dblp.uni-trier.dewww.uni-trier.de

Martín Abadi Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
189EEMartín Abadi, Bruno Blanchet, Hubert Comon-Lundh: Models and Proofs of Protocol Security: A Progress Report. CAV 2009: 35-49
188EEMartín Abadi, Andrew Birrell, Tim Harris, Johnson Hsieh, Michael Isard: Implementation and Use of Transactional Memory with Dynamic Separation. CC 2009: 63-77
187EEMartín Abadi, Tim Harris: Perspectives on Transactional Memory. CONCUR 2009: 1-14
186EEMartín Abadi: Logic in Access Control (Tutorial Notes). FOSAD 2009: 145-165
185EEWenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi: Unified Declarative Platform for Secure Netwoked Information Systems. ICDE 2009: 150-161
184EEMartín Abadi, Gordon D. Plotkin: A model of cooperative threads. POPL 2009: 29-40
183EEMartín Abadi, Tim Harris, Mojtaba Mehrara: Transactional memory with strong atomicity using off-the-shelf memory protection hardware. PPOPP 2009: 185-196
2008
182EEMartín Abadi: The good, the bad, and the provable. ACM Conference on Computer and Communications Security 2008: 1
181EEMartín Abadi, Tim Harris, Katherine F. Moore: A Model of Dynamic Separation for Transactional Memory. CONCUR 2008: 6-20
180EEMartín Abadi: Automatic Mutual Exclusion and Atomicity Checks. Concurrency, Graphs and Models 2008: 510-526
179EEMartín Abadi: Variations in Access Control Logic. DEON 2008: 96-109
178EESergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon: Code-Carrying Authorization. ESORICS 2008: 563-579
177EEDeepak Garg, Martín Abadi: A Modal Deconstruction of Access Control Logics. FoSSaCS 2008: 216-230
176EEMartín Abadi, Andrew Birrell, Tim Harris, Michael Isard: Semantics of transactional memory and automatic mutual exclusion. POPL 2008: 63-74
175EEMartín Abadi, Bogdan Warinschi: Security analysis of cryptographically controlled access to XML documents. J. ACM 55(2): (2008)
174EEBruno Blanchet, Martín Abadi, Cédric Fournet: Automated verification of selected equivalences for security protocols. J. Log. Algebr. Program. 75(1): 3-51 (2008)
2007
173EENathan Whitehead, Jordan Johnson, Martín Abadi: Policies and Proofs for Code Auditing. ATVA 2007: 1-14
172EETed Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon: Authorizing applications in singularity. EuroSys 2007: 355-368
171EEMartín Abadi: Security Protocols: Principles and Calculi. FOSAD 2007: 1-23
170EEMartín Abadi, Bruno Blanchet, Cédric Fournet: Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3): (2007)
169EEMartín Abadi, Jens Palsberg: Editorial. ACM Trans. Program. Lang. Syst. 29(3): (2007)
168EEMartín Abadi: Access Control in a Core Calculus of Dependency. Electr. Notes Theor. Comput. Sci. 172: 5-31 (2007)
167EEMartín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 20(3): 395 (2007)
2006
166EEMartín Abadi, Ricardo Corin, Cédric Fournet: Computational Secrecy by Typing for the Pi Calculus. APLAS 2006: 253-269
165EEMihai Budiu, Úlfar Erlingsson, Martín Abadi: Architectural support for software-based protection. ASID 2006: 42-51
164EEAvik Chaudhuri, Martín Abadi: Secrecy by Typing and File-Access Control. CSFW 2006: 112-123
163EEAvik Chaudhuri, Martín Abadi: Formal Analysis of Dynamic, Distributed File-System Access Controls. FORTE 2006: 99-114
162EEMartín Abadi, Mathieu Baudet, Bogdan Warinschi: Guessing Attacks and the Computational Soundness of Static Equivalence. FoSSaCS 2006: 398-412
161EEMartín Abadi: Access control in a core calculus of dependency. ICFP 2006: 263-273
160EEÚlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula: XFI: Software Guards for System Address Spaces. OSDI 2006: 75-88
159EEMartín Abadi, Cormac Flanagan, Stephen N. Freund: Types for safe locking: Static race detection for Java. ACM Trans. Program. Lang. Syst. 28(2): 207-255 (2006)
158EEMartín Abadi, Véronique Cortier: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1-2): 2-32 (2006)
2005
157 Jens Palsberg, Martín Abadi: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005 ACM 2005
156 Martín Abadi, Luca de Alfaro: CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings Springer 2005
155EEMartín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti: Control-flow integrity. ACM Conference on Computer and Communications Security 2005: 340-353
154EEMartín Abadi, Véronique Cortier: Deciding Knowledge in Security Protocols under (Many More) Equational Theories. CSFW 2005: 62-76
153EEAvik Chaudhuri, Martín Abadi: Formal security analysis of basic network-attached storage. FMSE 2005: 43-52
152EEMartín Abadi, Bogdan Warinschi: Password-Based Encryption Analyzed. ICALP 2005: 664-676
151EEMartín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti: A Theory of Secure Control Flow. ICFEM 2005: 111-124
150EEBruno Blanchet, Martín Abadi, Cédric Fournet: Automated Verification of Selected Equivalences for Security Protocols. LICS 2005: 331-340
149EEMartín Abadi, Bogdan Warinschi: Security analysis of cryptographically controlled access to XML documents. PODS 2005: 108-117
148EEMartín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber: Moderately hard, memory-bound functions. ACM Trans. Internet Techn. 5(2): 299-327 (2005)
147EEMartín Abadi, Bruno Blanchet: Analyzing security protocols with secrecy types and logic programs. J. ACM 52(1): 102-146 (2005)
146EEMartín Abadi, Greg Morrisett, Andrei Sabelfeld: "Language-Based Security". J. Funct. Program. 15(2): 129 (2005)
145EEMartín Abadi, Bruno Blanchet: Computer-assisted verification of a protocol for certified email. Sci. Comput. Program. 58(1-2): 3-27 (2005)
2004
144EENathan Whitehead, Martín Abadi, George C. Necula: By Reason and Authority: A System for Authorization of Proof-Carrying Code. CSFW 2004: 236-250
143EEMartín Abadi, Bruno Blanchet, Cédric Fournet: Just Fast Keying in the Pi Calculus. ESOP 2004: 340-354
142EEMartín Abadi, Ted Wobber: A Logical Account of NGSCB. FORTE 2004: 1-12
141EEMartín Abadi, Georges Gonthier, Benjamin Werner: Choice in Dynamic Linking. FoSSaCS 2004: 12-26
140EEMartín Abadi, Véronique Cortier: Deciding Knowledge in Security Protocols Under Equational Theories. ICALP 2004: 46-58
139EENathan Whitehead, Martín Abadi: BCiC: A System for Code Authentication and Verification. LPAR 2004: 110-124
138EEKatia Hayati, Martín Abadi: Language-Based Enforcement of Privacy Policies. Privacy Enhancing Technologies 2004: 302-313
137 Martín Abadi: Trusted Computing, Trusted Third Parties, and Verified Communications. SEC 2004: 291-308
136EEMartín Abadi, Cédric Fournet: Private authentication. Theor. Comput. Sci. 322(3): 427-476 (2004)
2003
135EEMartín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber: Bankable Postage for Network Services. ASIAN 2003: 72-90
134EEMartín Abadi: Built-in Object Security. ECOOP 2003: 1
133EEMartín Abadi: Logic in Access Control. LICS 2003: 228-
132EEMartín Abadi, Cédric Fournet: Access Control Based on Execution History. NDSS 2003
131EEMartín Abadi, Michael Burrows, Ted Wobber: Moderately Hard, Memory-Bound Functions. NDSS 2003
130EEMartín Abadi, Bruno Blanchet: Computer-Assisted Verification of a Protocol for Certified Email. SAS 2003: 316-335
