Martín Abadi

According to our database1, Martín Abadi authored at least 250 papers between 1985 and 2018.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Awards

ACM Fellow

ACM Fellow 2008, "For contributions to computer security and verification of computer systems.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication.
J. ACM, 2018

Dynamic Control Flow in Large-Scale Machine Learning.
CoRR, 2018

Dynamic control flow in large-scale machine learning.
Proceedings of the Thirteenth EuroSys Conference, 2018

2017
Adversarial Patch.
CoRR, 2017

On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches.
CoRR, 2017

A computational model for TensorFlow: an introduction.
Proceedings of the 1st ACM SIGPLAN International Workshop on Machine Learning and Programming Languages, 2017

On the Protection of Private Information in Machine Learning Systems: Two Recent Approches.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data.
CoRR, 2016

Learning a Natural Language Interface with Neural Programmer.
CoRR, 2016

Deep Learning with Differential Privacy.
CoRR, 2016

The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication.
CoRR, 2016

TensorFlow: A system for large-scale machine learning.
CoRR, 2016

TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems.
CoRR, 2016

Learning to Protect Communications with Adversarial Neural Cryptography.
CoRR, 2016

Incremental, iterative data processing with timely dataflow.
Commun. ACM, 2016


TensorFlow: learning functions at scale.
Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, 2016

Deep Learning with Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Message-Locked Encryption for Lock-Dependent Messages.
IACR Cryptology ePrint Archive, 2015

Falkirk Wheel: Rollback Recovery for Dataflow Systems.
CoRR, 2015

On the Flow of Data, Information, and Time.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Timely Rollback: Specification and Verification.
Proceedings of the NASA Formal Methods - 7th International Symposium, 2015

Foundations of Differential Dataflow.
Proceedings of the Foundations of Software Science and Computation Structures, 2015

Timely Dataflow: A Model.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2015

The Prophecy of Undo.
Proceedings of the Fundamental Approaches to Software Engineering, 2015

The Prophecy of Timely Rollback (Invited Talk).
Proceedings of the 24th EACSL Annual Conference on Computer Science Logic, 2015

Distributed Authorization with Distributed Grammars.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Web PKI: Closing the Gap between Guidelines and Practices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Understanding TypeScript.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

Layout Randomization and Nondeterminism.
Proceedings of the Horizons of the Mind. A Tribute to Prakash Panangaden, 2014

2013
Layout Randomization and Nondeterminism.
Electr. Notes Theor. Comput. Sci., 2013

Naiad: a timely dataflow system.
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013

On Layout Randomization for Arrays and Functions.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Global Authentication in an Untrustworthy World.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Formal Analysis of a Distributed Algorithm for Tracking Progress.
Proceedings of the Formal Techniques for Distributed Systems, 2013

Message-Locked Encryption for Lock-Dependent Messages.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Early security classification of skype users via machine learning.
Proceedings of the AISec'13, 2013

SocialWatch: detection of online service abuse via large-scale social graphs.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
On Protection by Layout Randomization.
ACM Trans. Inf. Syst. Secur., 2012

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Software Security: A Formal Perspective - (Notes for a Talk).
Proceedings of the FM 2012: Formal Methods, 2012

Innocent by association: early recognition of legitimate users.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

A Functional View of Imperative Information Flow.
Proceedings of the Programming Languages and Systems - 10th Asian Symposium, 2012

2011
Semantics of transactional memory and automatic mutual exclusion.
ACM Trans. Program. Lang. Syst., 2011

Heat-seeking honeypots: design and experience.
Proceedings of the 20th International Conference on World Wide Web, 2011

deSEO: Combating Search-Result Poisoning.
Proceedings of the 20th USENIX Security Symposium, 2011

Differential privacy with information flow control.
Proceedings of the 2011 Workshop on Programming Languages and Analysis for Security, 2011

AC: composable asynchronous IO for native languages.
Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2011

2010
Guessing attacks and the computational soundness of static equivalence.
Journal of Computer Security, 2010

A model of dynamic separation for transactional memory.
Inf. Comput., 2010

A Model of Cooperative Threads
Logical Methods in Computer Science, 2010

Searching the Searchers with SearchAudit.
Proceedings of the 19th USENIX Security Symposium, 2010

The Fine Print of Security.
Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science, 2010

How to tell an airport from a home: techniques and applications.
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010

On Protection by Layout Randomization.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Control-flow integrity principles, implementations, and applications.
ACM Trans. Inf. Syst. Secur., 2009

