![]() | 2009 | |
---|---|---|
190 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bruno Blanchet, Hubert Comon-Lundh: Models and Proofs of Protocol Security: A Progress Report. CAV 2009: 35-49 |
189 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Andrew Birrell, Tim Harris, Johnson Hsieh, Michael Isard: Implementation and Use of Transactional Memory with Dynamic Separation. CC 2009: 63-77 |
188 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Tim Harris: Perspectives on Transactional Memory. CONCUR 2009: 1-14 |
187 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Logic in Access Control (Tutorial Notes). FOSAD 2009: 145-165 |
186 | ![]() ![]() ![]() ![]() ![]() ![]() | Wenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi: Unified Declarative Platform for Secure Netwoked Information Systems. ICDE 2009: 150-161 |
185 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Gordon D. Plotkin: A model of cooperative threads. POPL 2009: 29-40 |
184 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Tim Harris, Mojtaba Mehrara: Transactional memory with strong atomicity using off-the-shelf memory protection hardware. PPOPP 2009: 185-196 |
183 | ![]() ![]() ![]() ![]() ![]() ![]() | Yinglian Xie, Fang Yu, Martín Abadi: De-anonymizing the internet using unreliable IDs. SIGCOMM 2009: 75-86 |
2008 | ||
182 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: The good, the bad, and the provable. ACM Conference on Computer and Communications Security 2008: 1 |
181 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Tim Harris, Katherine F. Moore: A Model of Dynamic Separation for Transactional Memory. CONCUR 2008: 6-20 |
180 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Automatic Mutual Exclusion and Atomicity Checks. Concurrency, Graphs and Models 2008: 510-526 |
179 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Variations in Access Control Logic. DEON 2008: 96-109 |
178 | ![]() ![]() ![]() ![]() ![]() ![]() | Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon: Code-Carrying Authorization. ESORICS 2008: 563-579 |
177 | ![]() ![]() ![]() ![]() ![]() ![]() | Deepak Garg, Martín Abadi: A Modal Deconstruction of Access Control Logics. FoSSaCS 2008: 216-230 |
176 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Andrew Birrell, Tim Harris, Michael Isard: Semantics of transactional memory and automatic mutual exclusion. POPL 2008: 63-74 |
175 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bogdan Warinschi: Security analysis of cryptographically controlled access to XML documents. J. ACM 55(2): (2008) |
174 | ![]() ![]() ![]() ![]() ![]() ![]() | Bruno Blanchet, Martín Abadi, Cédric Fournet: Automated verification of selected equivalences for security protocols. J. Log. Algebr. Program. 75(1): 3-51 (2008) |
2007 | ||
173 | ![]() ![]() ![]() ![]() ![]() ![]() | Nathan Whitehead, Jordan Johnson, Martín Abadi: Policies and Proofs for Code Auditing. ATVA 2007: 1-14 |
172 | ![]() ![]() ![]() ![]() ![]() ![]() | Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon: Authorizing applications in singularity. EuroSys 2007: 355-368 |
171 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Security Protocols: Principles and Calculi. FOSAD 2007: 1-23 |
170 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bruno Blanchet, Cédric Fournet: Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3): (2007) |
169 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Jens Palsberg: Editorial. ACM Trans. Program. Lang. Syst. 29(3): (2007) |
168 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Access Control in a Core Calculus of Dependency. Electr. Notes Theor. Comput. Sci. 172: 5-31 (2007) |
167 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 20(3): 395 (2007) |
2006 | ||
166 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Ricardo Corin, Cédric Fournet: Computational Secrecy by Typing for the Pi Calculus. APLAS 2006: 253-269 |
165 | ![]() ![]() ![]() ![]() ![]() ![]() | Mihai Budiu, Úlfar Erlingsson, Martín Abadi: Architectural support for software-based protection. ASID 2006: 42-51 |
164 | ![]() ![]() ![]() ![]() ![]() ![]() | Avik Chaudhuri, Martín Abadi: Secrecy by Typing and File-Access Control. CSFW 2006: 112-123 |
163 | ![]() ![]() ![]() ![]() ![]() ![]() | Avik Chaudhuri, Martín Abadi: Formal Analysis of Dynamic, Distributed File-System Access Controls. FORTE 2006: 99-114 |