129EEMartín Abadi, K. Rustan M. Leino: A Logic of Object-Oriented Programs. Verification: Theory and Practice 2003: 11-41
128 Pankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning About Secrecy for Active Networks. Journal of Computer Security 11(2): 245-287 (2003)
127EEMartín Abadi, Bruno Blanchet: Secrecy types for asymmetric communication. Theor. Comput. Sci. 3(298): 387-415 (2003)
2002
126EECédric Fournet, Martín Abadi: Hiding Names: Private Authentication in the Applied Pi Calculus. ISSS 2002: 317-338
125EEMartín Abadi, Bruno Blanchet: Analyzing security protocols with secrecy types and logic programs. POPL 2002: 33-44
124EEMartín Abadi: Private Authentication. Privacy Enhancing Technologies 2002: 27-40
123EEMartín Abadi, Neal Glew: Certified email with a light on-line trusted third party: design and implementation. WWW 2002: 387-395
122EEMartín Abadi, Leonid Libkin, Frank Pfenning: Editorial. ACM Trans. Comput. Log. 3(3): 335-335 (2002)
121EEMartín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. Inf. Comput. 174(1): 37-83 (2002)
120EEMartín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 15(2): 103-127 (2002)
2001
119EEMarcelo P. Fiore, Martín Abadi: Computing Symbolic Models for Verifying Cryptographic Protocols. CSFW 2001: 160-173
118EEMartín Abadi, Bruno Blanchet: Secrecy Types for Asymmetric Communication. FoSSaCS 2001: 25-41
117EEMartín Abadi: Leslie Lamport's properties and actions. PODC 2001: 15
116EEMartín Abadi, Cédric Fournet: Mobile values, new names, and secure communication. POPL 2001: 104-115
115EEMartín Abadi, Jan Jürjens: Formal Eavesdropping and Its Computational Interpretation. TACS 2001: 82-94
2000
114EEMartín Abadi: Taming the Adversary. CRYPTO 2000: 353-358
113EEPankaj Kakkar, Carl A. Gunter, Martín Abadi: Reasoning about Secrecy for Active Networks. CSFW 2000: 118-129
112EEMartín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). IFIP TCS 2000: 3-22
111EEMartín Abadi, Cédric Fournet, Georges Gonthier: Authentication Primitives and Their Compilation. POPL 2000: 302-315
110 Martín Abadi: top-top-closed relations and admissibility. Mathematical Structures in Computer Science 10(3): 313-320 (2000)
1999
109EECormac Flanagan, Martín Abadi: Object Types against Races. CONCUR 1999: 288-303
108EECormac Flanagan, Martín Abadi: Types for Safe Locking. ESOP 1999: 91-108
107EEMartín Abadi, Cédric Fournet, Georges Gonthier: A Top-Down Look at a Secure Message. FSTTCS 1999: 122-141
106 Martín Abadi: Security Protocols and Specifications. FoSSaCS 1999: 1-13
105EEMartín Abadi, Cédric Fournet, Georges Gonthier: Secure Communications Processing for Distributed Languages. IEEE Symposium on Security and Privacy 1999: 74-88
104EEMartín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke: A Core Calculus of Dependency. POPL 1999: 147-160
103 Martín Abadi: Protection in Programming-Language Translations. Secure Internet Programming 1999: 19-34
102 Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber: Secure Network Objects. Secure Internet Programming 1999: 395-412
101EERaymie Stata, Martín Abadi: A Type System for Java Bytecode Subroutines. ACM Trans. Program. Lang. Syst. 21(1): 90-137 (1999)
100EEMartín Abadi: Secrecy in Programming-Language Semantics. Electr. Notes Theor. Comput. Sci. 20: (1999)
99 Martín Abadi, Andrew D. Gordon: A Calculus for Cryptographic Protocols: The spi Calculus. Inf. Comput. 148(1): 1-70 (1999)
1998
98EEMartín Abadi: Two Facets of Authentication. CSFW 1998: 27-32
97EERoberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82