De-anonymizing the internet using unreliable IDs.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

Transactional memory with strong atomicity using off-the-shelf memory protection hardware.
Proceedings of the 14th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2009

A model of cooperative threads.
Proceedings of the 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2009

Unified Declarative Platform for Secure Netwoked Information Systems.
Proceedings of the 25th International Conference on Data Engineering, 2009

Logic in Access Control (Tutorial Notes).
Proceedings of the Foundations of Security Analysis and Design V, 2009

Perspectives on Transactional Memory.
Proceedings of the CONCUR 2009 - Concurrency Theory, 20th International Conference, 2009

Implementation and Use of Transactional Memory with Dynamic Separation.
Proceedings of the Compiler Construction, 18th International Conference, 2009

Models and Proofs of Protocol Security: A Progress Report.
Proceedings of the Computer Aided Verification, 21st International Conference, 2009

2008
Automated verification of selected equivalences for security protocols.
J. Log. Algebr. Program., 2008

Security analysis of cryptographically controlled access to XML documents.
J. ACM, 2008

Semantics of transactional memory and automatic mutual exclusion.
Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2008

A Modal Deconstruction of Access Control Logics.
Proceedings of the Foundations of Software Science and Computational Structures, 2008

Code-Carrying Authorization.
Proceedings of the Computer Security, 2008

Variations in Access Control Logic.
Proceedings of the Deontic Logic in Computer Science, 9th International Conference, 2008

A Model of Dynamic Separation for Transactional Memory.
Proceedings of the CONCUR 2008 - Concurrency Theory, 19th International Conference, 2008

The good, the bad, and the provable.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Automatic Mutual Exclusion and Atomicity Checks.
Proceedings of the Concurrency, 2008

2007
Editorial.
ACM Trans. Program. Lang. Syst., 2007

Just fast keying in the pi calculus.
ACM Trans. Inf. Syst. Secur., 2007

Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
J. Cryptology, 2007

Access Control in a Core Calculus of Dependency.
Electr. Notes Theor. Comput. Sci., 2007

Towards a Declarative Language and System for Secure Networking.
Proceedings of the Third International Workshop on Networking Meets Databases, 2007

Security Protocols: Principles and Calculi.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Authorizing applications in singularity.
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007

Policies and Proofs for Code Auditing.
Proceedings of the Automated Technology for Verification and Analysis, 2007

2006
Types for safe locking: Static race detection for Java.
ACM Trans. Program. Lang. Syst., 2006

Deciding knowledge in security protocols under equational theories.
Theor. Comput. Sci., 2006

XFI: Software Guards for System Address Spaces.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006

Access control in a core calculus of dependency.
Proceedings of the 11th ACM SIGPLAN International Conference on Functional Programming, 2006

Guessing Attacks and the Computational Soundness of Static Equivalence.
Proceedings of the Foundations of Software Science and Computation Structures, 2006

Formal Analysis of Dynamic, Distributed File-System Access Controls.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2006

Secrecy by Typing and File-Access Control.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Architectural support for software-based protection.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

Computational Secrecy by Typing for the Pi Calculus.
Proceedings of the Programming Languages and Systems, 4th Asian Symposium, 2006

2005
Moderately hard, memory-bound functions.
ACM Trans. Internet Techn., 2005

Computer-assisted verification of a protocol for certified email.
Sci. Comput. Program., 2005

"Language-Based Security".
J. Funct. Program., 2005

Analyzing security protocols with secrecy types and logic programs.
J. ACM, 2005

Security analysis of cryptographically controlled access to XML documents.
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005

Automated Verification of Selected Equivalences for Security Protocols.
Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), 2005

A Theory of Secure Control Flow.
Proceedings of the Formal Methods and Software Engineering, 2005

Password-Based Encryption Analyzed.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Access Control in a World of Software Diversity.
Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating Systems, 2005

Deciding Knowledge in Security Protocols under (Many More) Equational Theories.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

Formal security analysis of basic network-attached storage.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

Control-flow integrity.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Private authentication.
Theor. Comput. Sci., 2004

Trusted Computing, Trusted Third Parties, and Verified Communications.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Language-Based Enforcement of Privacy Policies.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

BCiC: A System for Code Authentication and Verification.
Proceedings of the Logic for Programming, 2004

Deciding Knowledge in Security Protocols Under Equational Theories.
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004

Choice in Dynamic Linking.
Proceedings of the Foundations of Software Science and Computation Structures, 2004

A Logical Account of NGSCB.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2004

