{\'{\i}}n Abadi and
                  J{\'{e}}r{\'{e}}my Planul},
  editor       = {David A. Basin and
                  John C. Mitchell},
  title        = {On Layout Randomization for Arrays and Functions},
  booktitle    = {Principles of Security and Trust - Second International Conference,
                  {POST} 2013, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7796},
  pages        = {167--185},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36830-1\_9},
  doi          = {10.1007/978-3-642-36830-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/AbadiP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/MurrayMIIBA13,
  author       = {Derek Gordon Murray and
                  Frank McSherry and
                  Rebecca Isaacs and
                  Michael Isard and
                  Paul Barham and
                  Mart{\'{\i}}n Abadi},
  editor       = {Michael Kaminsky and
                  Mike Dahlin},
  title        = {Naiad: a timely dataflow system},
  booktitle    = {{ACM} {SIGOPS} 24th Symposium on Operating Systems Principles, {SOSP}
                  '13, Farmington, PA, USA, November 3-6, 2013},
  pages        = {439--455},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517349.2522738},
  doi          = {10.1145/2517349.2522738},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/MurrayMIIBA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AbadiPP13,
  author       = {Mart{\'{\i}}n Abadi and
                  J{\'{e}}r{\'{e}}my Planul and
                  Gordon D. Plotkin},
  editor       = {Dexter Kozen and
                  Michael W. Mislove},
  title        = {Layout Randomization and Nondeterminism},
  booktitle    = {Proceedings of the Twenty-ninth Conference on the Mathematical Foundations
                  of Programming Semantics, {MFPS} 2013, New Orleans, LA, USA, June
                  23-25, 2013},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {298},
  pages        = {29--50},
  publisher    = {Elsevier},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.entcs.2013.09.006},
  doi          = {10.1016/J.ENTCS.2013.09.006},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/AbadiPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbadiP12,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {On Protection by Layout Randomization},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {8:1--8:29},
  year         = {2012},
  url          = {https://doi.org/10.1145/2240276.2240279},
  doi          = {10.1145/2240276.2240279},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AbadiP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aplas/AustinFA12,
  author       = {Thomas H. Austin and
                  Cormac Flanagan and
                  Mart{\'{\i}}n Abadi},
  editor       = {Ranjit Jhala and
                  Atsushi Igarashi},
  title        = {A Functional View of Imperative Information Flow},
  booktitle    = {Programming Languages and Systems - 10th Asian Symposium, {APLAS}
                  2012, Kyoto, Japan, December 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7705},
  pages        = {34--49},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35182-2\_4},
  doi          = {10.1007/978-3-642-35182-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/aplas/AustinFA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XieYKAGVWHM12,
  author       = {Yinglian Xie and
                  Fang Yu and
                  Qifa Ke and
                  Mart{\'{\i}}n Abadi and
                  Eliot Gillum and
                  Krish Vitaldevaria and
                  Jason Walter and
                  Junxian Huang and
                  Zhuoqing Morley Mao},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Innocent by association: early recognition of legitimate users},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {353--364},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382235},
  doi          = {10.1145/2382196.2382235},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XieYKAGVWHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/Abadi12,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Dimitra Giannakopoulou and
                  Dominique M{\'{e}}ry},
  title        = {Software Security: {A} Formal Perspective - (Notes for a Talk)},
  booktitle    = {{FM} 2012: Formal Methods - 18th International Symposium, Paris, France,
                  August 27-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7436},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32759-9\_1},
  doi          = {10.1007/978-3-642-32759-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/Abadi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/YenXYYA12,
  author       = {Ting{-}Fang Yen and
                  Yinglian Xie and
                  Fang Yu and
                  Roger Peng Yu and
                  Mart{\'{\i}}n Abadi},
  title        = {Host Fingerprinting and Tracking on the Web: Privacy and Security
                  Implications},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/host-fingerprinting-and-tracking-web-privacy-and-security-implications},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/YenXYYA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/AbadiBHI11,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew Birrell and
                  Tim Harris and
                  Michael Isard},
  title        = {Semantics of transactional memory and automatic mutual exclusion},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {2:1--2:50},
  year         = {2011},
  url          = {https://doi.org/10.1145/1889997.1889999},
  doi          = {10.1145/1889997.1889999},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/AbadiBHI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/HarrisAIM11,
  author       = {Tim Harris and
                  Mart{\'{\i}}n Abadi and
                  Rebecca Isaacs and
                  Ross McIlroy},
  editor       = {Cristina Videira Lopes and
                  Kathleen Fisher},
  title        = {{AC:} composable asynchronous {IO} for native languages},
  booktitle    = {Proceedings of the 26th Annual {ACM} {SIGPLAN} Conference on Object-Oriented
                  Programming, Systems, Languages, and Applications, {OOPSLA} 2011,
                  part of {SPLASH} 2011, Portland, OR, USA, October 22 - 27, 2011},
  pages        = {903--920},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2048066.2048134},
  doi          = {10.1145/2048066.2048134},
  timestamp    = {Thu, 24 Jun 2021 16:19:30 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/HarrisAIM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/BirgissonMA11,
  author       = {Arnar Birgisson and
                  Frank McSherry and
                  Mart{\'{\i}}n Abadi},
  editor       = {Aslan Askarov and
                  Joshua D. Guttman},
  title        = {Differential privacy with information flow control},
  booktitle    = {Proceedings of the 2011 Workshop on Programming Languages and Analysis
                  for Security, {PLAS} 2011, San Jose, CA, USA, 5 June, 2011},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2166956.2166958},
  doi          = {10.1145/2166956.2166958},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/BirgissonMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JohnYXKA11,
  author       = {John P. John and
                  Fang Yu and
                  Yinglian Xie and
                  Arvind Krishnamurthy and
                  Mart{\'{\i}}n Abadi},
  title        = {deSEO: Combating Search-Result Poisoning},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/John.pdf},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JohnYXKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JohnYXKA11,
  author       = {John P. John and
                  Fang Yu and
                  Yinglian Xie and
                  Arvind Krishnamurthy and
                  Mart{\'{\i}}n Abadi},
  editor       = {Sadagopan Srinivasan and
                  Krithi Ramamritham and
                  Arun Kumar and
                  M. P. Ravindra and
                  Elisa Bertino and
                  Ravi Kumar},
  title        = {Heat-seeking honeypots: design and experience},
  booktitle    = {Proceedings of the 20th International Conference on World Wide Web,
                  {WWW} 2011, Hyderabad, India, March 28 - April 1, 2011},
  pages        = {207--216},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1963405.1963437},
  doi          = {10.1145/1963405.1963437},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/JohnYXKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1009-2405,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {A Model of Cooperative Threads},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {6},
  number       = {4},
  year         = {2010},
  url          = {https://doi.org/10.2168/LMCS-6(4:2)2010},
  doi          = {10.2168/LMCS-6(4:2)2010},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1009-2405.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AbadiHM10,
  author       = {Mart{\'{\i}}n Abadi and
                  Tim Harris and
                  Katherine F. Moore},
  title        = {A model of dynamic separation for transactional memory},
  journal      = {Inf. Comput.},
  volume       = {208},
  number       = {10},
  pages        = {1093--1117},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ic.2009.09.004},
  doi          = {10.1016/J.IC.2009.09.004},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/AbadiHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BaudetWA10,
  author       = {Mathieu Baudet and
                  Bogdan Warinschi and
                  Mart{\'{\i}}n Abadi},
  title        = {Guessing attacks and the computational soundness of static equivalence},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {909--968},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0386},
  doi          = {10.3233/JCS-2009-0386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BaudetWA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AbadiP10,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {On Protection by Layout Randomization},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {337--351},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.30},
  doi          = {10.1109/CSF.2010.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AbadiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/PitsillidisXYAVS10,
  author       = {Andreas Pitsillidis and
                  Yinglian Xie and
                  Fang Yu and
                  Mart{\'{\i}}n Abadi and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  editor       = {Geoffrey G. Xie and
                  Robert Beverly and
                  Robert Tappan Morris and
                  Bruce Davie},
  title        = {How to tell an airport from a home: techniques and applications},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Hot Topics in Networks. HotNets
                  2010, Monterey, CA, {USA} - October 20 - 21, 2010},
  pages        = {13},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1868447.1868460},
  doi          = {10.1145/1868447.1868460},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotnets/PitsillidisXYAVS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/Abadi10,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {The Fine Print of Security},
  booktitle    = {Proceedings of the 25th Annual {IEEE} Symposium on Logic in Computer
                  Science, {LICS} 2010, 11-14 July 2010, Edinburgh, United Kingdom},
  pages        = {110},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/LICS.2010.9},
  doi          = {10.1109/LICS.2010.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/Abadi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JohnYXAK10,
  author       = {John P. John and
                  Fang Yu and
                  Yinglian Xie and
                  Mart{\'{\i}}n Abadi and
                  Arvind Krishnamurthy},
  title        = {Searching the Searchers with SearchAudit},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {127--142},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/John.pdf},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JohnYXAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbadiBEL09,
  author       = {Mart{\'{\i}}n Abadi and
                  Mihai Budiu and
                  {\'{U}}lfar Erlingsson and
                  Jay Ligatti},
  title        = {Control-flow integrity principles, implementations, and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {4:1--4:40},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609960},
  doi          = {10.1145/1609956.1609960},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AbadiBEL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/AbadiBC09,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet and
                  Hubert Comon{-}Lundh},
  editor       = {Ahmed Bouajjani and
                  Oded Maler},
  title        = {Models and Proofs of Protocol Security: {A} Progress Report},
  booktitle    = {Computer Aided Verification, 21st International Conference, {CAV}
                  2009, Grenoble, France, June 26 - July 2, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5643},
  pages        = {35--49},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02658-4\_5},
  doi          = {10.1007/978-3-642-02658-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/AbadiBC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cc/AbadiBHHI09,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew Birrell and
                  Tim Harris and
                  Johnson Hsieh and
                  Michael Isard},
  editor       = {Oege de Moor and
                  Michael I. Schwartzbach},
  title        = {Implementation and Use of Transactional Memory with Dynamic Separation},
  booktitle    = {Compiler Construction, 18th International Conference, {CC} 2009, Held
                  as Part of the Joint European Conferences on Theory and Practice of
                  Software, {ETAPS} 2009, York, UK, March 22-29, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5501},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00722-4\_6},
  doi          = {10.1007/978-3-642-00722-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/cc/AbadiBHHI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/AbadiH09,
  author       = {Mart{\'{\i}}n Abadi and
                  Tim Harris},
  editor       = {Mario Bravetti and
                  Gianluigi Zavattaro},
  title        = {Perspectives on Transactional Memory},
  booktitle    = {{CONCUR} 2009 - Concurrency Theory, 20th International Conference,
                  {CONCUR} 2009, Bologna, Italy, September 1-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5710},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04081-8\_1},
  doi          = {10.1007/978-3-642-04081-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/AbadiH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/Abadi09,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Logic in Access Control (Tutorial Notes)},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {145--165},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_5},
  doi          = {10.1007/978-3-642-03829-7\_5},
  timestamp    = {Thu, 14 Oct 2021 10:12:35 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/Abadi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/ZhouMLA09,
  author       = {Wenchao Zhou and
                  Yun Mao and
                  Boon Thau Loo and
                  Mart{\'{\i}}n Abadi},
  editor       = {Yannis E. Ioannidis and
                  Dik Lun Lee and
                  Raymond T. Ng},
  title        = {Unified Declarative Platform for Secure Netwoked Information Systems},
  booktitle    = {Proceedings of the 25th International Conference on Data Engineering,
                  {ICDE} 2009, March 29 2009 - April 2 2009, Shanghai, China},
  pages        = {150--161},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDE.2009.58},
  doi          = {10.1109/ICDE.2009.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/ZhouMLA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiP09,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  editor       = {Zhong Shao and
                  Benjamin C. Pierce},
  title        = {A model of cooperative threads},
  booktitle    = {Proceedings of the 36th {ACM} {SIGPLAN-SIGACT} Symposium on Principles
                  of Programming Languages, {POPL} 2009, Savannah, GA, USA, January
                  21-23, 2009},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1480881.1480887},
