Martín Abadi

From MaRDI portal
Person:265786

Available identifiers

zbMath Open abadi.martinDBLPa/MartinAbadiWikidataQ6777754 ScholiaQ6777754MaRDI QIDQ265786

List of research outcomes





PublicationDate of PublicationType
Smart Choices and the Selection Monad2023-08-26Paper
Reasoning about cryptographic protocols in the spi calculus2023-05-17Paper
An imperative object calculus2022-08-18Paper
The Applied Pi Calculus2018-08-02Paper
Open systems in TLA2017-09-29Paper
Timely Dataflow: A Model2016-10-19Paper
Analysis and caching of dependencies2016-09-01Paper
Layout randomization and nondeterminism2016-04-12Paper
Distributed Authorization with Distributed Grammars2016-01-08Paper
Foundations of Differential Dataflow2015-10-01Paper
Access control in a core calculus of dependency2015-08-03Paper
A model of cooperative threads2015-07-03Paper
A semantics for a logic of authentication (extended abstract)2015-06-19Paper
Mobile values, new names, and secure communication2015-03-17Paper
Analyzing security protocols with secrecy types and logic programs2015-03-17Paper
Authentication primitives and their compilation2015-03-17Paper
Semantics of transactional memory and automatic mutual exclusion2014-09-12Paper
Layout Randomization and Nondeterminism2014-06-02Paper
Access control in a core calculus of dependency2013-12-06Paper
Message-Locked Encryption for Lock-Dependent Messages2013-09-02Paper
On Layout Randomization for Arrays and Functions2013-08-06Paper
A Model of Cooperative Threads2010-12-20Paper
A model of dynamic separation for transactional memory2010-10-07Paper
An abstract account of composition2010-06-17Paper
Verification: Theory and Practice2010-03-23Paper
Perspectives on Transactional Memory2009-10-22Paper
Security Protocols: Principles and Calculi2009-10-22Paper
Logic in Access Control (Tutorial Notes)2009-10-22Paper
Models and Proofs of Protocol Security: A Progress Report2009-06-30Paper
Formal Analysis of Dynamic, Distributed File-System Access Controls2009-03-11Paper
Analyzing security protocols with secrecy types and logic programs2008-12-21Paper
Security analysis of cryptographically controlled access to XML documents2008-12-21Paper
A Model of Dynamic Separation for Transactional Memory2008-11-25Paper
Variations in Access Control Logic2008-08-28Paper
Automatic Mutual Exclusion and Atomicity Checks2008-06-19Paper
Computational Secrecy by Typing for the Pi Calculus2008-05-06Paper
A Modal Deconstruction of Access Control Logics2008-04-11Paper
Automated verification of selected equivalences for security protocols2008-03-05Paper
Programming Languages and Systems2007-09-28Paper
Foundations of Software Science and Computation Structures2007-09-28Paper
Foundations of Software Science and Computation Structures2007-05-02Paper
Deciding knowledge in security protocols under equational theories2007-01-09Paper
Automata, Languages and Programming2006-01-10Paper
https://portal.mardi4nfdi.de/entity/Q57144352006-01-02Paper
Logic for Programming, Artificial Intelligence, and Reasoning2005-11-10Paper
Computer-assisted verification of a protocol for certified email2005-10-10Paper
Automata, Languages and Programming2005-08-24Paper
Formal Techniques for Networked and Distributed Systems – FORTE 20042005-08-18Paper
https://portal.mardi4nfdi.de/entity/Q30248212005-07-04Paper
Secrecy by typing in security protocols2005-01-25Paper
Private authentication2004-10-04Paper
https://portal.mardi4nfdi.de/entity/Q48135182004-08-13Paper
https://portal.mardi4nfdi.de/entity/Q48134052004-08-13Paper
https://portal.mardi4nfdi.de/entity/Q44185862003-08-11Paper
Secrecy types for asymmetric communication.2003-05-25Paper
Secure implementation of channel abstractions2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q45364072002-11-25Paper
https://portal.mardi4nfdi.de/entity/Q45368122002-10-07Paper
Reconciling two views of cryptography (The computational soundness of formal encryption)2002-06-27Paper
https://portal.mardi4nfdi.de/entity/Q27694222002-02-05Paper
Security protocols and their properties2001-10-21Paper
[top ][top ]-closed relations and admissibility2000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q45016672000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q44907332000-07-20Paper
Explicit substitutions2000-02-09Paper
https://portal.mardi4nfdi.de/entity/Q42610751999-09-20Paper
A calculus for cryptographic protocols: The spi calculus1999-03-30Paper
https://portal.mardi4nfdi.de/entity/Q42309221999-02-17Paper
https://portal.mardi4nfdi.de/entity/Q42229421999-01-06Paper
A theory of primitive objects: Untyped and first-order systems1996-12-12Paper
https://portal.mardi4nfdi.de/entity/Q47152131996-11-12Paper
https://portal.mardi4nfdi.de/entity/Q48858751996-07-28Paper
Baby Modula-3 and a theory of objects1995-08-06Paper
Dynamic typing in polymorphic languages1995-06-08Paper
A semantics for static type inference in a nondeterministic language1995-01-12Paper
Decidability and expressiveness for first-order logics of probability1994-07-12Paper
https://portal.mardi4nfdi.de/entity/Q42814851994-06-02Paper
Formal parametric polymorphism1994-02-22Paper
A logical view of composition1994-01-13Paper
FAITHFUL IDEAL MODELS FOR RECURSIVE POLYMORPHIC TYPES1992-06-28Paper
https://portal.mardi4nfdi.de/entity/Q39725301992-06-25Paper
The existence of refinement mappings1991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33618721991-01-01Paper
Nonclausal deduction in first-order temporal logic1990-01-01Paper
Corrigendum to: ``The power of temporal proofs1990-01-01Paper
Secure circuit evaluation. A protocol based on hiding information from an oracle1990-01-01Paper
Temporal logic programming1989-01-01Paper
The power of temporal proofs1989-01-01Paper
On hiding information from an oracle1989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32040521989-01-01Paper
https://portal.mardi4nfdi.de/entity/Q52037141988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q30302681986-01-01Paper
https://portal.mardi4nfdi.de/entity/Q36824641985-01-01Paper

Research outcomes over time

This page was built for person: Martín Abadi