96EEMartín Abadi: Protection in Programming-Language Translations: Mobile Object Systems (Abstract). ECOOP Workshops 1998: 291
95EEMartín Abadi, Andrew D. Gordon: A Bisimulation Method for Cryptographic Protocols. ESOP 1998: 12-26
94EEMartín Abadi: Protection in Programming-Language Translations. ICALP 1998: 868-883
93 Martín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. LICS 1998: 105-116
92EERaymie Stata, Martín Abadi: A Type System for Java Bytecode Subroutines. POPL 1998: 149-160
91EEMartín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber: Secure Web Tunneling. Computer Networks 30(1-7): 531-539 (1998)
90 Martín Abadi: On SDSI's Linked Local Name Spaces. Journal of Computer Security 6(1-2): 3-22 (1998)
89 Martín Abadi, Andrew D. Gordon: A Bisimulation Method for Cryptographic Protocols. Nord. J. Comput. 5(4): 267- (1998)
1997
88 Martín Abadi, Takayasu Ito: Theoretical Aspects of Computer Software, Third International Symposium, TACS '97, Sendai, Japan, September 23-26, 1997, Proceedings Springer 1997
87EEMartín Abadi, Andrew D. Gordon: A Calculus for Cryptographic Protocols: The Spi Calculus. ACM Conference on Computer and Communications Security 1997: 36-47
86EEMartín Abadi, Andrew D. Gordon: Reasoning about Cryptographic Protocols in the Spi Calculus. CONCUR 1997: 59-73
85EEMartín Abadi: On SDSI's Linked Local Name Spaces. CSFW 1997: 98-108
84 Martín Abadi: Secrecy by Typing inSecurity Protocols. TACS 1997: 611-638
83EEMartín Abadi, K. Rustan M. Leino: A Logic of Object-Oriented Programs. TAPSOFT 1997: 682-696
82EEMartín Abadi, Cédric Fournet, Georges Gonthier: Secure Implementation of Channel Abstractions. Electr. Notes Theor. Comput. Sci. 10: (1997)
81EEMartín Abadi: Explicit Communication Revisited: Two New Attacks on Authentication Protocols. IEEE Trans. Software Eng. 23(3): 185-186 (1997)
1996
80 Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy: Analysis and Caching of Dependencies. ICFP 1996: 83-91
79EELeendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber: Secure Network Objects. IEEE Symposium on Security and Privacy 1996: 211-221
78 Martín Abadi, Marcelo P. Fiore: Syntactic Considerations on Recursive Types. LICS 1996: 242-252
77 Martín Abadi, Stephan Merz: On TLA as a logic. NATO ASI DPD 1996: 235-271
76EEMartín Abadi, Luca Cardelli, Ramesh Viswanathan: An Interpretation of Objects and Object Types. POPL 1996: 396-409
75EEMartín Abadi, Luca Cardelli: On Subtyping and Matching. ACM Trans. Program. Lang. Syst. 18(4): 401-423 (1996)
74EEMartín Abadi, Roger M. Needham: Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Software Eng. 22(1): 6-15 (1996)
73 Martín Abadi, Luca Cardelli: A Theory of Primitive Objects: Untyped and First-Order Systems. Inf. Comput. 125(2): 78-102 (1996)
1995
72EEMartín Abadi, Luca Cardelli: On Subtyping and Matching. ECOOP 1995: 145-167
71EEMartín Abadi, Stephan Merz: An Abstract Account of Composition. MFCS 1995: 499-508
70EEMartín Abadi, Luca Cardelli: An Imperative Object Calculus. TAPSOFT 1995: 471-485
69 Roberto Bellucci, Martín Abadi, Pierre-Louis Curien: A Model for Formal Parametric Polymorphism: A PER Interpretation for System R. TLCA 1995: 32-46
68EEMartín Abadi, Leslie Lamport: Conjoining Specifications. ACM Trans. Program. Lang. Syst. 17(3): 507-534 (1995)
67 Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Didier Rémy: Dynamic Typing in Polymorphic Languages. J. Funct. Program. 5(1): 111-130 (1995)
66 Martín Abadi, Luca Cardelli: A Theory of Primitive Objects: Second-Order Systems. Sci. Comput. Program. 25(2-3): 81-116 (1995)