  doi          = {10.1145/1480881.1480887},
  timestamp    = {Fri, 25 Jun 2021 14:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppopp/AbadiHM09,
  author       = {Mart{\'{\i}}n Abadi and
                  Tim Harris and
                  Mojtaba Mehrara},
  editor       = {Daniel A. Reed and
                  Vivek Sarkar},
  title        = {Transactional memory with strong atomicity using off-the-shelf memory
                  protection hardware},
  booktitle    = {Proceedings of the 14th {ACM} {SIGPLAN} Symposium on Principles and
                  Practice of Parallel Programming, {PPOPP} 2009, Raleigh, NC, USA,
                  February 14-18, 2009},
  pages        = {185--196},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1504176.1504203},
  doi          = {10.1145/1504176.1504203},
  timestamp    = {Sun, 12 Jun 2022 19:46:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ppopp/AbadiHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/XieYA09,
  author       = {Yinglian Xie and
                  Fang Yu and
                  Mart{\'{\i}}n Abadi},
  editor       = {Pablo Rodriguez and
                  Ernst W. Biersack and
                  Konstantina Papagiannaki and
                  Luigi Rizzo},
  title        = {De-anonymizing the internet using unreliable IDs},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2009 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Barcelona, Spain, August 16-21, 2009},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1592568.1592579},
  doi          = {10.1145/1592568.1592579},
  timestamp    = {Wed, 12 Jan 2022 13:48:25 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/XieYA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/AbadiW08,
  author       = {Mart{\'{\i}}n Abadi and
                  Bogdan Warinschi},
  title        = {Security analysis of cryptographically controlled access to {XML}
                  documents},
  journal      = {J. {ACM}},
  volume       = {55},
  number       = {2},
  pages        = {6:1--6:29},
  year         = {2008},
  url          = {https://doi.org/10.1145/1346330.1346331},
  doi          = {10.1145/1346330.1346331},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/AbadiW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/BlanchetAF08,
  author       = {Bruno Blanchet and
                  Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet},
  title        = {Automated verification of selected equivalences for security protocols},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {75},
  number       = {1},
  pages        = {3--51},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jlap.2007.06.002},
  doi          = {10.1016/J.JLAP.2007.06.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/BlanchetAF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Abadi08,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Pierpaolo Degano and
                  Rocco De Nicola and
                  Jos{\'{e}} Meseguer},
  title        = {Automatic Mutual Exclusion and Atomicity Checks},
  booktitle    = {Concurrency, Graphs and Models, Essays Dedicated to Ugo Montanari
                  on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {5065},
  pages        = {510--526},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68679-8\_32},
  doi          = {10.1007/978-3-540-68679-8\_32},
  timestamp    = {Thu, 21 Sep 2023 09:08:34 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Abadi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Abadi08,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {The good, the bad, and the provable},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455772},
  doi          = {10.1145/1455770.1455772},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Abadi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/AbadiHM08,
  author       = {Mart{\'{\i}}n Abadi and
                  Tim Harris and
                  Katherine F. Moore},
  editor       = {Franck van Breugel and
                  Marsha Chechik},
  title        = {A Model of Dynamic Separation for Transactional Memory},
  booktitle    = {{CONCUR} 2008 - Concurrency Theory, 19th International Conference,
                  {CONCUR} 2008, Toronto, Canada, August 19-22, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5201},
  pages        = {6--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85361-9\_5},
  doi          = {10.1007/978-3-540-85361-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/AbadiHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/deon/Abadi08,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Ron van der Meyden and
                  Leendert W. N. van der Torre},
  title        = {Variations in Access Control Logic},
  booktitle    = {Deontic Logic in Computer Science, 9th International Conference, {DEON}
                  2008, Luxembourg, Luxembourg, July 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5076},
  pages        = {96--109},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70525-3\_9},
  doi          = {10.1007/978-3-540-70525-3\_9},
  timestamp    = {Thu, 14 Oct 2021 10:16:00 +0200},
  biburl       = {https://dblp.org/rec/conf/deon/Abadi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MaffeisAFG08,
  author       = {Sergio Maffeis and
                  Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet and
                  Andrew D. Gordon},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Code-Carrying Authorization},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {563--579},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_36},
  doi          = {10.1007/978-3-540-88313-5\_36},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MaffeisAFG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/GargA08,
  author       = {Deepak Garg and
                  Mart{\'{\i}}n Abadi},
  editor       = {Roberto M. Amadio},
  title        = {A Modal Deconstruction of Access Control Logics},
  booktitle    = {Foundations of Software Science and Computational Structures, 11th
                  International Conference, {FOSSACS} 2008, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2008,
                  Budapest, Hungary, March 29 - April 6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4962},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78499-9\_16},
  doi          = {10.1007/978-3-540-78499-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/GargA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiBHI08,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew Birrell and
                  Tim Harris and
                  Michael Isard},
  editor       = {George C. Necula and
                  Philip Wadler},
  title        = {Semantics of transactional memory and automatic mutual exclusion},
  booktitle    = {Proceedings of the 35th {ACM} {SIGPLAN-SIGACT} Symposium on Principles
                  of Programming Languages, {POPL} 2008, San Francisco, California,
                  USA, January 7-12, 2008},
  pages        = {63--74},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1328438.1328449},
  doi          = {10.1145/1328438.1328449},
  timestamp    = {Fri, 25 Jun 2021 14:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiBHI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbadiR07,
  author       = {Mart{\'{\i}}n Abadi and
                  Phillip Rogaway},
  title        = {Reconciling Two Views of Cryptography (The Computational Soundness
                  of Formal Encryption)},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {3},
  pages        = {395},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-007-0203-0},
  doi          = {10.1007/S00145-007-0203-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbadiR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbadiBF07,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet and
                  C{\'{e}}dric Fournet},
  title        = {Just fast keying in the pi calculus},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {9},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266977.1266978},
  doi          = {10.1145/1266977.1266978},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AbadiBF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/AbadiP07,
  author       = {Mart{\'{\i}}n Abadi and
                  Jens Palsberg},
  title        = {Editorial},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {29},
  number       = {3},
  pages        = {14},
  year         = {2007},
  url          = {https://doi.org/10.1145/1232420.1232421},
  doi          = {10.1145/1232420.1232421},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/AbadiP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atva/WhiteheadJA07,
  author       = {Nathan Whitehead and
                  Jordan Johnson and
                  Mart{\'{\i}}n Abadi},
  editor       = {Kedar S. Namjoshi and
                  Tomohiro Yoneda and
                  Teruo Higashino and
                  Yoshio Okamura},
  title        = {Policies and Proofs for Code Auditing},
  booktitle    = {Automated Technology for Verification and Analysis, 5th International
                  Symposium, {ATVA} 2007, Tokyo, Japan, October 22-25, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4762},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75596-8\_1},
  doi          = {10.1007/978-3-540-75596-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/atva/WhiteheadJA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/WobberYABS07,
  author       = {Ted Wobber and
                  Aydan R. Yumerefendi and
                  Mart{\'{\i}}n Abadi and
                  Andrew Birrell and
                  Daniel R. Simon},
  editor       = {Paulo Ferreira and
                  Thomas R. Gross and
                  Lu{\'{\i}}s Veiga},
  title        = {Authorizing applications in singularity},
  booktitle    = {Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March
                  21-23, 2007},
  pages        = {355--368},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1272996.1273033},
  doi          = {10.1145/1272996.1273033},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/WobberYABS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/Abadi07,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Alessandro Aldini and
                  Roberto Gorrieri},
  title        = {Security Protocols: Principles and Calculi},
  booktitle    = {Foundations of Security Analysis and Design IV, {FOSAD} 2006/2007
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {4677},
  pages        = {1--23},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74810-6\_1},
  doi          = {10.1007/978-3-540-74810-6\_1},
  timestamp    = {Thu, 14 Oct 2021 10:12:35 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/Abadi07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/AbadiL07,
  author       = {Mart{\'{\i}}n Abadi and
                  Boon Thau Loo},
  editor       = {Brian Cooper and
                  Nick Feamster},
  title        = {Towards a Declarative Language and System for Secure Networking},
  booktitle    = {Third International Workshop on Networking Meets Databases, NetDB'07,
                  Cambridge, MA, USA, April 10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/netdb-07/towards-declarative-language-and-system-secure-networking},
  timestamp    = {Tue, 02 Feb 2021 08:05:49 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/AbadiL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Abadi07,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Luca Cardelli and
                  Marcelo Fiore and
                  Glynn Winskel},
  title        = {Access Control in a Core Calculus of Dependency},
  booktitle    = {Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {172},
  pages        = {5--31},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.02.002},
  doi          = {10.1016/J.ENTCS.2007.02.002},
  timestamp    = {Tue, 24 Jan 2023 11:36:28 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Abadi07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AbadiC06,
  author       = {Mart{\'{\i}}n Abadi and
                  V{\'{e}}ronique Cortier},
  title        = {Deciding knowledge in security protocols under equational theories},
  journal      = {Theor. Comput. Sci.},
  volume       = {367},
  number       = {1-2},
  pages        = {2--32},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2006.08.032},
  doi          = {10.1016/J.TCS.2006.08.032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/AbadiC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/AbadiFF06,
  author       = {Mart{\'{\i}}n Abadi and
                  Cormac Flanagan and
                  Stephen N. Freund},
  title        = {Types for safe locking: Static race detection for Java},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {28},
  number       = {2},
  pages        = {207--255},
  year         = {2006},
  url          = {https://doi.org/10.1145/1119479.1119480},
  doi          = {10.1145/1119479.1119480},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/AbadiFF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aplas/AbadiCF06,
  author       = {Mart{\'{\i}}n Abadi and
                  Ricardo Corin and
                  C{\'{e}}dric Fournet},
  editor       = {Naoki Kobayashi},
  title        = {Computational Secrecy by Typing for the Pi Calculus},
  booktitle    = {Programming Languages and Systems, 4th Asian Symposium, {APLAS} 2006,
                  Sydney, Australia, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4279},
  pages        = {253--269},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11924661\_16},
  doi          = {10.1007/11924661\_16},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/aplas/AbadiCF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/BudiuEA06,
  author       = {Mihai Budiu and
                  {\'{U}}lfar Erlingsson and
                  Mart{\'{\i}}n Abadi},
  editor       = {Josep Torrellas},
  title        = {Architectural support for software-based protection},
  booktitle    = {Proceedings of the 1st Workshop on Architectural and System Support
                  for Improving Software Dependability, {ASID} 2006, San Jose, California,
                  USA, October 21, 2006},
  pages        = {42--51},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1181309.1181316},
  doi          = {10.1145/1181309.1181316},
  timestamp    = {Wed, 07 Jul 2021 13:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/BudiuEA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChaudhuriA06,
  author       = {Avik Chaudhuri and
                  Mart{\'{\i}}n Abadi},
  title        = {Secrecy by Typing and File-Access Control},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {112--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.28},
  doi          = {10.1109/CSFW.2006.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChaudhuriA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/ChaudhuriA06,
  author       = {Avik Chaudhuri and
                  Mart{\'{\i}}n Abadi},
  editor       = {Elie Najm and
                  Jean{-}Fran{\c{c}}ois Pradat{-}Peyre and
                  V{\'{e}}ronique Donzeau{-}Gouge},
  title        = {Formal Analysis of Dynamic, Distributed File-System Access Controls},
  booktitle    = {Formal Techniques for Networked and Distributed Systems - {FORTE}
                  2006, 26th {IFIP} {WG} 6.1 International Conference, Paris, France,
                  September 26-29, 2006},
  series       = {Lecture Notes in Computer Science},
  volume       = {4229},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11888116\_8},
  doi          = {10.1007/11888116\_8},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/ChaudhuriA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/AbadiBW06,
  author       = {Mart{\'{\i}}n Abadi and
                  Mathieu Baudet and
                  Bogdan Warinschi},
  editor       = {Luca Aceto and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir},
  title        = {Guessing Attacks and the Computational Soundness of Static Equivalence},
  booktitle    = {Foundations of Software Science and Computation Structures, 9th International
                  Conference, {FOSSACS} 2006, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2006, Vienna, Austria,
                  March 25-31, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3921},
  pages        = {398--412},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11690634\_27},