Just Fast Keying in the Pi Calculus.
Proceedings of the Programming Languages and Systems, 2004

By Reason and Authority: A System for Authorization of Proof-Carrying Code.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Secrecy types for asymmetric communication.
Theor. Comput. Sci., 2003

Reasoning About Secrecy for Active Networks.
Journal of Computer Security, 2003

Computer-Assisted Verification of a Protocol for Certified Email.
Proceedings of the Static Analysis, 10th International Symposium, 2003

Access Control Based on Execution History.
Proceedings of the Network and Distributed System Security Symposium, 2003

Moderately Hard, Memory-Bound Functions.
Proceedings of the Network and Distributed System Security Symposium, 2003

Logic in Access Control.
Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 2003

Built-in Object Security.
Proceedings of the ECOOP 2003, 2003

A Logic of Object-Oriented Programs.
Proceedings of the Verification: Theory and Practice, 2003

Bankable Postage for Network Services.
Proceedings of the Advances in Computing Science, 2003

2002
Editorial.
ACM Trans. Comput. Log., 2002

Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
J. Cryptology, 2002

Secure Implementation of Channel Abstractions.
Inf. Comput., 2002

Certified email with a light on-line trusted third party: design and implementation.
Proceedings of the Eleventh International World Wide Web Conference, 2002

Analyzing security protocols with secrecy types and logic programs.
Proceedings of the Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2002

Private Authentication.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

Hiding Names: Private Authentication in the Applied Pi Calculus.
Proceedings of the Software Security -- Theories and Systems, 2002

2001
Formal Eavesdropping and Its Computational Interpretation.
Proceedings of the Theoretical Aspects of Computer Software, 4th International Symposium, 2001

Mobile values, new names, and secure communication.
Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001

Leslie Lamport's properties and actions.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Secrecy Types for Asymmetric Communication.
Proceedings of the Foundations of Software Science and Computation Structures, 2001

Computing Symbolic Models for Verifying Cryptographic Protocols.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
top-top-closed relations and admissibility.
Mathematical Structures in Computer Science, 2000

Authentication Primitives and Their Compilation.
Proceedings of the POPL 2000, 2000

Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
Proceedings of the Theoretical Computer Science, 2000

Reasoning about Secrecy for Active Networks.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Taming the Adversary.
Proceedings of the Advances in Cryptology, 2000

1999
A Type System for Java Bytecode Subroutines.
ACM Trans. Program. Lang. Syst., 1999

A Calculus for Cryptographic Protocols: The spi Calculus.
Inf. Comput., 1999

Secrecy in Programming-Language Semantics.
Electr. Notes Theor. Comput. Sci., 1999

Secure Communications Processing for Distributed Languages.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

A Core Calculus of Dependency.
Proceedings of the POPL '99, 1999

A Top-Down Look at a Secure Message.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1999

Security Protocols and Specifications.
Proceedings of the Foundations of Software Science and Computation Structure, 1999

Types for Safe Locking.
Proceedings of the Programming Languages and Systems, 1999

Secure Network Objects.
Proceedings of the Secure Internet Programming, 1999

Protection in Programming-Language Translations.
Proceedings of the Secure Internet Programming, 1999

Object Types against Races.
Proceedings of the CONCUR '99: Concurrency Theory, 1999

1998
A Bisimulation Method for Cryptographic Protocols.
Nord. J. Comput., 1998

On SDSI's Linked Local Name Spaces.
Journal of Computer Security, 1998

Secure Web Tunneling.
Computer Networks, 1998

A Type System for Java Bytecode Subroutines.
Proceedings of the POPL '98, 1998

Secure Implementation of Channel Abstractions.
Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, 1998

Protection in Programming-Language Translations.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998

A Bisimulation Method for Cryptographic Protocols.
Proceedings of the Programming Languages and Systems - ESOP'98, 7th European Symposium on Programming, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'98, Lisbon, Portugal, March 28, 1998

Protection in Programming-Language Translations: Mobile Object Systems (Abstract).
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

Panel Introduction: Varieties of Authentication.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

Two Facets of Authentication.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Explicit Communication Revisited: Two New Attacks on Authentication Protocols.
IEEE Trans. Software Eng., 1997

Secure Implementation of Channel Abstractions.
Electr. Notes Theor. Comput. Sci., 1997

A Logic of Object-Oriented Programs.
Proceedings of the TAPSOFT'97: Theory and Practice of Software Development, 1997

Secrecy by Typing inSecurity Protocols.
Proceedings of the Theoretical Aspects of Computer Software, Third International Symposium, 1997