65 John Lamping, Martín Abadi: Methods as Assertions. TAPOS 1(1): 5-18 (1995)
64 Martín Abadi, Luca Cardelli: An Imperative Object Calculus (Invited Paper). TAPOS 1(3): 151-166 (1995)
1994
63EEJohn Lamping, Martín Abadi: Methods as Assertions. ECOOP 1994: 60-80
62EEMartín Abadi, Luca Cardelli: A Theory of Primitive Objects - Scond-Order Systems. ESOP 1994: 1-25
61 Martín Abadi, Leslie Lamport, Stephan Merz: A TLA Solution to the RPC-Memory Specification Problem. Formal Systems Specification 1994: 21-66
60 Gordon D. Plotkin, Martín Abadi, Luca Cardelli: Subtyping and Parametricity LICS 1994: 310-319
59 Martín Abadi, Luca Cardelli: A Semantics of Object Types LICS 1994: 332-341
58 Martín Abadi, Leslie Lamport: Open Systems in TLA. PODC 1994: 81-90
57 Martín Abadi, Leslie Lamport: Decomposing Specifications of Concurrent Systems. PROCOMET 1994: 327-340
56 Martín Abadi, Luca Cardelli: A Theory of Primitive Objects - Untyped and First-Order Systems. TACS 1994: 296-320
55EEEdward Wobber, Martín Abadi, Michael Burrows: Authentication in the Taos Operating System. ACM Trans. Comput. Syst. 12(1): 3-32 (1994)
54EEMartín Abadi, Leslie Lamport: An Old-Fashined Recipe for Real-Time. ACM Trans. Program. Lang. Syst. 16(5): 1543-1571 (1994)
53 Martín Abadi: A Semantics for Static Type Inference in a Nondeterministic Language Inf. Comput. 109(1/2): 300-306 (1994)
52 Martín Abadi, Joseph Y. Halpern: Decidability and Expressiveness for First-Order Logics of Probability Inf. Comput. 112(1): 1-36 (1994)
51 Martín Abadi: Baby Modula-3 and a Theory of Objects. J. Funct. Program. 4(2): 249-283 (1994)
1993
50EELuca Cardelli, Florian Matthes, Martín Abadi: Extensible Grammars for Language Specialization. DBPL 1993: 11-31
49 Martín Abadi, Luca Cardelli, Pierre-Louis Curien: Formal Parametric Polymorphism. POPL 1993: 157-170
48 Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson: Authentication in the Taos Operating System. SOSP 1993: 256-269
47 Gordon D. Plotkin, Martín Abadi: A Logic for Parametric Polymorphism. TLCA 1993: 361-375
46EEMartín Abadi, Leslie Lamport: Composing Specifications. ACM Trans. Program. Lang. Syst. 15(1): 73-132 (1993)
45EEMartín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin: A Calculus for Access Control in Distributed Systems. ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993)
44 Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson: Authentification and Delegation with Smart-Cards. Sci. Comput. Program. 21(2): 93-113 (1993)
43 Martín Abadi, Gordon D. Plotkin: A Logical View of Composition. Theor. Comput. Sci. 114(1): 3-30 (1993)
42 Martín Abadi, Luca Cardelli, Pierre-Louis Curien: Formal Parametric Polymorphism. Theor. Comput. Sci. 121(1&2): 9-58 (1993)
1992
41 Georges Gonthier, Martín Abadi, Jean-Jacques Lévy: Linear Logic Without Boxes LICS 1992: 223-234
40 Georges Gonthier, Martín Abadi, Jean-Jacques Lévy: The Geometry of Optimal Lambda Reduction. POPL 1992: 15-26
39EEButler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber: Authentication in Distributed Systems: Theory and Practice. ACM Trans. Comput. Syst. 10(4): 265-310 (1992)
1991
38EEMartín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin: A Calculus for Access Control in Distributed Systems. CRYPTO 1991: 1-23
37 Martín Abadi, Mark R. Tuttle: A Semantics for a Logic of Authentication (Extended Abstract). PODC 1991: 201-216
36 Martín Abadi, Gordon D. Plotkin: A Logical View of Composition and Refinement. POPL 1991: 323-332
35EEMartín Abadi, Leslie Lamport: An Old-Fashioned Recipe for Real Time. REX Workshop 1991: 1-27
34 Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber: Authentication in Distributed Systems: Theory and Practice. SOSP 1991: 165-182
33 Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson: Authentication and Delegation with Smart-cards. TACS 1991: 326-345
32EEMartín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin: Dynamic Typing in a Statically Typed Language. ACM Trans. Program. Lang. Syst. 13(2): 237-268 (1991)
31 Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider: Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''. Inf. Process. Lett. 40(3): 141-142 (1991)
30 Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin: Faithful Ideal Models for Recursive Polymorphic Types. Int. J. Found. Comput. Sci. 2(1): 1-21 (1991)
29 Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy: Explicit Substitutions. J. Funct. Program. 1(4): 375-416 (1991)
28 Martín Abadi, Leslie Lamport: The Existence of Refinement Mappings. Theor. Comput. Sci. 82(2): 253-284 (1991)
1990
27EEMartín Abadi: An Axiomatization of Lamport's Temporal Logic of Actions. CONCUR 1990: 57-69
26 Martín Abadi, Gordon D. Plotkin: A Per Model of Polymorphism and Recursive Types LICS 1990: 355-365
25 Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy: Explicit Substitutions. POPL 1990: 31-46
24EEMichael Burrows, Martín Abadi, Roger M. Needham: A Logic of Authentication. ACM Trans. Comput. Syst. 8(1): 18-36 (1990)
23EEMartín Abadi, Zohar Manna: Nonclausal Deduction in First-Order Temporal Logic J. ACM 37(2): 279-317 (1990)
22 Martín Abadi, Joan Feigenbaum: Secure Circuit Evaluation. J. Cryptology 2(1): 1-12 (1990)
21 Michael Burrows, Martín Abadi, Roger M. Needham: Rejoinder to Nessett. Operating Systems Review 24(2): 39-40 (1990)
20 Martín Abadi: Corrigendum: The Power of Temporal Proofs. Theor. Comput. Sci. 70(2): 275 (1990)
1989
19 Martín Abadi, Joseph Y. Halpern: Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract) FOCS 1989: 148-153
18EEMartín Abadi, Leslie Lamport, Pierre Wolper: Realizable and Unrealizable Specifications of Reactive Systems. ICALP 1989: 1-17
17 Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin: Faithful Ideal Models for Recursive Polymorphic Types LICS 1989: 216-225
16 Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin: Dynamic Typing in a Statically-Typed Language. POPL 1989: 213-227
15EEMartín Abadi, Leslie Lamport: Composing Specifications. REX Workshop 1989: 1-41
14 Michael Burrows, Martín Abadi, Roger M. Needham: A Logic of Authentication. SOSP 1989: 1-13
13 Martín Abadi, Joan Feigenbaum, Joe Kilian: On Hiding Information from an Oracle. J. Comput. Syst. Sci. 39(1): 21-50 (1989)
12 Martín Abadi, Zohar Manna: Temporal Logic Programming. J. Symb. Comput. 8(3): 277-295 (1989)
11 Martín Abadi: The Power of Temporal Proofs. Theor. Comput. Sci. 65(1): 35-83 (1989)
1988
10EEMartín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra: On Generating Solved Instances of Computational Problems. CRYPTO 1988: 297-310
9 Martín Abadi, Leslie Lamport: The Existence of Refinement Mappings LICS 1988: 165-175
8EEMartín Abadi, Joan Feigenbaum: A Simple Protocol for Secure Circuit Evaluation. STACS 1988: 264-272
7 Michael Burrows, Martín Abadi, Roger M. Needham: Authentication: A Practical Study in Belief and Action. TARK 1988: 325-342
1987
6 Martín Abadi: The Power of Temporal Proofs LICS 1987: 123-130
5 Martín Abadi, Zohar Manna: Temporal Logic Programming. SLP 1987: 4-16
4 Martín Abadi, Joan Feigenbaum, Joe Kilian: On Hiding Information from an Oracle (Extended Abstract) STOC 1987: 195-203
1986
3EEMartín Abadi, Zohar Manna: Modal Theorem Proving. CADE 1986: 172-189
2 Martín Abadi, Zohar Manna: A Timely Resolution LICS 1986: 176-186
1985
1 Martín Abadi, Zohar Manna: Nonclausal Temporal Deduction. Logic of Programs 1985: 1-15

Coauthor Index

1Luca de Alfaro [156]
2Eric Allender [10]
3Bowen Alpern [31]
4Krzysztof R. Apt [31]
5Anindya Banerjee [104]
6Mathieu Baudet [162]
7Roberto Bellucci [69]
8Andrew Birrell [91] [135] [172] [176] [188]
9Bruno Blanchet [118] [125] [127] [130] [143] [145] [147] [150] [170] [174] [189]
10Andrei Z. Broder [10]
11Mihai Budiu [151] [155] [160] [165]
12Michael Burrows [7] [14] [21] [24] [33] [34] [38] [39] [44] [45] [48] [55] [79] [102] [131] [135] [148]
13Luca Cardelli [16] [25] [29] [32] [42] [49] [50] [56] [59] [60] [62] [64] [66] [67] [70] [72] [73] [75] [76]
14Avik Chaudhuri [153] [163] [164]
15Hubert Comon-Lundh (Hubert Comon) [189]
16Ricardo Corin [166]
17Véronique Cortier [140] [154] [158]
18Pierre-Louis Curien [25] [29] [42] [49] [69]
19Frank Dabek [135]
20Leendert van Doorn [79] [102]
21Úlfar Erlingsson [151] [155] [160] [165]
22Joan Feigenbaum [4] [8] [10] [13] [22]
23Marcelo P. Fiore [78] [119]
24Cormac Flanagan [108] [109] [159]
25Riccardo Focardi [97]
26Cédric Fournet [82] [93] [105] [107] [111] [116] [121] [126] [132] [136] [143] [150] [166] [170] [174] [178]
27Nissim Francez [31]
28Stephen N. Freund [159]
29Deepak Garg [177]
30Neal Glew [123]
31Dieter Gollmann [97]
32Georges Gonthier [40] [41] [82] [93] [105] [107] [111] [121] [141]
33Andrew D. Gordon (Andy Gordon) [86] [87] [89] [95] [99] [178]
34Roberto Gorrieri [97]
35Carl A. Gunter [113] [128]
36Joseph Y. Halpern [19] [52]
37Tim Harris [176] [181] [183] [187] [188]
38Katia Hayati [138]
39Nevin Heintze [104]
40Lane A. Hemaspaandra (Lane A. Hemachandra) [10]
41Johnson Hsieh [188]
42Michael Isard [176] [188]
43Takayasu Ito [88]
44Jordan Johnson [173]
45Jan Jürjens [115]
46Pankaj Kakkar [113] [128]
47Shmuel Katz [31]
48C. Kaufman [33] [44]
49Joe Kilian [4] [13]
50John Lamping [63] [65]
51Leslie Lamport [9] [15] [18] [28] [31] [35] [46] [54] [57] [58] [61] [68]
52Butler W. Lampson [33] [34] [38] [39] [44] [45] [48] [80]
53K. Rustan M. Leino [83] [129]
54Jean-Jacques Lévy [25] [29] [40] [41] [80]
55Leonid Libkin [122]
56Jay Ligatti (Jarred Ligatti) [151] [155]
57Boon Thau Loo [185]
58Gavin Lowe [97]
59Sergio Maffeis [178]
60Mark S. Manasse (Mark Manasse) [148]
61Zohar Manna [1] [2] [3] [5] [12] [23]
62Yun Mao [185]
63Florian Matthes [50]
64Catherine Meadows [97]
65Mojtaba Mehrara [183]
66Stephan Merz [61] [71] [77]
67Katherine F. Moore [181]
68J. Gregory Morrisett (Greg Morrisett) [146]
69George C. Necula [144] [160]
70Roger M. Needham [7] [14] [21] [24] [74]
71Jens Palsberg [157] [169]
72Frank Pfenning [122]
73Benjamin C. Pierce [16] [17] [30] [32] [67]
74Gordon D. Plotkin [16] [17] [26] [30] [32] [36] [38] [43] [45] [47] [60] [184]
75Didier Rémy [67]
76Jon G. Riecke [104]
77Phillip Rogaway [112] [120] [167]
78Andrei Sabelfeld [146]
79Fred B. Schneider [31]
80Daniel R. Simon [172]
81Raymie Stata [91] [92] [101]
82Paul F. Syverson [97]
83Mark R. Tuttle [37]
84Ramesh Viswanathan [76]
85Michael Vrable [160]
86Bogdan Warinschi [149] [152] [162] [175]
87Benjamin Werner [141]
88Nathan Whitehead [139] [144] [173]
89Edward Wobber [34] [39] [48] [55] [79] [91] [102]
90Ted Wobber [131] [135] [142] [148] [172]
91Pierre Wolper [18]
92Aydan R. Yumerefendi [172]
93Wenchao Zhou [185]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)