  doi          = {10.1007/11690634\_27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/AbadiBW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfp/Abadi06,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {John H. Reppy and
                  Julia Lawall},
  title        = {Access control in a core calculus of dependency},
  booktitle    = {Proceedings of the 11th {ACM} {SIGPLAN} International Conference on
                  Functional Programming, {ICFP} 2006, Portland, Oregon, USA, September
                  16-21, 2006},
  pages        = {263--273},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1159803.1159839},
  doi          = {10.1145/1159803.1159839},
  timestamp    = {Mon, 17 Jan 2022 15:20:18 +0100},
  biburl       = {https://dblp.org/rec/conf/icfp/Abadi06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/ErlingssonAVBN06,
  author       = {{\'{U}}lfar Erlingsson and
                  Mart{\'{\i}}n Abadi and
                  Michael Vrable and
                  Mihai Budiu and
                  George C. Necula},
  editor       = {Brian N. Bershad and
                  Jeffrey C. Mogul},
  title        = {{XFI:} Software Guards for System Address Spaces},
  booktitle    = {7th Symposium on Operating Systems Design and Implementation {(OSDI}
                  '06), November 6-8, Seattle, WA, {USA}},
  pages        = {75--88},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {http://www.usenix.org/events/osdi06/tech/erlingsson.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/ErlingssonAVBN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/AbadiB05,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet},
  title        = {Analyzing security protocols with secrecy types and logic programs},
  journal      = {J. {ACM}},
  volume       = {52},
  number       = {1},
  pages        = {102--146},
  year         = {2005},
  url          = {https://doi.org/10.1145/1044731.1044735},
  doi          = {10.1145/1044731.1044735},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/AbadiB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/AbadiMS05,
  author       = {Mart{\'{\i}}n Abadi and
                  Greg Morrisett and
                  Andrei Sabelfeld},
  title        = {"Language-Based Security"},
  journal      = {J. Funct. Program.},
  volume       = {15},
  number       = {2},
  pages        = {129},
  year         = {2005},
  url          = {https://doi.org/10.1017/S0956796804005428},
  doi          = {10.1017/S0956796804005428},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/AbadiMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/AbadiB05,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet},
  title        = {Computer-assisted verification of a protocol for certified email},
  journal      = {Sci. Comput. Program.},
  volume       = {58},
  number       = {1-2},
  pages        = {3--27},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.scico.2005.02.002},
  doi          = {10.1016/J.SCICO.2005.02.002},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/AbadiB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/AbadiBMW05,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  Mark S. Manasse and
                  Ted Wobber},
  title        = {Moderately hard, memory-bound functions},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {5},
  number       = {2},
  pages        = {299--327},
  year         = {2005},
  url          = {https://doi.org/10.1145/1064340.1064341},
  doi          = {10.1145/1064340.1064341},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/AbadiBMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChaudhuriA05,
  author       = {Avik Chaudhuri and
                  Mart{\'{\i}}n Abadi},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {Formal security analysis of basic network-attached storage},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {43--52},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103583},
  doi          = {10.1145/1103576.1103583},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChaudhuriA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbadiBEL05,
  author       = {Mart{\'{\i}}n Abadi and
                  Mihai Budiu and
                  {\'{U}}lfar Erlingsson and
                  Jay Ligatti},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Control-flow integrity},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {340--353},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102165},
  doi          = {10.1145/1102120.1102165},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AbadiBEL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/AbadiC05,
  author       = {Mart{\'{\i}}n Abadi and
                  V{\'{e}}ronique Cortier},
  title        = {Deciding Knowledge in Security Protocols under (Many More) Equational
                  Theories},
  booktitle    = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005),
                  20-22 June 2005, Aix-en-Provence, France},
  pages        = {62--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSFW.2005.14},
  doi          = {10.1109/CSFW.2005.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/AbadiC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/AbadiBW05,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew Birrell and
                  Ted Wobber},
  title        = {Access Control in a World of Software Diversity},
  booktitle    = {Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating
                  Systems, June 12-15, 2005, Santa Fe, New Mexico, {USA}},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {http://www.usenix.org/events/hotos05/final\_papers/full\_papers/abadi/abadi.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotos/AbadiBW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AbadiW05,
  author       = {Mart{\'{\i}}n Abadi and
                  Bogdan Warinschi},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Password-Based Encryption Analyzed},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {664--676},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_54},
  doi          = {10.1007/11523468\_54},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/AbadiW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/AbadiBEL05,
  author       = {Mart{\'{\i}}n Abadi and
                  Mihai Budiu and
                  {\'{U}}lfar Erlingsson and
                  Jay Ligatti},
  editor       = {Kung{-}Kiu Lau and
                  Richard Banach},
  title        = {A Theory of Secure Control Flow},
  booktitle    = {Formal Methods and Software Engineering, 7th International Conference
                  on Formal Engineering Methods, {ICFEM} 2005, Manchester, UK, November
                  1-4, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3785},
  pages        = {111--124},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11576280\_9},
  doi          = {10.1007/11576280\_9},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/AbadiBEL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/BlanchetAF05,
  author       = {Bruno Blanchet and
                  Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet},
  title        = {Automated Verification of Selected Equivalences for Security Protocols},
  booktitle    = {20th {IEEE} Symposium on Logic in Computer Science {(LICS} 2005),
                  26-29 June 2005, Chicago, IL, USA, Proceedings},
  pages        = {331--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/LICS.2005.8},
  doi          = {10.1109/LICS.2005.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/BlanchetAF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/AbadiW05,
  author       = {Mart{\'{\i}}n Abadi and
                  Bogdan Warinschi},
  editor       = {Chen Li},
  title        = {Security analysis of cryptographically controlled access to {XML}
                  documents},
  booktitle    = {Proceedings of the Twenty-fourth {ACM} {SIGACT-SIGMOD-SIGART} Symposium
                  on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland,
                  {USA}},
  pages        = {108--117},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1065167.1065182},
  doi          = {10.1145/1065167.1065182},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pods/AbadiW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/concur/2005,
  editor       = {Mart{\'{\i}}n Abadi and
                  Luca de Alfaro},
  title        = {{CONCUR} 2005 - Concurrency Theory, 16th International Conference,
                  {CONCUR} 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3653},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11539452},
  doi          = {10.1007/11539452},
  isbn         = {3-540-28309-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/popl/2005,
  editor       = {Jens Palsberg and
                  Mart{\'{\i}}n Abadi},
  title        = {Proceedings of the 32nd {ACM} {SIGPLAN-SIGACT} Symposium on Principles
                  of Programming Languages, {POPL} 2005, Long Beach, California, USA,
                  January 12-14, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1040305},
  doi          = {10.1145/1040305},
  isbn         = {1-58113-830-X},
  timestamp    = {Sat, 31 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AbadiF04,
  author       = {Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet},
  title        = {Private authentication},
  journal      = {Theor. Comput. Sci.},
  volume       = {322},
  number       = {3},
  pages        = {427--476},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.tcs.2003.12.023},
  doi          = {10.1016/J.TCS.2003.12.023},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AbadiF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/WhiteheadAN04,
  author       = {Nathan Whitehead and
                  Mart{\'{\i}}n Abadi and
                  George C. Necula},
  title        = {By Reason and Authority: {A} System for Authorization of Proof-Carrying
                  Code},
  booktitle    = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
                  28-30 June 2004, Pacific Grove, CA, {USA}},
  pages        = {236--250},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.6},
  doi          = {10.1109/CSFW.2004.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/WhiteheadAN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/AbadiBF04,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet and
                  C{\'{e}}dric Fournet},
  editor       = {David A. Schmidt},
  title        = {Just Fast Keying in the Pi Calculus},
  booktitle    = {Programming Languages and Systems, 13th European Symposium on Programming,
                  {ESOP} 2004, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2004, Barcelona, Spain, March 29
                  - April 2, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2986},
  pages        = {340--354},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24725-8\_24},
  doi          = {10.1007/978-3-540-24725-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/AbadiBF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/AbadiW04,
  author       = {Mart{\'{\i}}n Abadi and
                  Ted Wobber},
  editor       = {David de Frutos{-}Escrig and
                  Manuel N{\'{u}}{\~{n}}ez},
  title        = {A Logical Account of {NGSCB}},
  booktitle    = {Formal Techniques for Networked and Distributed Systems - {FORTE}
                  2004, 24th {IFIP} {WG} 6.1 International Conference, Madrid Spain,
                  September 27-30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3235},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30232-2\_1},
  doi          = {10.1007/978-3-540-30232-2\_1},
  timestamp    = {Mon, 03 Jan 2022 22:19:32 +0100},
  biburl       = {https://dblp.org/rec/conf/forte/AbadiW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/AbadiGW04,
  author       = {Mart{\'{\i}}n Abadi and
                  Georges Gonthier and
                  Benjamin Werner},
  editor       = {Igor Walukiewicz},
  title        = {Choice in Dynamic Linking},
  booktitle    = {Foundations of Software Science and Computation Structures, 7th International
                  Conference, {FOSSACS} 2004, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain,
                  March 29 - April 2, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2987},
  pages        = {12--26},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24727-2\_3},
  doi          = {10.1007/978-3-540-24727-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/AbadiGW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AbadiC04,
  author       = {Mart{\'{\i}}n Abadi and
                  V{\'{e}}ronique Cortier},
  editor       = {Josep D{\'{\i}}az and
                  Juhani Karhum{\"{a}}ki and
                  Arto Lepist{\"{o}} and
                  Donald Sannella},
  title        = {Deciding Knowledge in Security Protocols Under Equational Theories},
  booktitle    = {Automata, Languages and Programming: 31st International Colloquium,
                  {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3142},
  pages        = {46--58},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27836-8\_7},
  doi          = {10.1007/978-3-540-27836-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/AbadiC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/WhiteheadA04,
  author       = {Nathan Whitehead and
                  Mart{\'{\i}}n Abadi},
  editor       = {Franz Baader and
                  Andrei Voronkov},
  title        = {BCiC: {A} System for Code Authentication and Verification},
  booktitle    = {Logic for Programming, Artificial Intelligence, and Reasoning, 11th
                  International Conference, {LPAR} 2004, Montevideo, Uruguay, March
                  14-18, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3452},
  pages        = {110--124},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-32275-7\_8},
  doi          = {10.1007/978-3-540-32275-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/WhiteheadA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/HayatiA04,
  author       = {Katia Hayati and
                  Mart{\'{\i}}n Abadi},
  editor       = {David M. Martin Jr. and
                  Andrei Serjantov},
  title        = {Language-Based Enforcement of Privacy Policies},
  booktitle    = {Privacy Enhancing Technologies, 4th International Workshop, {PET}
                  2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3424},
  pages        = {302--313},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11423409\_19},
  doi          = {10.1007/11423409\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/HayatiA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Abadi04,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Trusted Computing, Trusted Third Parties, and Verified Communications},
  booktitle    = {Security and Protection in Information Processing Systems, {IFIP}
                  18th WorldComputer Congress, {TC11} 19th International Information
                  Security Conference, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {147},
  pages        = {291--308},
  publisher    = {Kluwer / Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8143-X\_19},
  doi          = {10.1007/1-4020-8143-X\_19},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Abadi04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KakkarGA03,
  author       = {Pankaj Kakkar and
                  Carl A. Gunter and
                  Mart{\'{\i}}n Abadi},
  title        = {Reasoning About Secrecy for Active Networks},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {245--287},
  year         = {2003},
  url          = {https://doi.org/10.3233/jcs-2003-11205},
  doi          = {10.3233/JCS-2003-11205},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KakkarGA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AbadiB03,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet},
  title        = {Secrecy types for asymmetric communication},
  journal      = {Theor. Comput. Sci.},
  volume       = {298},
  number       = {3},
  pages        = {387--415},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0304-3975(02)00863-0},
  doi          = {10.1016/S0304-3975(02)00863-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AbadiB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/AbadiBBDW03,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew Birrell and
                  Michael Burrows and
                  Frank Dabek and
                  Ted Wobber},
  editor       = {Vijay A. Saraswat},
  title        = {Bankable Postage for Network Services},
  booktitle    = {Advances in Computing Science - {ASIAN} 2003 Programming Languages
