The following pages link to Martín Abadi (Q265786):
Displaying 50 items.
- Layout randomization and nondeterminism (Q265789) (← links)
- Temporal logic programming (Q582280) (← links)
- A logical view of composition (Q685416) (← links)
- The existence of refinement mappings (Q805251) (← links)
- Deciding knowledge in security protocols under equational theories (Q860894) (← links)
- Secure circuit evaluation. A protocol based on hiding information from an oracle (Q913487) (← links)
- Corrigendum to: ``The power of temporal proofs'' (Q913784) (← links)
- The power of temporal proofs (Q1118578) (← links)
- On hiding information from an oracle (Q1263281) (← links)
- A calculus for cryptographic protocols: The spi calculus (Q1283776) (← links)
- (Q1314343) (redirect page) (← links)
- Formal parametric polymorphism (Q1314344) (← links)
- A semantics for static type inference in a nondeterministic language (Q1322481) (← links)
- Decidability and expressiveness for first-order logics of probability (Q1327387) (← links)
- Reconciling two views of cryptography (The computational soundness of formal encryption) (Q1601823) (← links)
- Secure implementation of channel abstractions (Q1854520) (← links)
- Secrecy types for asymmetric communication. (Q1874278) (← links)
- Private authentication (Q1881255) (← links)
- A theory of primitive objects: Untyped and first-order systems (Q1917083) (← links)
- A model of dynamic separation for transactional memory (Q1959477) (← links)
- Automated verification of selected equivalences for security protocols (Q2474047) (← links)
- Computer-assisted verification of a protocol for certified email (Q2568441) (← links)
- (Q2752046) (← links)
- (Q2769422) (← links)
- Analysis and caching of dependencies (Q2817686) (← links)
- Timely Dataflow: A Model (Q2827452) (← links)
- Message-Locked Encryption for Lock-Dependent Messages (Q2845684) (← links)
- Access Control in a Core Calculus of Dependency (Q2864145) (← links)
- Foundations of Differential Dataflow (Q2948552) (← links)
- (Q3024821) (← links)
- (Q3030268) (← links)
- A Model of Cooperative Threads (Q3064166) (← links)
- Secrecy by typing in security protocols (Q3158557) (← links)
- The Applied Pi Calculus (Q3177888) (← links)
- Perspectives on Transactional Memory (Q3184661) (← links)
- Logic in Access Control (Tutorial Notes) (Q3184786) (← links)
- Security Protocols: Principles and Calculi (Q3184790) (← links)
- Semantics of transactional memory and automatic mutual exclusion (Q3189827) (← links)
- (Q3204052) (← links)
- (Q3361872) (← links)
- Distributed Authorization with Distributed Grammars (Q3460860) (← links)
- Nonclausal deduction in first-order temporal logic (Q3474286) (← links)
- Automatic Mutual Exclusion and Atomicity Checks (Q3507386) (← links)
- Variations in Access Control Logic (Q3522044) (← links)
- A Model of Dynamic Separation for Transactional Memory (Q3541008) (← links)
- Analyzing security protocols with secrecy types and logic programs (Q3546279) (← links)
- Security analysis of cryptographically controlled access to XML documents (Q3546366) (← links)
- An abstract account of composition (Q3569039) (← links)
- Formal Analysis of Dynamic, Distributed File-System Access Controls (Q3613061) (← links)
- Models and Proofs of Protocol Security: A Progress Report (Q3636852) (← links)