On SDSI's Linked Local Name Spaces.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

Reasoning about Cryptographic Protocols in the Spi Calculus.
Proceedings of the CONCUR '97: Concurrency Theory, 1997

A Calculus for Cryptographic Protocols: The Spi Calculus.
Proceedings of the CCS '97, 1997

1996
The Millicent Protocol for Inexpensive Electronic Commerce.
World Wide Web Journal, 1996

Prudent Engineering Practice for Cryptographic Protocols.
IEEE Trans. Software Eng., 1996

On Subtyping and Matching.
ACM Trans. Program. Lang. Syst., 1996

A Theory of Primitive Objects: Untyped and First-Order Systems.
Inf. Comput., 1996

Secure Network Objects.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

An Interpretation of Objects and Object Types.
Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996

On TLA as a logic.
Proceedings of the NATO Advanced Study Institute on Deductive Program Design, 1996

Syntactic Considerations on Recursive Types.
Proceedings of the Proceedings, 1996

Analysis and Caching of Dependencies.
Proceedings of the 1996 ACM SIGPLAN International Conference on Functional Programming, 1996

A Theory of Objects.
Monographs in Computer Science, Springer, ISBN: 978-1-4419-8598-9, 1996

1995
Conjoining Specifications.
ACM Trans. Program. Lang. Syst., 1995

Methods as Assertions.
TAPOS, 1995

An Imperative Object Calculus (Invited Paper).
TAPOS, 1995

A Theory of Primitive Objects: Second-Order Systems.
Sci. Comput. Program., 1995

Dynamic Typing in Polymorphic Languages.
J. Funct. Program., 1995

A Model for Formal Parametric Polymorphism: A PER Interpretation for System R.
Proceedings of the Typed Lambda Calculi and Applications, 1995

An Imperative Object Calculus.
Proceedings of the TAPSOFT'95: Theory and Practice of Software Development, 1995

An Abstract Account of Composition.
Proceedings of the Mathematical Foundations of Computer Science 1995, 1995

On Subtyping and Matching.
Proceedings of the ECOOP'95, 1995

1994
Decidability and Expressiveness for First-Order Logics of Probability
Inf. Comput., July, 1994

An Old-Fashined Recipe for Real-Time.
ACM Trans. Program. Lang. Syst., 1994

Authentication in the Taos Operating System.
ACM Trans. Comput. Syst., 1994

Baby Modula-3 and a Theory of Objects.
J. Funct. Program., 1994

A Semantics for Static Type Inference in a Nondeterministic Language
Inf. Comput., 1994

A Theory of Primitive Objects - Untyped and First-Order Systems.
Proceedings of the Theoretical Aspects of Computer Software, 1994

Prudent engineering practice for cryptographic protocols.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Decomposing Specifications of Concurrent Systems.
Proceedings of the Programming Concepts, 1994

Open Systems in TLA.
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

Subtyping and Parametricity
Proceedings of the Ninth Annual Symposium on Logic in Computer Science (LICS '94), 1994

A Semantics of Object Types
Proceedings of the Ninth Annual Symposium on Logic in Computer Science (LICS '94), 1994

A Theory of Primitive Objects - Scond-Order Systems.
Proceedings of the Programming Languages and Systems, 1994

Methods as Assertions.
Proceedings of the Object-Oriented Programming, Proceedings of the 8th European Conference, 1994

A TLA Solution to the RPC-Memory Specification Problem.
Proceedings of the Formal Systems Specification, 1994

1993
Composing Specifications.
ACM Trans. Program. Lang. Syst., 1993

A Calculus for Access Control in Distributed Systems.
ACM Trans. Program. Lang. Syst., 1993

A Logical View of Composition.
Theor. Comput. Sci., 1993

Formal Parametric Polymorphism.
Theor. Comput. Sci., 1993

Authentification and Delegation with Smart-Cards.
Sci. Comput. Program., 1993

A Logic for Parametric Polymorphism.
Proceedings of the Typed Lambda Calculi and Applications, 1993

Authentication in the Taos Operating System.
Proceedings of the Fourteenth ACM Symposium on Operating System Principles, 1993

Formal Parametric Polymorphism.
Proceedings of the Conference Record of the Twentieth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1993

Extensible Grammars for Language Specialization.
Proceedings of the Database Programming Languages (DBPL-4), Proceedings of the Fourth International Workshop on Database Programming Languages - Object Models and Languages, Manhattan, New York City, USA, 30 August, 1993