                  and Distributed Computation, 8th Asian Computing Science Conference,
                  Mumbai, India, December 10-14, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2896},
  pages        = {72--90},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40965-6\_6},
  doi          = {10.1007/978-3-540-40965-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/AbadiBBDW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/AbadiL03,
  author       = {Mart{\'{\i}}n Abadi and
                  K. Rustan M. Leino},
  editor       = {Nachum Dershowitz},
  title        = {A Logic of Object-Oriented Programs},
  booktitle    = {Verification: Theory and Practice, Essays Dedicated to Zohar Manna
                  on the Occasion of His 64th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {2772},
  pages        = {11--41},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39910-0\_2},
  doi          = {10.1007/978-3-540-39910-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/AbadiL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/Abadi03,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Luca Cardelli},
  title        = {Built-in Object Security},
  booktitle    = {{ECOOP} 2003 - Object-Oriented Programming, 17th European Conference,
                  Darmstadt, Germany, July 21-25, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2743},
  pages        = {1},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45070-2\_1},
  doi          = {10.1007/978-3-540-45070-2\_1},
  timestamp    = {Sun, 02 Jun 2019 21:16:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoop/Abadi03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/Abadi03,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {Logic in Access Control},
  booktitle    = {18th {IEEE} Symposium on Logic in Computer Science {(LICS} 2003),
                  22-25 June 2003, Ottawa, Canada, Proceedings},
  pages        = {228},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/LICS.2003.1210062},
  doi          = {10.1109/LICS.2003.1210062},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/Abadi03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AbadiBW03,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  Ted Wobber},
  title        = {Moderately Hard, Memory-Bound Functions},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2003, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2003},
  url          = {https://www.ndss-symposium.org/ndss2003/moderately-hard-memory-bound-functions/},
  timestamp    = {Mon, 01 Feb 2021 08:42:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AbadiBW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AbadiF03,
  author       = {Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet},
  title        = {Access Control Based on Execution History},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2003, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2003},
  url          = {https://www.ndss-symposium.org/ndss2003/access-control-based-execution-history/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AbadiF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sas/AbadiB03,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet},
  editor       = {Radhia Cousot},
  title        = {Computer-Assisted Verification of a Protocol for Certified Email},
  booktitle    = {Static Analysis, 10th International Symposium, {SAS} 2003, San Diego,
                  CA, USA, June 11-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2694},
  pages        = {316--335},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44898-5\_17},
  doi          = {10.1007/3-540-44898-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sas/AbadiB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AbadiFG02,
  author       = {Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet and
                  Georges Gonthier},
  title        = {Secure Implementation of Channel Abstractions},
  journal      = {Inf. Comput.},
  volume       = {174},
  number       = {1},
  pages        = {37--83},
  year         = {2002},
  url          = {https://doi.org/10.1006/inco.2002.3086},
  doi          = {10.1006/INCO.2002.3086},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/AbadiFG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbadiR02,
  author       = {Mart{\'{\i}}n Abadi and
                  Phillip Rogaway},
  title        = {Reconciling Two Views of Cryptography (The Computational Soundness
                  of Formal Encryption)},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {2},
  pages        = {103--127},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0014-7},
  doi          = {10.1007/S00145-001-0014-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbadiR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/AbadiLP02,
  author       = {Mart{\'{\i}}n Abadi and
                  Leonid Libkin and
                  Frank Pfenning},
  title        = {Editorial},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {3},
  number       = {3},
  pages        = {335--335},
  year         = {2002},
  url          = {https://doi.org/10.1145/507382.507383},
  doi          = {10.1145/507382.507383},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocl/AbadiLP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isss2/FournetA02,
  author       = {C{\'{e}}dric Fournet and
                  Mart{\'{\i}}n Abadi},
  editor       = {Mitsuhiro Okada and
                  Benjamin C. Pierce and
                  Andre Scedrov and
                  Hideyuki Tokuda and
                  Akinori Yonezawa},
  title        = {Hiding Names: Private Authentication in the Applied Pi Calculus},
  booktitle    = {Software Security -- Theories and Systems, Mext-NSF-JSPS International
                  Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2609},
  pages        = {317--338},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36532-X\_20},
  doi          = {10.1007/3-540-36532-X\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/isss2/FournetA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/Abadi02,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Roger Dingledine and
                  Paul F. Syverson},
  title        = {Private Authentication},
  booktitle    = {Privacy Enhancing Technologies, Second International Workshop, {PET}
                  2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2482},
  pages        = {27--40},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36467-6\_3},
  doi          = {10.1007/3-540-36467-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/Abadi02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiB02,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet},
  editor       = {John Launchbury and
                  John C. Mitchell},
  title        = {Analyzing security protocols with secrecy types and logic programs},
  booktitle    = {Conference Record of {POPL} 2002: The 29th {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, Portland, OR, USA, January
                  16-18, 2002},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/503272.503277},
  doi          = {10.1145/503272.503277},
  timestamp    = {Wed, 07 Jul 2021 17:30:33 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/AbadiG02,
  author       = {Mart{\'{\i}}n Abadi and
                  Neal Glew},
  editor       = {David Lassner and
                  David De Roure and
                  Arun Iyengar},
  title        = {Certified email with a light on-line trusted third party: design and
                  implementation},
  booktitle    = {Proceedings of the Eleventh International World Wide Web Conference,
                  {WWW} 2002, May 7-11, 2002, Honolulu, Hawaii, {USA}},
  pages        = {387--395},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/511446.511497},
  doi          = {10.1145/511446.511497},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/AbadiG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FioreA01,
  author       = {Marcelo P. Fiore and
                  Mart{\'{\i}}n Abadi},
  title        = {Computing Symbolic Models for Verifying Cryptographic Protocols},
  booktitle    = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
                  11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages        = {160--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSFW.2001.930144},
  doi          = {10.1109/CSFW.2001.930144},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FioreA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/AbadiB01,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet},
  editor       = {Furio Honsell and
                  Marino Miculan},
  title        = {Secrecy Types for Asymmetric Communication},
  booktitle    = {Foundations of Software Science and Computation Structures, 4th International
                  Conference, {FOSSACS} 2001 Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2001 Genova, Italy, April
                  2-6, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2030},
  pages        = {25--41},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45315-6\_2},
  doi          = {10.1007/3-540-45315-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/AbadiB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Abadi01,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Ajay D. Kshemkalyani and
                  Nir Shavit},
  title        = {Leslie Lamport's properties and actions},
  booktitle    = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA,
                  August 26-29, 2001},
  pages        = {15},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/383962.383973},
  doi          = {10.1145/383962.383973},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/Abadi01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiF01,
  author       = {Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet},
  editor       = {Chris Hankin and
                  Dave Schmidt},
  title        = {Mobile values, new names, and secure communication},
  booktitle    = {Conference Record of {POPL} 2001: The 28th {ACM} {SIGPLAN-SIGACT}
                  Symposium on Principles of Programming Languages, London, UK, January
                  17-19, 2001},
  pages        = {104--115},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/360204.360213},
  doi          = {10.1145/360204.360213},
  timestamp    = {Wed, 07 Jul 2021 17:30:33 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/AbadiJ01,
  author       = {Mart{\'{\i}}n Abadi and
                  Jan J{\"{u}}rjens},
  editor       = {Naoki Kobayashi and
                  Benjamin C. Pierce},
  title        = {Formal Eavesdropping and Its Computational Interpretation},
  booktitle    = {Theoretical Aspects of Computer Software, 4th International Symposium,
                  {TACS} 2001, Sendai, Japan, October 29-31, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2215},
  pages        = {82--94},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45500-0\_4},
  doi          = {10.1007/3-540-45500-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/AbadiJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mscs/Abadi00,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {top-top-closed relations and admissibility},
  journal      = {Math. Struct. Comput. Sci.},
  volume       = {10},
  number       = {3},
  pages        = {313--320},
  year         = {2000},
  url          = {http://journals.cambridge.org/action/displayAbstract?aid=44649},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mscs/Abadi00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Abadi00,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Mihir Bellare},
  title        = {Taming the Adversary},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {353--358},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_22},
  doi          = {10.1007/3-540-44598-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Abadi00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KakkarGA00,
  author       = {Pankaj Kakkar and
                  Carl A. Gunter and
                  Mart{\'{\i}}n Abadi},
  title        = {Reasoning about Secrecy for Active Networks},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {118--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856931},
  doi          = {10.1109/CSFW.2000.856931},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KakkarGA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifipTCS/AbadiR00,
  author       = {Mart{\'{\i}}n Abadi and
                  Phillip Rogaway},
  editor       = {Jan van Leeuwen and
                  Osamu Watanabe and
                  Masami Hagiya and
                  Peter D. Mosses and
                  Takayasu Ito},
  title        = {Reconciling Two Views of Cryptography (The Computational Soundness
                  of Formal Encryption)},
  booktitle    = {Theoretical Computer Science, Exploring New Frontiers of Theoretical
                  Informatics, International Conference {IFIP} {TCS} 2000, Sendai, Japan,
                  August 17-19, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1872},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44929-9\_1},
  doi          = {10.1007/3-540-44929-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/ifipTCS/AbadiR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiFG00,
  author       = {Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet and
                  Georges Gonthier},
  editor       = {Mark N. Wegman and
                  Thomas W. Reps},
  title        = {Authentication Primitives and Their Compilation},
  booktitle    = {{POPL} 2000, Proceedings of the 27th {ACM} {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, Boston, Massachusetts, USA,
                  January 19-21, 2000},
  pages        = {302--315},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/325694.325734},
  doi          = {10.1145/325694.325734},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiFG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AbadiG99,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew D. Gordon},
  title        = {A Calculus for Cryptographic Protocols: The spi Calculus},
  journal      = {Inf. Comput.},
  volume       = {148},
  number       = {1},
  pages        = {1--70},
  year         = {1999},
  url          = {https://doi.org/10.1006/inco.1998.2740},
  doi          = {10.1006/INCO.1998.2740},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/AbadiG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/StataA99,
  author       = {Raymie Stata and
                  Mart{\'{\i}}n Abadi},
  title        = {A Type System for Java Bytecode Subroutines},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {21},
  number       = {1},
  pages        = {90--137},
  year         = {1999},
  url          = {https://doi.org/10.1145/314602.314606},
  doi          = {10.1145/314602.314606},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/StataA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/FlanaganA99,
  author       = {Cormac Flanagan and
                  Mart{\'{\i}}n Abadi},
  editor       = {Jos C. M. Baeten and
                  Sjouke Mauw},
  title        = {Object Types against Races},
  booktitle    = {{CONCUR} '99: Concurrency Theory, 10th International Conference, Eindhoven,
                  The Netherlands, August 24-27, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1664},
  pages        = {288--303},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48320-9\_21},
  doi          = {10.1007/3-540-48320-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/FlanaganA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoopw/Abadi99,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Jan Vitek and
                  Christian Damsgaard Jensen},
  title        = {Protection in Programming-Language Translations},
  booktitle    = {Secure Internet Programming, Security Issues for Mobile and Distributed
                  Objects},
  series       = {Lecture Notes in Computer Science},
  volume       = {1603},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48749-2\_2},
  doi          = {10.1007/3-540-48749-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoopw/Abadi99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoopw/DoornABW99,
  author       = {Leendert van Doorn and
                  Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  Edward Wobber},
  editor       = {Jan Vitek and
                  Christian Damsgaard Jensen},
  title        = {Secure Network Objects},
  booktitle    = {Secure Internet Programming, Security Issues for Mobile and Distributed
                  Objects},