162 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Mathieu Baudet, Bogdan Warinschi: Guessing Attacks and the Computational Soundness of Static Equivalence. FoSSaCS 2006: 398-412 |
161 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Access control in a core calculus of dependency. ICFP 2006: 263-273 |
160 | ![]() ![]() ![]() ![]() ![]() ![]() | Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula: XFI: Software Guards for System Address Spaces. OSDI 2006: 75-88 |
159 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Cormac Flanagan, Stephen N. Freund: Types for safe locking: Static race detection for Java. ACM Trans. Program. Lang. Syst. 28(2): 207-255 (2006) |
158 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Véronique Cortier: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1-2): 2-32 (2006) |
2005 | ||
157 | ![]() ![]() ![]() ![]() ![]() ![]() | Jens Palsberg, Martín Abadi: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005 ACM 2005 |
156 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca de Alfaro: CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings Springer 2005 |
155 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti: Control-flow integrity. ACM Conference on Computer and Communications Security 2005: 340-353 |
154 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Véronique Cortier: Deciding Knowledge in Security Protocols under (Many More) Equational Theories. CSFW 2005: 62-76 |
153 | ![]() ![]() ![]() ![]() ![]() ![]() | Avik Chaudhuri, Martín Abadi: Formal security analysis of basic network-attached storage. FMSE 2005: 43-52 |
152 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bogdan Warinschi: Password-Based Encryption Analyzed. ICALP 2005: 664-676 |
151 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti: A Theory of Secure Control Flow. ICFEM 2005: 111-124 |
150 | ![]() ![]() ![]() ![]() ![]() ![]() | Bruno Blanchet, Martín Abadi, Cédric Fournet: Automated Verification of Selected Equivalences for Security Protocols. LICS 2005: 331-340 |
149 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bogdan Warinschi: Security analysis of cryptographically controlled access to XML documents. PODS 2005: 108-117 |
148 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber: Moderately hard, memory-bound functions. ACM Trans. Internet Techn. 5(2): 299-327 (2005) |
147 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bruno Blanchet: Analyzing security protocols with secrecy types and logic programs. J. ACM 52(1): 102-146 (2005) |
146 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Greg Morrisett, Andrei Sabelfeld: "Language-Based Security". J. Funct. Program. 15(2): 129 (2005) |
145 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bruno Blanchet: Computer-assisted verification of a protocol for certified email. Sci. Comput. Program. 58(1-2): 3-27 (2005) |
2004 | ||
144 | ![]() ![]() ![]() ![]() ![]() ![]() | Nathan Whitehead, Martín Abadi, George C. Necula: By Reason and Authority: A System for Authorization of Proof-Carrying Code. CSFW 2004: 236-250 |
143 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bruno Blanchet, Cédric Fournet: Just Fast Keying in the Pi Calculus. ESOP 2004: 340-354 |
142 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Ted Wobber: A Logical Account of NGSCB. FORTE 2004: 1-12 |
141 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Georges Gonthier, Benjamin Werner: Choice in Dynamic Linking. FoSSaCS 2004: 12-26 |
140 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Véronique Cortier: Deciding Knowledge in Security Protocols Under Equational Theories. ICALP 2004: 46-58 |
139 | ![]() ![]() ![]() ![]() ![]() ![]() | Nathan Whitehead, Martín Abadi: BCiC: A System for Code Authentication and Verification. LPAR 2004: 110-124 |
138 | ![]() ![]() ![]() ![]() ![]() ![]() | Katia Hayati, Martín Abadi: Language-Based Enforcement of Privacy Policies. Privacy Enhancing Technologies 2004: 302-313 |
137 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Trusted Computing, Trusted Third Parties, and Verified Communications. SEC 2004: 291-308 |
136 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Cédric Fournet: Private authentication. Theor. Comput. Sci. 322(3): 427-476 (2004) |
2003 | ||
135 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber: Bankable Postage for Network Services. ASIAN 2003: 72-90 |
134 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Built-in Object Security. ECOOP 2003: 1 |
133 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Logic in Access Control. LICS 2003: 228- |
132 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Cédric Fournet: Access Control Based on Execution History. NDSS 2003 |
131 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Michael Burrows, Ted Wobber: Moderately Hard, Memory-Bound Functions. NDSS 2003 |
130 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bruno Blanchet: Computer-Assisted Verification of a Protocol for Certified Email. SAS 2003: 316-335 |
129 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, K. Rustan M. Leino: A Logic of Object-Oriented Programs. Verification: Theory and Practice 2003: 11-41 |
128 | ![]() ![]() ![]() ![]() ![]() ![]() | Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning About Secrecy for Active Networks. Journal of Computer Security 11(2): 245-287 (2003) |
127 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bruno Blanchet: Secrecy types for asymmetric communication. Theor. Comput. Sci. 3(298): 387-415 (2003) |
2002 | ||
126 | ![]() ![]() ![]() ![]() ![]() ![]() | Cédric Fournet, Martín Abadi: Hiding Names: Private Authentication in the Applied Pi Calculus. ISSS 2002: 317-338 |
125 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bruno Blanchet: Analyzing security protocols with secrecy types and logic programs. POPL 2002: 33-44 |
124 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Private Authentication. Privacy Enhancing Technologies 2002: 27-40 |
123 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Neal Glew: Certified email with a light on-line trusted third party: design and implementation. WWW 2002: 387-395 |
122 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Leonid Libkin, Frank Pfenning: Editorial. ACM Trans. Comput. Log. 3(3): 335-335 (2002) |
121 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. Inf. Comput. 174(1): 37-83 (2002) |
120 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 15(2): 103-127 (2002) |
2001 | ||
119 | ![]() ![]() ![]() ![]() ![]() ![]() | Marcelo P. Fiore, Martín Abadi: Computing Symbolic Models for Verifying Cryptographic Protocols. CSFW 2001: 160-173 |
118 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Bruno Blanchet: Secrecy Types for Asymmetric Communication. FoSSaCS 2001: 25-41 |
117 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Leslie Lamport's properties and actions. PODC 2001: 15 |
116 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Cédric Fournet: Mobile values, new names, and secure communication. POPL 2001: 104-115 |
115 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Jan Jürjens: Formal Eavesdropping and Its Computational Interpretation. TACS 2001: 82-94 |
2000 | ||
114 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Taming the Adversary. CRYPTO 2000: 353-358 |
113 | ![]() ![]() ![]() ![]() ![]() ![]() | Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning about Secrecy for Active Networks. CSFW 2000: 118-129 |
112 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). IFIP TCS 2000: 3-22 |
111 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Cédric Fournet, Georges Gonthier: Authentication Primitives and Their Compilation. POPL 2000: 302-315 |
110 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: top-top-closed relations and admissibility. Mathematical Structures in Computer Science 10(3): 313-320 (2000) |
1999 | ||
109 | ![]() ![]() ![]() ![]() ![]() ![]() | Cormac Flanagan, Martín Abadi: Object Types against Races. CONCUR 1999: 288-303 |
108 | ![]() ![]() ![]() ![]() ![]() ![]() | Cormac Flanagan, Martín Abadi: Types for Safe Locking. ESOP 1999: 91-108 |
107 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Cédric Fournet, Georges Gonthier: A Top-Down Look at a Secure Message. FSTTCS 1999: 122-141 |
106 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Security Protocols and Specifications. FoSSaCS 1999: 1-13 |
105 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Communications Processing for Distributed Languages. IEEE Symposium on Security and Privacy 1999: 74-88 |
104 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke: A Core Calculus of Dependency. POPL 1999: 147-160 |
103 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Protection in Programming-Language Translations. Secure Internet Programming 1999: 19-34 |
102 | ![]() ![]() ![]() ![]() ![]() ![]() | Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber: Secure Network Objects. Secure Internet Programming 1999: 395-412 |
101 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymie Stata, Martín Abadi: A Type System for Java Bytecode Subroutines. ACM Trans. Program. Lang. Syst. 21(1): 90-137 (1999) |
100 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Secrecy in Programming-Language Semantics. Electr. Notes Theor. Comput. Sci. 20: (1999) |
99 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Andrew D. Gordon: A Calculus for Cryptographic Protocols: The spi Calculus. Inf. Comput. 148(1): 1-70 (1999) |
1998 | ||
98 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Two Facets of Authentication. CSFW 1998: 27-32 |
97 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 |
96 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Protection in Programming-Language Translations: Mobile Object Systems (Abstract). ECOOP Workshops 1998: 291 |
95 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Andrew D. Gordon: A Bisimulation Method for Cryptographic Protocols. ESOP 1998: 12-26 |
94 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Protection in Programming-Language Translations. ICALP 1998: 868-883 |
93 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. LICS 1998: 105-116 |
92 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymie Stata, Martín Abadi: A Type System for Java Bytecode Subroutines. POPL 1998: 149-160 |
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber: Secure Web Tunneling. Computer Networks 30(1-7): 531-539 (1998) |
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: On SDSI's Linked Local Name Spaces. Journal of Computer Security 6(1-2): 3-22 (1998) |
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Andrew D. Gordon: A Bisimulation Method for Cryptographic Protocols. Nord. J. Comput. 5(4): 267- (1998) |
1997 | ||
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Takayasu Ito: Theoretical Aspects of Computer Software, Third International Symposium, TACS '97, Sendai, Japan, September 23-26, 1997, Proceedings Springer 1997 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Andrew D. Gordon: A Calculus for Cryptographic Protocols: The Spi Calculus. ACM Conference on Computer and Communications Security 1997: 36-47 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Andrew D. Gordon: Reasoning about Cryptographic Protocols in the Spi Calculus. CONCUR 1997: 59-73 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: On SDSI's Linked Local Name Spaces. CSFW 1997: 98-108 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Secrecy by Typing inSecurity Protocols. TACS 1997: 611-638 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, K. Rustan M. Leino: A Logic of Object-Oriented Programs. TAPSOFT 1997: 682-696 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. Electr. Notes Theor. Comput. Sci. 10: (1997) |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Explicit Communication Revisited: Two New Attacks on Authentication Protocols. IEEE Trans. Software Eng. 23(3): 185-186 (1997) |
1996 | ||
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy: Analysis and Caching of Dependencies. ICFP 1996: 83-91 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber: Secure Network Objects. IEEE Symposium on Security and Privacy 1996: 211-221 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Marcelo P. Fiore: Syntactic Considerations on Recursive Types. LICS 1996: 242-252 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Stephan Merz: On TLA as a logic. NATO ASI DPD 1996: 235-271 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli, Ramesh Viswanathan: An Interpretation of Objects and Object Types. POPL 1996: 396-409 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli: On Subtyping and Matching. ACM Trans. Program. Lang. Syst. 18(4): 401-423 (1996) |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Roger M. Needham: Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Software Eng. 22(1): 6-15 (1996) |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects: Untyped and First-Order Systems. Inf. Comput. 125(2): 78-102 (1996) |
1995 | ||
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli: On Subtyping and Matching. ECOOP 1995: 145-167 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Stephan Merz: An Abstract Account of Composition. MFCS 1995: 499-508 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli: An Imperative Object Calculus. TAPSOFT 1995: 471-485 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Bellucci, Martín Abadi, Pierre-Louis Curien: A Model for Formal Parametric Polymorphism: A PER Interpretation for System R. TLCA 1995: 32-46 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Leslie Lamport: Conjoining Specifications. ACM Trans. Program. Lang. Syst. 17(3): 507-534 (1995) |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Didier Rémy: Dynamic Typing in Polymorphic Languages. J. Funct. Program. 5(1): 111-130 (1995) |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects: Second-Order Systems. Sci. Comput. Program. 25(2-3): 81-116 (1995) |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | John Lamping, Martín Abadi: Methods as Assertions. TAPOS 1(1): 5-18 (1995) |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli: An Imperative Object Calculus (Invited Paper). TAPOS 1(3): 151-166 (1995) |
1994 | ||
63 | ![]() ![]() ![]() ![]() ![]() ![]() | John Lamping, Martín Abadi: Methods as Assertions. ECOOP 1994: 60-80 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects - Scond-Order Systems. ESOP 1994: 1-25 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Leslie Lamport, Stephan Merz: A TLA Solution to the RPC-Memory Specification Problem. Formal Systems Specification 1994: 21-66 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Gordon D. Plotkin, Martín Abadi, Luca Cardelli: Subtyping and Parametricity LICS 1994: 310-319 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli: A Semantics of Object Types LICS 1994: 332-341 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Leslie Lamport: Open Systems in TLA. PODC 1994: 81-90 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Leslie Lamport: Decomposing Specifications of Concurrent Systems. PROCOMET 1994: 327-340 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli: A Theory of Primitive Objects - Untyped and First-Order Systems. TACS 1994: 296-320 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Edward Wobber, Martín Abadi, Michael Burrows: Authentication in the Taos Operating System. ACM Trans. Comput. Syst. 12(1): 3-32 (1994) |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Leslie Lamport: An Old-Fashined Recipe for Real-Time. ACM Trans. Program. Lang. Syst. 16(5): 1543-1571 (1994) |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: A Semantics for Static Type Inference in a Nondeterministic Language Inf. Comput. 109(1/2): 300-306 (1994) |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Joseph Y. Halpern: Decidability and Expressiveness for First-Order Logics of Probability Inf. Comput. 112(1): 1-36 (1994) |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi: Baby Modula-3 and a Theory of Objects. J. Funct. Program. 4(2): 249-283 (1994) |
1993 | ||
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Luca Cardelli, Florian Matthes, Martín Abadi: Extensible Grammars for Language Specialization. DBPL 1993: 11-31 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli, Pierre-Louis Curien: Formal Parametric Polymorphism. POPL 1993: 157-170 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson: Authentication in the Taos Operating System. SOSP 1993: 256-269 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Gordon D. Plotkin, Martín Abadi: A Logic for Parametric Polymorphism. TLCA 1993: 361-375 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Leslie Lamport: Composing Specifications. ACM Trans. Program. Lang. Syst. 15(1): 73-132 (1993) |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin: A Calculus for Access Control in Distributed Systems. ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993) |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson: Authentification and Delegation with Smart-Cards. Sci. Comput. Program. 21(2): 93-113 (1993) |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Gordon D. Plotkin: A Logical View of Composition. Theor. Comput. Sci. 114(1): 3-30 (1993) |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Martín Abadi, Luca Cardelli, Pierre-Louis Curien: Formal Parametric Polymorphism. Theor. Comput. Sci. 121(1&2): 9-58 (1993) |
1992 | ||
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Georges Gonthier, Martín Abadi, Jean-Jacques Lévy: Linear Logic Without Boxes LICS 1992: 223-234 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Georges Gonthier, Martín Abadi, Jean-Jacques Lévy: The Geometry of Optimal Lambda Reduction. POPL 1992: 15-26 |
39 | ![]() ![]() |