1992
Authentication in Distributed Systems: Theory and Practice.
ACM Trans. Comput. Syst., 1992

The Geometry of Optimal Lambda Reduction.
Proceedings of the Conference Record of the Nineteenth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1992

Linear Logic Without Boxes
Proceedings of the Seventh Annual Symposium on Logic in Computer Science (LICS '92), 1992

1991
Dynamic Typing in a Statically Typed Language.
ACM Trans. Program. Lang. Syst., 1991

The Existence of Refinement Mappings.
Theor. Comput. Sci., 1991

Explicit Substitutions.
J. Funct. Program., 1991

Preserving Liveness: Comments on "Safety and Liveness from a Methodological Point of View".
Inf. Process. Lett., 1991

Faithful Ideal Models for Recursive Polymorphic Types.
Int. J. Found. Comput. Sci., 1991

Authentication and Delegation with Smart-cards.
Proceedings of the Theoretical Aspects of Computer Software, 1991

Authentication in Distributed Systems: Theory and Practice.
Proceedings of the Thirteenth ACM Symposium on Operating System Principles, 1991

An Old-Fashioned Recipe for Real Time.
Proceedings of the Real-Time: Theory in Practice, 1991

A Logical View of Composition and Refinement.
Proceedings of the Conference Record of the Eighteenth Annual ACM Symposium on Principles of Programming Languages, 1991

A Semantics for a Logic of Authentication (Extended Abstract).
Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, 1991

A Calculus for Access Control in Distributed Systems.
Proceedings of the Advances in Cryptology, 1991

1990
Nonclausal Deduction in First-Order Temporal Logic
J. ACM, April, 1990

A Logic of Authentication.
ACM Trans. Comput. Syst., 1990

Corrigendum: The Power of Temporal Proofs.
Theor. Comput. Sci., 1990

Rejoinder to Nessett.
Operating Systems Review, 1990

Secure Circuit Evaluation.
J. Cryptology, 1990

Explicit Substitutions.
Proceedings of the Conference Record of the Seventeenth Annual ACM Symposium on Principles of Programming Languages, 1990

A Per Model of Polymorphism and Recursive Types
Proceedings of the Fifth Annual Symposium on Logic in Computer Science (LICS '90), 1990

An Axiomatization of Lamport's Temporal Logic of Actions.
Proceedings of the CONCUR '90, 1990

1989
The Power of Temporal Proofs.
Theor. Comput. Sci., 1989

Temporal Logic Programming.
J. Symb. Comput., 1989

On Hiding Information from an Oracle.
J. Comput. Syst. Sci., 1989

A Logic of Authentication.
Proceedings of the Twelfth ACM Symposium on Operating System Principles, 1989

Composing Specifications.
Proceedings of the Stepwise Refinement of Distributed Systems, 1989

Dynamic Typing in a Statically-Typed Language.
Proceedings of the Conference Record of the Sixteenth Annual ACM Symposium on Principles of Programming Languages, 1989

Faithful Ideal Models for Recursive Polymorphic Types
Proceedings of the Fourth Annual Symposium on Logic in Computer Science (LICS '89), 1989

Realizable and Unrealizable Specifications of Reactive Systems.
Proceedings of the Automata, Languages and Programming, 16th International Colloquium, 1989

Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract)
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989

The Scope of a Logic of Authentication.
Proceedings of the Distributed Computing And Cryptography, 1989

1988
Authentication: A Practical Study in Belief and Action.
Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, 1988

A Simple Protocol for Secure Circuit Evaluation.
Proceedings of the STACS 88, 1988

The Existence of Refinement Mappings
Proceedings of the Third Annual Symposium on Logic in Computer Science (LICS '88), 1988

On Generating Solved Instances of Computational Problems.
Proceedings of the Advances in Cryptology, 1988

1987
On Hiding Information from an Oracle (Extended Abstract)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987

Temporal Logic Programming.
Proceedings of the 1987 Symposium on Logic Programming, San Francisco, California, USA, August 31, 1987

The Power of Temporal Proofs
Proceedings of the Symposium on Logic in Computer Science (LICS '87), 1987

On hiding information from an oracle.
Proceedings of the Second Annual Conference on Structure in Complexity Theory, 1987

1986
A Timely Resolution
Proceedings of the Symposium on Logic in Computer Science (LICS '86), 1986

Modal Theorem Proving.
Proceedings of the 8th International Conference on Automated Deduction, Oxford, England, July 27, 1986

1985
Nonclausal Temporal Deduction.
Proceedings of the Logics of Programs, 1985


  Loading...