  series       = {Lecture Notes in Computer Science},
  volume       = {1603},
  pages        = {395--412},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48749-2\_18},
  doi          = {10.1007/3-540-48749-2\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoopw/DoornABW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/FlanaganA99,
  author       = {Cormac Flanagan and
                  Mart{\'{\i}}n Abadi},
  editor       = {S. Doaitse Swierstra},
  title        = {Types for Safe Locking},
  booktitle    = {Programming Languages and Systems, 8th European Symposium on Programming,
                  ESOP'99, Held as Part of the European Joint Conferences on the Theory
                  and Practice of Software, ETAPS'99, Amsterdam, The Netherlands, 22-28
                  March, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1576},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49099-X\_7},
  doi          = {10.1007/3-540-49099-X\_7},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/FlanaganA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/Abadi99,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Wolfgang Thomas},
  title        = {Security Protocols and Specifications},
  booktitle    = {Foundations of Software Science and Computation Structure, Second
                  International Conference, FoSSaCS'99, Held as Part of the European
                  Joint Conferences on the Theory and Practice of Software, ETAPS'99,
                  Amsterdam, The Netherlands, March 22-28, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1578},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49019-1\_1},
  doi          = {10.1007/3-540-49019-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/Abadi99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/AbadiFG99,
  author       = {Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet and
                  Georges Gonthier},
  editor       = {C. Pandu Rangan and
                  Venkatesh Raman and
                  Ramaswamy Ramanujam},
  title        = {A Top-Down Look at a Secure Message},
  booktitle    = {Foundations of Software Technology and Theoretical Computer Science,
                  19th Conference, Chennai, India, December 13-15, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1738},
  pages        = {122--141},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46691-6\_10},
  doi          = {10.1007/3-540-46691-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/AbadiFG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiBHR99,
  author       = {Mart{\'{\i}}n Abadi and
                  Anindya Banerjee and
                  Nevin Heintze and
                  Jon G. Riecke},
  editor       = {Andrew W. Appel and
                  Alex Aiken},
  title        = {A Core Calculus of Dependency},
  booktitle    = {{POPL} '99, Proceedings of the 26th {ACM} {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, San Antonio, TX, USA, January
                  20-22, 1999},
  pages        = {147--160},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/292540.292555},
  doi          = {10.1145/292540.292555},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiBHR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AbadiFG99,
  author       = {Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet and
                  Georges Gonthier},
  title        = {Secure Communications Processing for Distributed Languages},
  booktitle    = {1999 {IEEE} Symposium on Security and Privacy, Oakland, California,
                  USA, May 9-12, 1999},
  pages        = {74--88},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/SECPRI.1999.766719},
  doi          = {10.1109/SECPRI.1999.766719},
  timestamp    = {Thu, 21 Sep 2023 15:57:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AbadiFG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Abadi99,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Stephen D. Brookes and
                  Achim Jung and
                  Michael W. Mislove and
                  Andre Scedrov},
  title        = {Secrecy in Programming-Language Semantics},
  booktitle    = {Fifteenth Conference on Mathematical Foundations of Progamming Semantics,
                  {MFPS} 1999, Tulane University, New Orleans, LA, USA, April 28 - May
                  1, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {20},
  pages        = {80--94},
  publisher    = {Elsevier},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1571-0661(04)80068-9},
  doi          = {10.1016/S1571-0661(04)80068-9},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Abadi99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AbadiBSW98,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew Birrell and
                  Raymie Stata and
                  Edward Wobber},
  title        = {Secure Web Tunneling},
  journal      = {Comput. Networks},
  volume       = {30},
  number       = {1-7},
  pages        = {531--539},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0169-7552(98)00048-8},
  doi          = {10.1016/S0169-7552(98)00048-8},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AbadiBSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Abadi98,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {On SDSI's Linked Local Name Spaces},
  journal      = {J. Comput. Secur.},
  volume       = {6},
  number       = {1-2},
  pages        = {3--22},
  year         = {1998},
  url          = {https://doi.org/10.3233/jcs-1998-61-202},
  doi          = {10.3233/JCS-1998-61-202},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Abadi98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/njc/AbadiG98,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew D. Gordon},
  title        = {A Bisimulation Method for Cryptographic Protocols},
  journal      = {Nord. J. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {267},
  year         = {1998},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/njc/AbadiG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Abadi98,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {Two Facets of Authentication},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {27--32},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683152},
  doi          = {10.1109/CSFW.1998.683152},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Abadi98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GorrieriSAFGLM98,
  author       = {Roberto Gorrieri and
                  Paul F. Syverson and
                  Mart{\'{\i}}n Abadi and
                  Riccardo Focardi and
                  Dieter Gollmann and
                  Gavin Lowe and
                  Catherine Meadows},
  title        = {Panel Introduction: Varieties of Authentication},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {79--82},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.1998.10000},
  doi          = {10.1109/CSFW.1998.10000},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/GorrieriSAFGLM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoopw/Abadi98,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Serge Demeyer and
                  Jan Bosch},
  title        = {Protection in Programming-Language Translations: Mobile Object Systems
                  (Abstract)},
  booktitle    = {Object-Oriented Technology, ECOOP'98 Workshop Reader, ECOOP'98 Workshops,
                  Demos, and Posters, Brussels, Belgium, July 20-24, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1543},
  pages        = {291},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49255-0\_70},
  doi          = {10.1007/3-540-49255-0\_70},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoopw/Abadi98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/AbadiG98,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew D. Gordon},
  editor       = {Chris Hankin},
  title        = {A Bisimulation Method for Cryptographic Protocols},
  booktitle    = {Programming Languages and Systems - ESOP'98, 7th European Symposium
                  on Programming, Held as Part of the European Joint Conferences on
                  the Theory and Practice of Software, ETAPS'98, Lisbon, Portugal, March
                  28 - April 4, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1381},
  pages        = {12--26},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053560},
  doi          = {10.1007/BFB0053560},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esop/AbadiG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Abadi98,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Kim Guldstrand Larsen and
                  Sven Skyum and
                  Glynn Winskel},
  title        = {Protection in Programming-Language Translations},
  booktitle    = {Automata, Languages and Programming, 25th International Colloquium,
                  ICALP'98, Aalborg, Denmark, July 13-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1443},
  pages        = {868--883},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055109},
  doi          = {10.1007/BFB0055109},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Abadi98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/AbadiFG98,
  author       = {Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet and
                  Georges Gonthier},
  title        = {Secure Implementation of Channel Abstractions},
  booktitle    = {Thirteenth Annual {IEEE} Symposium on Logic in Computer Science, Indianapolis,
                  Indiana, USA, June 21-24, 1998},
  pages        = {105--116},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/LICS.1998.705647},
  doi          = {10.1109/LICS.1998.705647},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/AbadiFG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/StataA98,
  author       = {Raymie Stata and
                  Mart{\'{\i}}n Abadi},
  editor       = {David B. MacQueen and
                  Luca Cardelli},
  title        = {A Type System for Java Bytecode Subroutines},
  booktitle    = {{POPL} '98, Proceedings of the 25th {ACM} {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, San Diego, CA, USA, January
                  19-21, 1998},
  pages        = {149--160},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/268946.268959},
  doi          = {10.1145/268946.268959},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/StataA98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/Abadi97,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {Explicit Communication Revisited: Two New Attacks on Authentication
                  Protocols},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {23},
  number       = {3},
  pages        = {185--186},
  year         = {1997},
  url          = {https://doi.org/10.1109/32.585505},
  doi          = {10.1109/32.585505},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/Abadi97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbadiG97,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew D. Gordon},
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {A Calculus for Cryptographic Protocols: The Spi Calculus},
  booktitle    = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  pages        = {36--47},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266420.266432},
  doi          = {10.1145/266420.266432},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AbadiG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/AbadiG97,
  author       = {Mart{\'{\i}}n Abadi and
                  Andrew D. Gordon},
  editor       = {Antoni W. Mazurkiewicz and
                  J{\'{o}}zef Winkowski},
  title        = {Reasoning about Cryptographic Protocols in the Spi Calculus},
  booktitle    = {{CONCUR} '97: Concurrency Theory, 8th International Conference, Warsaw,
                  Poland, July 1-4, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1243},
  pages        = {59--73},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63141-0\_5},
  doi          = {10.1007/3-540-63141-0\_5},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/concur/AbadiG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Abadi97,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {On SDSI's Linked Local Name Spaces},
  booktitle    = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12,
                  1997, Rockport, Massachusetts, {USA}},
  pages        = {98--108},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSFW.1997.596794},
  doi          = {10.1109/CSFW.1997.596794},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Abadi97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/Abadi97,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Mart{\'{\i}}n Abadi and
                  Takayasu Ito},
  title        = {Secrecy by Typing inSecurity Protocols},
  booktitle    = {Theoretical Aspects of Computer Software, Third International Symposium,
                  {TACS} '97, Sendai, Japan, September 23-26, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1281},
  pages        = {611--638},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0014571},
  doi          = {10.1007/BFB0014571},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/Abadi97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapsoft/AbadiL97,
  author       = {Mart{\'{\i}}n Abadi and
                  K. Rustan M. Leino},
  editor       = {Michel Bidoit and
                  Max Dauchet},
  title        = {A Logic of Object-Oriented Programs},
  booktitle    = {TAPSOFT'97: Theory and Practice of Software Development, 7th International
                  Joint Conference CAAP/FASE, Lille, France, April 14-18, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1214},
  pages        = {682--696},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030634},
  doi          = {10.1007/BFB0030634},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/tapsoft/AbadiL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AbadiFG97,
  author       = {Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet and
                  Georges Gonthier},
  editor       = {Andrew D. Gordon and
                  Andrew M. Pitts and
                  Carolyn L. Talcott},
  title        = {Secure Implementation of Channel Abstractions},
  booktitle    = {Second Workshop on Higher-Order Operational Techniques in Semantics,
                  {HOOTS} 1997, Stanford, CA, USA, December 8-12, 1997},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {10},
  pages        = {202--203},
  publisher    = {Elsevier},
  year         = {1997},
  url          = {https://doi.org/10.1016/S1571-0661(05)82514-9},
  doi          = {10.1016/S1571-0661(05)82514-9},
  timestamp    = {Fri, 11 Nov 2022 13:29:29 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/AbadiFG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tacs/1997,
  editor       = {Mart{\'{\i}}n Abadi and
                  Takayasu Ito},
  title        = {Theoretical Aspects of Computer Software, Third International Symposium,
                  {TACS} '97, Sendai, Japan, September 23-26, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1281},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0014544},
  doi          = {10.1007/BFB0014544},
  isbn         = {3-540-63388-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0084624,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  title        = {A Theory of Objects},
  series       = {Monographs in Computer Science},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/978-1-4419-8598-9},
  doi          = {10.1007/978-1-4419-8598-9},
  isbn         = {978-0-387-94775-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0084624.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AbadiC96,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  title        = {A Theory of Primitive Objects: Untyped and First-Order Systems},
  journal      = {Inf. Comput.},
  volume       = {125},
  number       = {2},
  pages        = {78--102},
  year         = {1996},
  url          = {https://doi.org/10.1006/inco.1996.0024},
  doi          = {10.1006/INCO.1996.0024},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/AbadiC96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/AbadiC96,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  title        = {On Subtyping and Matching},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {18},
  number       = {4},
  pages        = {401--423},
  year         = {1996},
  url          = {https://doi.org/10.1145/233561.233563},
  doi          = {10.1145/233561.233563},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/AbadiC96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/AbadiN96,
  author       = {Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  title        = {Prudent Engineering Practice for Cryptographic Protocols},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {22},
  number       = {1},
  pages        = {6--15},
  year         = {1996},
  url          = {https://doi.org/10.1109/32.481513},
  doi          = {10.1109/32.481513},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/AbadiN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wwwj/GlassmanMAGS96,
  author       = {Steven C. Glassman and
                  Mark S. Manasse and
                  Mart{\'{\i}}n Abadi and
                  Paul Gauthier and
                  Patrick Sobalvarro},
  title        = {The Millicent Protocol for Inexpensive Electronic Commerce},
  journal      = {World Wide Web J.},
  volume       = {1},
  number       = {1},
  year         = {1996},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wwwj/GlassmanMAGS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfp/AbadiLL96,
  author       = {Mart{\'{\i}}n Abadi and
                  Butler W. Lampson and
                  Jean{-}Jacques L{\'{e}}vy},
  editor       = {Robert Harper and
                  Richard L. Wexelblat},
  title        = {Analysis and Caching of Dependencies},
  booktitle    = {Proceedings of the 1996 {ACM} {SIGPLAN} International Conference on
                  Functional Programming, {ICFP} 1996, Philadelphia, Pennsylvania, USA,
                  May 24-26, 1996},
  pages        = {83--91},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/232627.232638},
  doi          = {10.1145/232627.232638},
  timestamp    = {Thu, 08 Jul 2021 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icfp/AbadiLL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/AbadiF96,
  author       = {Mart{\'{\i}}n Abadi and
                  Marcelo P. Fiore},
  title        = {Syntactic Considerations on Recursive Types},
  booktitle    = {Proceedings, 11th Annual {IEEE} Symposium on Logic in Computer Science,
                  New Brunswick, New Jersey, USA, July 27-30, 1996},
  pages        = {242--252},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/LICS.1996.561324},
  doi          = {10.1109/LICS.1996.561324},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/AbadiF96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nato/AbadiM96,
  author       = {Mart{\'{\i}}n Abadi and
                  Stephan Merz},
  editor       = {Manfred Broy},
  title        = {On {TLA} as a logic},
  booktitle    = {Proceedings of the {NATO} Advanced Study Institute on Deductive Program
                  Design, Marktoberdorf, Germany},
  pages        = {235--271},
  year         = {1996},
  timestamp    = {Tue, 14 Nov 2006 16:17:55 +0100},
  biburl       = {https://dblp.org/rec/conf/nato/AbadiM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiCV96,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli and
                  Ramesh Viswanathan},
  editor       = {Hans{-}Juergen Boehm and
                  Guy L. Steele Jr.},
  title        = {An Interpretation of Objects and Object Types},
  booktitle    = {Conference Record of POPL'96: The 23rd {ACM} {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, Papers Presented at the Symposium,
                  St. Petersburg Beach, Florida, USA, January 21-24, 1996},
  pages        = {396--409},
  publisher    = {{ACM} Press},
  year         = {1996},
  url          = {https://doi.org/10.1145/237721.237809},
  doi          = {10.1145/237721.237809},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiCV96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DoornABW96,
  author       = {Leendert van Doorn and
                  Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  Edward Wobber},
  title        = {Secure Network Objects},
  booktitle    = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
                  CA, {USA}},
  pages        = {211--221},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SECPRI.1996.502683},
  doi          = {10.1109/SECPRI.1996.502683},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DoornABW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/AbadiCPR95,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli and
                  Benjamin C. Pierce and
                  Didier R{\'{e}}my},
  title        = {Dynamic Typing in Polymorphic Languages},
  journal      = {J. Funct. Program.},
  volume       = {5},
  number       = {1},
  pages        = {111--130},
  year         = {1995},
  url          = {https://doi.org/10.1017/S095679680000126X},
  doi          = {10.1017/S095679680000126X},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jfp/AbadiCPR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/AbadiC95,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  title        = {A Theory of Primitive Objects: Second-Order Systems},
  journal      = {Sci. Comput. Program.},
  volume       = {25},
  number       = {2-3},
  pages        = {81--116},
  year         = {1995},
  url          = {https://doi.org/10.1016/0167-6423(95)00010-0},
  doi          = {10.1016/0167-6423(95)00010-0},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/AbadiC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tapos/LampingA95,
  author       = {John Lamping and
                  Mart{\'{\i}}n Abadi},
  title        = {Methods as Assertions},
  journal      = {Theory Pract. Object Syst.},
  volume       = {1},
  number       = {1},
  pages        = {5--18},
  year         = {1995},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tapos/LampingA95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tapos/AbadiC95,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  title        = {An Imperative Object Calculus (Invited Paper)},
  journal      = {Theory Pract. Object Syst.},
  volume       = {1},
  number       = {3},
  pages        = {151--166},
  year         = {1995},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tapos/AbadiC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/AbadiL95,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport},
  title        = {Conjoining Specifications},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {17},
  number       = {3},
  pages        = {507--534},
  year         = {1995},
  url          = {https://doi.org/10.1145/203095.201069},
  doi          = {10.1145/203095.201069},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/AbadiL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/AbadiC95,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  editor       = {Walter G. Olthoff},
  title        = {On Subtyping and Matching},
  booktitle    = {ECOOP'95 - Object-Oriented Programming, 9th European Conference, {\AA}rhus,
                  Denmark, August 7-11, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {952},
  pages        = {145--167},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49538-X\_8},
  doi          = {10.1007/3-540-49538-X\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoop/AbadiC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/AbadiM95,
  author       = {Mart{\'{\i}}n Abadi and
                  Stephan Merz},
  editor       = {Jir{\'{\i}} Wiedermann and
                  Petr H{\'{a}}jek},
  title        = {An Abstract Account of Composition},
  booktitle    = {Mathematical Foundations of Computer Science 1995, 20th International
                  Symposium, MFCS'95, Prague, Czech Republic, August 28 - September
                  1, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {969},
  pages        = {499--508},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60246-1\_155},
  doi          = {10.1007/3-540-60246-1\_155},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/AbadiM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapsoft/AbadiC95,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  editor       = {Peter D. Mosses and
                  Mogens Nielsen and
                  Michael I. Schwartzbach},
  title        = {An Imperative Object Calculus},
  booktitle    = {TAPSOFT'95: Theory and Practice of Software Development, 6th International
                  Joint Conference CAAP/FASE, Aarhus, Denmark, May 22-26, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {915},
  pages        = {471--485},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-59293-8\_214},
  doi          = {10.1007/3-540-59293-8\_214},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/tapsoft/AbadiC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tlca/BellucciAC95,
  author       = {Roberto Bellucci and
                  Mart{\'{\i}}n Abadi and
                  Pierre{-}Louis Curien},
  editor       = {Mariangiola Dezani{-}Ciancaglini and
                  Gordon D. Plotkin},
  title        = {A Model for Formal Parametric Polymorphism: {A} {PER} Interpretation
                  for System {R}},
  booktitle    = {Typed Lambda Calculi and Applications, Second International Conference
                  on Typed Lambda Calculi and Applications, {TLCA} '95, Edinburgh, UK,
                  April 10-12, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {902},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0014043},
  doi          = {10.1007/BFB0014043},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/tlca/BellucciAC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/GlassmanMAGS95,
  author       = {Steven C. Glassman and
                  Mark S. Manasse and
                  Mart{\'{\i}}n Abadi and
                  Paul Gauthier and
                  Patrick Sobalvarro},
  editor       = {Albert Vezza and
                  Ira Goldstein and
                  Tim Berners{-}Lee},
  title        = {The Millicent Protocol for Inexpensive Electronic Commerce},
  booktitle    = {Proceedings of the Fourth International Conference on World Wide Web,
                  WWW4, Boston, Massachusetts, USA, December 11-14, 1995},
  pages        = {603--618},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/3592626.3592675},
  doi          = {10.1145/3592626.3592675},
  timestamp    = {Thu, 21 Sep 2023 16:48:52 +0200},
  biburl       = {https://dblp.org/rec/conf/www/GlassmanMAGS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Abadi94,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {A Semantics for Static Type Inference in a Nondeterministic Language},
  journal      = {Inf. Comput.},
  volume       = {109},
  number       = {1/2},
  pages        = {300--306},
  year         = {1994},
  url          = {https://doi.org/10.1006/inco.1994.1019},
  doi          = {10.1006/INCO.1994.1019},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Abadi94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AbadiH94,
  author       = {Mart{\'{\i}}n Abadi and
                  Joseph Y. Halpern},
  title        = {Decidability and Expressiveness for First-Order Logics of Probability},
  journal      = {Inf. Comput.},
  volume       = {112},
  number       = {1},
  pages        = {1--36},
  year         = {1994},
  url          = {https://doi.org/10.1006/inco.1994.1049},
  doi          = {10.1006/INCO.1994.1049},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/AbadiH94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/Abadi94,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {Baby Modula-3 and a Theory of Objects},
  journal      = {J. Funct. Program.},
  volume       = {4},
  number       = {2},
  pages        = {249--283},
  year         = {1994},
  url          = {https://doi.org/10.1017/S0956796800001052},
  doi          = {10.1017/S0956796800001052},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/Abadi94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/WobberAB94,
  author       = {Edward Wobber and
                  Mart{\'{\i}}n Abadi and
                  Michael Burrows},
  title        = {Authentication in the Taos Operating System},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {12},
  number       = {1},
  pages        = {3--32},
  year         = {1994},
  url          = {https://doi.org/10.1145/174613.174614},
  doi          = {10.1145/174613.174614},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/WobberAB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/AbadiL94,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport},
  title        = {An Old-Fashined Recipe for Real-Time},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {16},
  number       = {5},
  pages        = {1543--1571},
  year         = {1994},
  url          = {https://doi.org/10.1145/186025.186058},
  doi          = {10.1145/186025.186058},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/AbadiL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/AbadiLM94,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport and
                  Stephan Merz},
  editor       = {Manfred Broy and
                  Stephan Merz and
                  Katharina Spies},
  title        = {A {TLA} Solution to the RPC-Memory Specification Problem},
  booktitle    = {Formal Systems Specification, The RPC-Memory Specification Case Study
                  (the book grow out of a Dagstuhl Seminar, September 1994)},
  series       = {Lecture Notes in Computer Science},
  volume       = {1169},
  pages        = {21--66},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0024426},
  doi          = {10.1007/BFB0024426},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/AbadiLM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/LampingA94,
  author       = {John Lamping and
                  Mart{\'{\i}}n Abadi},
  editor       = {Mario Tokoro and
                  Remo Pareschi},
  title        = {Methods as Assertions},
  booktitle    = {Object-Oriented Programming, Proceedings of the 8th European Conference,
                  {ECOOP} '94, Bologna, Italy, July 4-8, 1994},
  series       = {Lecture Notes in Computer Science},
  volume       = {821},
  pages        = {60--80},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0052176},
  doi          = {10.1007/BFB0052176},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoop/LampingA94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/AbadiC94,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  editor       = {Donald Sannella},
  title        = {A Theory of Primitive Objects - Scond-Order Systems},
  booktitle    = {Programming Languages and Systems - ESOP'94, 5th European Symposium
                  on Programming, Edinburgh, UK, April 11-13, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {788},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-57880-3\_1},
  doi          = {10.1007/3-540-57880-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/AbadiC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/PlotkinAC94,
  author       = {Gordon D. Plotkin and
                  Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  title        = {Subtyping and Parametricity},
  booktitle    = {Proceedings of the Ninth Annual Symposium on Logic in Computer Science
                  {(LICS} '94), Paris, France, July 4-7, 1994},
  pages        = {310--319},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/LICS.1994.316058},
  doi          = {10.1109/LICS.1994.316058},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/PlotkinAC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/AbadiC94,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  title        = {A Semantics of Object Types},
  booktitle    = {Proceedings of the Ninth Annual Symposium on Logic in Computer Science
                  {(LICS} '94), Paris, France, July 4-7, 1994},
  pages        = {332--341},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/LICS.1994.316056},
  doi          = {10.1109/LICS.1994.316056},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/AbadiC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/AbadiL94,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport},
  editor       = {James H. Anderson and
                  David Peleg and
                  Elizabeth Borowsky},
  title        = {Open Systems in {TLA}},
  booktitle    = {Proceedings of the Thirteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Los Angeles, California, USA, August 14-17,
                  1994},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/197917.197960},
  doi          = {10.1145/197917.197960},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/AbadiL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/procomet/AbadiL94,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport},
  editor       = {Ernst{-}R{\"{u}}diger Olderog},
  title        = {Decomposing Specifications of Concurrent Systems},
  booktitle    = {Programming Concepts, Methods and Calculi, Proceedings of the {IFIP}
                  {TC2/WG2.1/WG2.2/WG2.3} Working Conference on Programming Concepts,
                  Methods and Calculi {(PROCOMET} '94) San Miniato, Italy, 6-10 June,
                  1994},
  series       = {{IFIP} Transactions},
  volume       = {{A-56}},
  pages        = {327--340},
  publisher    = {North-Holland},
  year         = {1994},
  timestamp    = {Thu, 03 Jan 2002 12:07:43 +0100},
  biburl       = {https://dblp.org/rec/conf/procomet/AbadiL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AbadiN94,
  author       = {Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  title        = {Prudent engineering practice for cryptographic protocols},
  booktitle    = {1994 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 16-18, 1994},
  pages        = {122--136},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/RISP.1994.296587},
  doi          = {10.1109/RISP.1994.296587},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AbadiN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/AbadiC94,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli},
  editor       = {Masami Hagiya and
                  John C. Mitchell},
  title        = {A Theory of Primitive Objects - Untyped and First-Order Systems},
  booktitle    = {Theoretical Aspects of Computer Software, International Conference
                  {TACS} '94, Sendai, Japan, April 19-22, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {789},
  pages        = {296--320},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-57887-0\_101},
  doi          = {10.1007/3-540-57887-0\_101},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/AbadiC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/AbadiBKL93,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  C. Kaufman and
                  Butler W. Lampson},
  title        = {Authentification and Delegation with Smart-Cards},
  journal      = {Sci. Comput. Program.},
  volume       = {21},
  number       = {2},
  pages        = {93--113},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-6423(93)90002-7},
  doi          = {10.1016/0167-6423(93)90002-7},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/AbadiBKL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AbadiP93,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {A Logical View of Composition},
  journal      = {Theor. Comput. Sci.},
  volume       = {114},
  number       = {1},
  pages        = {3--30},
  year         = {1993},
  url          = {https://doi.org/10.1016/0304-3975(93)90151-I},
  doi          = {10.1016/0304-3975(93)90151-I},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AbadiP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AbadiCC93,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli and
                  Pierre{-}Louis Curien},
  title        = {Formal Parametric Polymorphism},
  journal      = {Theor. Comput. Sci.},
  volume       = {121},
  number       = {1{\&}2},
  pages        = {9--58},
  year         = {1993},
  url          = {https://doi.org/10.1016/0304-3975(93)90082-5},
  doi          = {10.1016/0304-3975(93)90082-5},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AbadiCC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/AbadiL93,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport},
  title        = {Composing Specifications},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {15},
  number       = {1},
  pages        = {73--132},
  year         = {1993},
  url          = {https://doi.org/10.1145/151646.151649},
  doi          = {10.1145/151646.151649},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toplas/AbadiL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/AbadiBLP93,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  Butler W. Lampson and
                  Gordon D. Plotkin},
  title        = {A Calculus for Access Control in Distributed Systems},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {15},
  number       = {4},
  pages        = {706--734},
  year         = {1993},
  url          = {https://doi.org/10.1145/155183.155225},
  doi          = {10.1145/155183.155225},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/AbadiBLP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbpl/CardelliMA93,
  author       = {Luca Cardelli and
                  Florian Matthes and
                  Mart{\'{\i}}n Abadi},
  editor       = {Catriel Beeri and
                  Atsushi Ohori and
                  Dennis E. Shasha},
  title        = {Extensible Grammars for Language Specialization},
  booktitle    = {Database Programming Languages (DBPL-4), Proceedings of the Fourth
                  International Workshop on Database Programming Languages - Object
                  Models and Languages, Manhattan, New York City, USA, 30 August - 1
                  September 1993},
  series       = {Workshops in Computing},
  pages        = {11--31},
  publisher    = {Springer},
  year         = {1993},
  timestamp    = {Thu, 11 Aug 2016 11:10:45 +0200},
  biburl       = {https://dblp.org/rec/conf/dbpl/CardelliMA93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiCC93,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli and
                  Pierre{-}Louis Curien},
  editor       = {Mary S. Van Deusen and
                  Bernard Lang},
  title        = {Formal Parametric Polymorphism},
  booktitle    = {Conference Record of the Twentieth Annual {ACM} {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, Charleston, South Carolina,
                  USA, January 1993},
  pages        = {157--170},
  publisher    = {{ACM} Press},
  year         = {1993},
  url          = {https://doi.org/10.1145/158511.158622},
  doi          = {10.1145/158511.158622},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiCC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/WobberABL93,
  author       = {Edward Wobber and
                  Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  Butler W. Lampson},
  editor       = {Andrew P. Black and
                  Barbara Liskov},
  title        = {Authentication in the Taos Operating System},
  booktitle    = {Proceedings of the Fourteenth {ACM} Symposium on Operating System
                  Principles, {SOSP} 1993, The Grove Park Inn and Country Club, Asheville,
                  North Carolina, USA, December 5-8, 1993},
  pages        = {256--269},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168619.168640},
  doi          = {10.1145/168619.168640},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/WobberABL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tlca/PlotkinA93,
  author       = {Gordon D. Plotkin and
                  Mart{\'{\i}}n Abadi},
  editor       = {Marc Bezem and
                  Jan Friso Groote},
  title        = {A Logic for Parametric Polymorphism},
  booktitle    = {Typed Lambda Calculi and Applications, International Conference on
                  Typed Lambda Calculi and Applications, {TLCA} '93, Utrecht, The Netherlands,
                  March 16-18, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {664},
  pages        = {361--375},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/BFb0037118},
  doi          = {10.1007/BFB0037118},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/tlca/PlotkinA93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/LampsonABW92,
  author       = {Butler W. Lampson and
                  Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  Edward Wobber},
  title        = {Authentication in Distributed Systems: Theory and Practice},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {265--310},
  year         = {1992},
  url          = {https://doi.org/10.1145/138873.138874},
  doi          = {10.1145/138873.138874},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/LampsonABW92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/GonthierAL92,
  author       = {Georges Gonthier and
                  Mart{\'{\i}}n Abadi and
                  Jean{-}Jacques L{\'{e}}vy},
  title        = {Linear Logic Without Boxes},
  booktitle    = {Proceedings of the Seventh Annual Symposium on Logic in Computer Science
                  {(LICS} '92), Santa Cruz, California, USA, June 22-25, 1992},
  pages        = {223--234},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/LICS.1992.185535},
  doi          = {10.1109/LICS.1992.185535},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/GonthierAL92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/GonthierAL92,
  author       = {Georges Gonthier and
                  Mart{\'{\i}}n Abadi and
                  Jean{-}Jacques L{\'{e}}vy},
  editor       = {Ravi Sethi},
  title        = {The Geometry of Optimal Lambda Reduction},
  booktitle    = {Conference Record of the Nineteenth Annual {ACM} {SIGPLAN-SIGACT}
                  Symposium on Principles of Programming Languages, Albuquerque, New
                  Mexico, USA, January 19-22, 1992},
  pages        = {15--26},
  publisher    = {{ACM} Press},
  year         = {1992},
  url          = {https://doi.org/10.1145/143165.143172},
  doi          = {10.1145/143165.143172},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/GonthierAL92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/AbadiPP91,
  author       = {Mart{\'{\i}}n Abadi and
                  Benjamin C. Pierce and
                  Gordon D. Plotkin},
  title        = {Faithful Ideal Models for Recursive Polymorphic Types},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {2},
  number       = {1},
  pages        = {1--21},
  year         = {1991},
  url          = {https://doi.org/10.1142/S0129054191000029},
  doi          = {10.1142/S0129054191000029},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/AbadiPP91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AbadiAAFKLS91,
  author       = {Mart{\'{\i}}n Abadi and
                  Bowen Alpern and
                  Krzysztof R. Apt and
                  Nissim Francez and
                  Shmuel Katz and
                  Leslie Lamport and
                  Fred B. Schneider},
  title        = {Preserving Liveness: Comments on "Safety and Liveness from a
                  Methodological Point of View"},
  journal      = {Inf. Process. Lett.},
  volume       = {40},
  number       = {3},
  pages        = {141--142},
  year         = {1991},
  url          = {https://doi.org/10.1016/0020-0190(91)90168-H},
  doi          = {10.1016/0020-0190(91)90168-H},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/AbadiAAFKLS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/AbadiCCL91,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli and
                  Pierre{-}Louis Curien and
                  Jean{-}Jacques L{\'{e}}vy},
  title        = {Explicit Substitutions},
  journal      = {J. Funct. Program.},
  volume       = {1},
  number       = {4},
  pages        = {375--416},
  year         = {1991},
  url          = {https://doi.org/10.1017/S0956796800000186},
  doi          = {10.1017/S0956796800000186},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/AbadiCCL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AbadiL91,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport},
  title        = {The Existence of Refinement Mappings},
  journal      = {Theor. Comput. Sci.},
  volume       = {82},
  number       = {2},
  pages        = {253--284},
  year         = {1991},
  url          = {https://doi.org/10.1016/0304-3975(91)90224-P},
  doi          = {10.1016/0304-3975(91)90224-P},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AbadiL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/AbadiCPP91,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli and
                  Benjamin C. Pierce and
                  Gordon D. Plotkin},
  title        = {Dynamic Typing in a Statically Typed Language},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {13},
  number       = {2},
  pages        = {237--268},
  year         = {1991},
  url          = {https://doi.org/10.1145/103135.103138},
  doi          = {10.1145/103135.103138},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/AbadiCPP91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbadiBLP91,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  Butler W. Lampson and
                  Gordon D. Plotkin},
  editor       = {Joan Feigenbaum},
  title        = {A Calculus for Access Control in Distributed Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {1--23},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_1},
  doi          = {10.1007/3-540-46766-1\_1},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbadiBLP91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/AbadiT91,
  author       = {Mart{\'{\i}}n Abadi and
                  Mark R. Tuttle},
  editor       = {Luigi Logrippo},
  title        = {A Semantics for a Logic of Authentication (Extended Abstract)},
  booktitle    = {Proceedings of the Tenth Annual {ACM} Symposium on Principles of Distributed
                  Computing, Montreal, Quebec, Canada, August 19-21, 1991},
  pages        = {201--216},
  publisher    = {{ACM}},
  year         = {1991},
  url          = {https://doi.org/10.1145/112600.112618},
  doi          = {10.1145/112600.112618},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/AbadiT91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiP91,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  editor       = {David S. Wise},
  title        = {A Logical View of Composition and Refinement},
  booktitle    = {Conference Record of the Eighteenth Annual {ACM} Symposium on Principles
                  of Programming Languages, Orlando, Florida, USA, January 21-23, 1991},
  pages        = {323--332},
  publisher    = {{ACM} Press},
  year         = {1991},
  url          = {https://doi.org/10.1145/99583.99626},
  doi          = {10.1145/99583.99626},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiP91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rex/AbadiL91,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport},
  editor       = {J. W. de Bakker and
                  Cornelis Huizing and
                  Willem P. de Roever and
                  Grzegorz Rozenberg},
  title        = {An Old-Fashioned Recipe for Real Time},
  booktitle    = {Real-Time: Theory in Practice, {REX} Workshop, Mook, The Netherlands,
                  June 3-7, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {600},
  pages        = {1--27},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/BFb0031985},
  doi          = {10.1007/BFB0031985},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/rex/AbadiL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/LampsonABW91,
  author       = {Butler W. Lampson and
                  Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  Edward Wobber},
  editor       = {Henry M. Levy},
  title        = {Authentication in Distributed Systems: Theory and Practice},
  booktitle    = {Proceedings of the Thirteenth {ACM} Symposium on Operating System
                  Principles, {SOSP} 1991, Asilomar Conference Center, Pacific Grove,
                  California, USA, October 13-16, 1991},
  pages        = {165--182},
  publisher    = {{ACM}},
  year         = {1991},
  url          = {https://doi.org/10.1145/121132.121160},
  doi          = {10.1145/121132.121160},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/LampsonABW91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacs/AbadiBKL91,
  author       = {Mart{\'{\i}}n Abadi and
                  Michael Burrows and
                  C. Kaufman and
                  Butler W. Lampson},
  editor       = {Takayasu Ito and
                  Albert R. Meyer},
  title        = {Authentication and Delegation with Smart-cards},
  booktitle    = {Theoretical Aspects of Computer Software, International Conference
                  {TACS} '91, Sendai, Japan, September 24-27, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {526},
  pages        = {326--345},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54415-1\_53},
  doi          = {10.1007/3-540-54415-1\_53},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/tacs/AbadiBKL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/AbadiM90,
  author       = {Mart{\'{\i}}n Abadi and
                  Zohar Manna},
  title        = {Nonclausal Deduction in First-Order Temporal Logic},
  journal      = {J. {ACM}},
  volume       = {37},
  number       = {2},
  pages        = {279--317},
  year         = {1990},
  url          = {https://doi.org/10.1145/77600.77617},
  doi          = {10.1145/77600.77617},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/AbadiM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbadiF90,
  author       = {Mart{\'{\i}}n Abadi and
                  Joan Feigenbaum},
  title        = {Secure Circuit Evaluation},
  journal      = {J. Cryptol.},
  volume       = {2},
  number       = {1},
  pages        = {1--12},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF02252866},
  doi          = {10.1007/BF02252866},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbadiF90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/BurrowsAN90,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  title        = {Rejoinder to Nessett},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {24},
  number       = {2},
  pages        = {39--40},
  year         = {1990},
  url          = {https://doi.org/10.1145/382258.382790},
  doi          = {10.1145/382258.382790},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/BurrowsAN90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Abadi90,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {Corrigendum: The Power of Temporal Proofs},
  journal      = {Theor. Comput. Sci.},
  volume       = {70},
  number       = {2},
  pages        = {275},
  year         = {1990},
  url          = {https://doi.org/10.1016/0304-3975(90)90128-5},
  doi          = {10.1016/0304-3975(90)90128-5},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Abadi90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/BurrowsAN90,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  title        = {A Logic of Authentication},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {8},
  number       = {1},
  pages        = {18--36},
  year         = {1990},
  url          = {https://doi.org/10.1145/77648.77649},
  doi          = {10.1145/77648.77649},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/BurrowsAN90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/Abadi90,
  author       = {Mart{\'{\i}}n Abadi},
  editor       = {Jos C. M. Baeten and
                  Jan Willem Klop},
  title        = {An Axiomatization of Lamport's Temporal Logic of Actions},
  booktitle    = {{CONCUR} '90, Theories of Concurrency: Unification and Extension,
                  Amsterdam, The Netherlands, August 27-30, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {458},
  pages        = {57--69},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/BFb0039051},
  doi          = {10.1007/BFB0039051},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/Abadi90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/AbadiP90,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {A Per Model of Polymorphism and Recursive Types},
  booktitle    = {Proceedings of the Fifth Annual Symposium on Logic in Computer Science
                  {(LICS} '90), Philadelphia, Pennsylvania, USA, June 4-7, 1990},
  pages        = {355--365},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/LICS.1990.113761},
  doi          = {10.1109/LICS.1990.113761},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/AbadiP90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiCCL90,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli and
                  Pierre{-}Louis Curien and
                  Jean{-}Jacques L{\'{e}}vy},
  editor       = {Frances E. Allen},
  title        = {Explicit Substitutions},
  booktitle    = {Conference Record of the Seventeenth Annual {ACM} Symposium on Principles
                  of Programming Languages, San Francisco, California, USA, January
                  1990},
  pages        = {31--46},
  publisher    = {{ACM} Press},
  year         = {1990},
  url          = {https://doi.org/10.1145/96709.96712},
  doi          = {10.1145/96709.96712},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiCCL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/AbadiFK89,
  author       = {Mart{\'{\i}}n Abadi and
                  Joan Feigenbaum and
                  Joe Kilian},
  title        = {On Hiding Information from an Oracle},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {39},
  number       = {1},
  pages        = {21--50},
  year         = {1989},
  url          = {https://doi.org/10.1016/0022-0000(89)90018-4},
  doi          = {10.1016/0022-0000(89)90018-4},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/AbadiFK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/AbadiM89,
  author       = {Mart{\'{\i}}n Abadi and
                  Zohar Manna},
  title        = {Temporal Logic Programming},
  journal      = {J. Symb. Comput.},
  volume       = {8},
  number       = {3},
  pages        = {277--295},
  year         = {1989},
  url          = {https://doi.org/10.1016/S0747-7171(89)80070-7},
  doi          = {10.1016/S0747-7171(89)80070-7},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/AbadiM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Abadi89,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {The Power of Temporal Proofs},
  journal      = {Theor. Comput. Sci.},
  volume       = {65},
  number       = {1},
  pages        = {35--83},
  year         = {1989},
  url          = {https://doi.org/10.1016/0304-3975(89)90138-2},
  doi          = {10.1016/0304-3975(89)90138-2},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Abadi89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BurrowsAN89,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {The Scope of a Logic of Authentication},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {119--126},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/07},
  doi          = {10.1090/DIMACS/002/07},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/BurrowsAN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/AbadiH89,
  author       = {Mart{\'{\i}}n Abadi and
                  Joseph Y. Halpern},
  title        = {Decidability and Expressiveness for First-Order Logics of Probability
                  (Extended Abstract)},
  booktitle    = {30th Annual Symposium on Foundations of Computer Science, Research
                  Triangle Park, North Carolina, USA, 30 October - 1 November 1989},
  pages        = {148--153},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SFCS.1989.63470},
  doi          = {10.1109/SFCS.1989.63470},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/AbadiH89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AbadiLW89,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport and
                  Pierre Wolper},
  editor       = {Giorgio Ausiello and
                  Mariangiola Dezani{-}Ciancaglini and
                  Simona Ronchi Della Rocca},
  title        = {Realizable and Unrealizable Specifications of Reactive Systems},
  booktitle    = {Automata, Languages and Programming, 16th International Colloquium,
                  ICALP89, Stresa, Italy, July 11-15, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {372},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/BFb0035748},
  doi          = {10.1007/BFB0035748},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/AbadiLW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/AbadiPP89,
  author       = {Mart{\'{\i}}n Abadi and
                  Benjamin C. Pierce and
                  Gordon D. Plotkin},
  title        = {Faithful Ideal Models for Recursive Polymorphic Types},
  booktitle    = {Proceedings of the Fourth Annual Symposium on Logic in Computer Science
                  {(LICS} '89), Pacific Grove, California, USA, June 5-8, 1989},
  pages        = {216--225},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/LICS.1989.39176},
  doi          = {10.1109/LICS.1989.39176},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/AbadiPP89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/AbadiCPP89,
  author       = {Mart{\'{\i}}n Abadi and
                  Luca Cardelli and
                  Benjamin C. Pierce and
                  Gordon D. Plotkin},
  title        = {Dynamic Typing in a Statically-Typed Language},
  booktitle    = {Conference Record of the Sixteenth Annual {ACM} Symposium on Principles
                  of Programming Languages, Austin, Texas, USA, January 11-13, 1989},
  pages        = {213--227},
  publisher    = {{ACM} Press},
  year         = {1989},
  url          = {https://doi.org/10.1145/75277.75296},
  doi          = {10.1145/75277.75296},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/AbadiCPP89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rex/AbadiL89,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport},
  editor       = {J. W. de Bakker and
                  Willem P. de Roever and
                  Grzegorz Rozenberg},
  title        = {Composing Specifications},
  booktitle    = {Stepwise Refinement of Distributed Systems, Models, Formalisms, Correctness,
                  {REX} Workshop, Mook, The Netherlands, May 29 - June 2, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {430},
  pages        = {1--41},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-52559-9\_59},
  doi          = {10.1007/3-540-52559-9\_59},
  timestamp    = {Fri, 17 Jul 2020 16:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/rex/AbadiL89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/BurrowsAN89,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  editor       = {Gregory R. Andrews},
  title        = {A Logic of Authentication},
  booktitle    = {Proceedings of the Twelfth {ACM} Symposium on Operating System Principles,
                  {SOSP} 1989, The Wigwam, Litchfield Park, Arizona, USA, December 3-6,
                  1989},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {1989},
  url          = {https://doi.org/10.1145/74850.74852},
  doi          = {10.1145/74850.74852},
  timestamp    = {Tue, 06 Nov 2018 16:59:32 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/BurrowsAN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbadiABFH88,
  author       = {Mart{\'{\i}}n Abadi and
                  Eric Allender and
                  Andrei Z. Broder and
                  Joan Feigenbaum and
                  Lane A. Hemachandra},
  editor       = {Shafi Goldwasser},
  title        = {On Generating Solved Instances of Computational Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {297--310},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_23},
  doi          = {10.1007/0-387-34799-2\_23},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbadiABFH88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/AbadiL88,
  author       = {Mart{\'{\i}}n Abadi and
                  Leslie Lamport},
  title        = {The Existence of Refinement Mappings},
  booktitle    = {Proceedings of the Third Annual Symposium on Logic in Computer Science
                  {(LICS} '88), Edinburgh, Scotland, UK, July 5-8, 1988},
  pages        = {165--175},
  publisher    = {{IEEE} Computer Society},
  year         = {1988},
  url          = {https://doi.org/10.1109/LICS.1988.5115},
  doi          = {10.1109/LICS.1988.5115},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/AbadiL88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/AbadiF88,
  author       = {Mart{\'{\i}}n Abadi and
                  Joan Feigenbaum},
  editor       = {Robert Cori and
                  Martin Wirsing},
  title        = {A Simple Protocol for Secure Circuit Evaluation},
  booktitle    = {{STACS} 88, 5th Annual Symposium on Theoretical Aspects of Computer
                  Science, Bordeaux, France, February 11-13, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {294},
  pages        = {264--272},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/BFb0035850},
  doi          = {10.1007/BFB0035850},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/AbadiF88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tark/BurrowsAN88,
  author       = {Michael Burrows and
                  Mart{\'{\i}}n Abadi and
                  Roger M. Needham},
  editor       = {Moshe Y. Vardi},
  title        = {Authentication: {A} Practical Study in Belief and Action},
  booktitle    = {Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning
                  about Knowledge, Pacific Grove, CA, USA, March 1988},
  pages        = {325--342},
  publisher    = {Morgan Kaufmann},
  year         = {1988},
  timestamp    = {Thu, 21 Jun 2018 07:50:39 +0200},
  biburl       = {https://dblp.org/rec/conf/tark/BurrowsAN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Abadi87,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {Temporal-logic theorem proving},
  school       = {Stanford University, {USA}},
  year         = {1987},
  url          = {https://searchworks.stanford.edu/view/1271086},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Abadi87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/AbadiFK87,
  author       = {Mart{\'{\i}}n Abadi and
                  Joan Feigenbaum and
                  Joe Kilian},
  title        = {On hiding information from an oracle},
  booktitle    = {Proceedings of the Second Annual Conference on Structure in Complexity
                  Theory, Cornell University, Ithaca, New York, USA, June 16-19, 1987},
  pages        = {9},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  url          = {https://ieeexplore.ieee.org/document/10319247},
  timestamp    = {Tue, 21 Nov 2023 11:59:25 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/AbadiFK87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/Abadi87,
  author       = {Mart{\'{\i}}n Abadi},
  title        = {The Power of Temporal Proofs},
  booktitle    = {Proceedings of the Symposium on Logic in Computer Science {(LICS}
                  '87), Ithaca, New York, USA, June 22-25, 1987},
  pages        = {123--130},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  timestamp    = {Thu, 22 Jan 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/Abadi87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/slp/AbadiM87,
  author       = {Mart{\'{\i}}n Abadi and
                  Zohar Manna},
  title        = {Temporal Logic Programming},
  booktitle    = {Proceedings of the 1987 Symposium on Logic Programming, San Francisco,
                  California, USA, August 31 - September 4, 1987},
  pages        = {4--16},
  publisher    = {{IEEE-CS}},
  year         = {1987},
  timestamp    = {Wed, 04 Dec 2013 14:42:58 +0100},
  biburl       = {https://dblp.org/rec/conf/slp/AbadiM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/AbadiFK87,
  author       = {Mart{\'{\i}}n Abadi and
                  Joan Feigenbaum and
                  Joe Kilian},
  editor       = {Alfred V. Aho},
  title        = {On Hiding Information from an Oracle (Extended Abstract)},
  booktitle    = {Proceedings of the 19th Annual {ACM} Symposium on Theory of Computing,
                  1987, New York, New York, {USA}},
  pages        = {195--203},
  publisher    = {{ACM}},
  year         = {1987},
  url          = {https://doi.org/10.1145/28395.28417},
  doi          = {10.1145/28395.28417},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/AbadiFK87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/AbadiM86,
  author       = {Mart{\'{\i}}n Abadi and
                  Zohar Manna},
  editor       = {J{\"{o}}rg H. Siekmann},
  title        = {Modal Theorem Proving},
  booktitle    = {8th International Conference on Automated Deduction, Oxford, England,
                  July 27 - August 1, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {230},
  pages        = {172--189},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-16780-3\_89},
  doi          = {10.1007/3-540-16780-3\_89},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/AbadiM86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/AbadiM86,
  author       = {Mart{\'{\i}}n Abadi and
                  Zohar Manna},
  title        = {A Timely Resolution},
  booktitle    = {Proceedings of the Symposium on Logic in Computer Science {(LICS}
                  '86), Cambridge, Massachusetts, USA, June 16-18, 1986},
  pages        = {176--186},
  publisher    = {{IEEE} Computer Society},
  year         = {1986},
  timestamp    = {Thu, 22 Jan 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/AbadiM86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lop/AbadiM85,
  author       = {Mart{\'{\i}}n Abadi and
                  Zohar Manna},
  editor       = {Rohit Parikh},
  title        = {Nonclausal Temporal Deduction},
  booktitle    = {Logics of Programs, Conference, Brooklyn College, New York, NY, USA,
                  June 17-19, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {193},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-15648-8\_1},
  doi          = {10.1007/3-540-15648-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/lop/AbadiM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics