Year |
Citation |
Score |
2017 |
Abadi M, Blanchet B, Fournet C. The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication Journal of the Acm. 65: 1-103. DOI: 10.1145/3127586 |
0.461 |
|
2016 |
Murray DG, McSherry F, Isard M, Isaacs R, Barham P, Abadi M. Incremental, iterative data processing with timely dataflow Communications of the Acm. 59: 75-83. DOI: 10.1145/2983551 |
0.306 |
|
2013 |
Abadi M, Planul J, Plotkin G. Layout randomization and nondeterminism Electronic Notes in Theoretical Computer Science. 298: 29-50. DOI: 10.1016/J.Entcs.2013.09.006 |
0.378 |
|
2011 |
Abadi M, Birrell A, Harris T, Isard M. Semantics of transactional memory and automatic mutual exclusion Acm Transactions On Programming Languages and Systems. 33: 2. DOI: 10.1145/1889997.1889999 |
0.42 |
|
2010 |
Baudet M, Warinschi B, Abadi M. Guessing attacks and the computational soundness of static equivalence Journal of Computer Security. 18: 909-968. DOI: 10.3233/Jcs-2009-0386 |
0.323 |
|
2010 |
Abadi M, Plotkin G. On protection by layout randomization Proceedings - Ieee Computer Security Foundations Symposium. 337-351. DOI: 10.1145/2240276.2240279 |
0.418 |
|
2010 |
Abadi M, Harris T, Moore KF. A model of dynamic separation for transactional memory Information & Computation. 208: 1093-1117. DOI: 10.1016/J.Ic.2009.09.004 |
0.306 |
|
2009 |
Abadi M, Plotkin G. A model of cooperative threads Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 29-40. DOI: 10.2168/Lmcs-6(4:2)2010 |
0.407 |
|
2009 |
Abadi M. Logic in access control (tutorial notes) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5705: 145-165. DOI: 10.1007/978-3-642-03829-7_5 |
0.317 |
|
2008 |
Abadi M. Variations in access control logic Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5076: 96-109. DOI: 10.1007/978-3-540-70525-3_9 |
0.331 |
|
2007 |
Abadi M, Blanchet B, Fournet C. Just fast keying in the pi calculus Acm Transactions On Information and System Security. 10: 9. DOI: 10.1145/1266977.1266978 |
0.405 |
|
2007 |
Abadi M, Rogaway P. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) Journal of Cryptology. 20: 395-395. DOI: 10.1007/S00145-007-0203-0 |
0.327 |
|
2006 |
Abadi M, Flanagan C, Freund SN. Types for safe locking: Static race detection for Java Acm Transactions On Programming Languages and Systems. 28: 207-255. DOI: 10.1145/1119479.1119480 |
0.368 |
|
2006 |
Abadi M. Access control in a core calculus of dependency Proceedings of the Acm Sigplan International Conference On Functional Programming, Icfp. 2006: 263-273. DOI: 10.1016/J.Entcs.2007.02.002 |
0.384 |
|
2006 |
Abadi M, Corin R, Fournet C. Computational secrecy by typing for the Pi calculus Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4279: 253-269. |
0.318 |
|
2005 |
Abadi M, Budiu M, Erlingsson U, Ligatti J. Control-flow integrity: Principles, implementations, and applications Proceedings of the Acm Conference On Computer and Communications Security. 340-353. DOI: 10.1145/1609956.1609960 |
0.377 |
|
2005 |
Abadi M, Warinschi B. Security analysis of cryptographically controlled access to XML documents Proceedings of the Acm Sigact-Sigmod-Sigart Symposium On Principles of Database Systems. 108-117. DOI: 10.1145/1346330.1346331 |
0.388 |
|
2005 |
Abadi M, Morrisett G, Sabelfeld A. Language-Based Security Journal of Functional Programming. 15: 129. DOI: 10.1017/S0956796804005428 |
0.44 |
|
2005 |
Abadi M, Blanchet B. Computer-assisted verification of a protocol for certified email Science of Computer Programming. 58: 3-27. DOI: 10.1016/J.Scico.2005.02.002 |
0.384 |
|
2005 |
Blanchet B, Abadi M, Fournet C. Automated verification of selected equivalences for security protocols Proceedings - Symposium On Logic in Computer Science. 331-340. DOI: 10.1016/J.Jlap.2007.06.002 |
0.328 |
|
2005 |
Abadi M, Warinschi B. Password-based encryption analyzed Lecture Notes in Computer Science. 3580: 664-676. |
0.323 |
|
2005 |
Whitehead N, Abadi M. BCiC: A system for code authentication and verification Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3452: 110-124. |
0.571 |
|
2004 |
Abadi M, Cortier V. Deciding knowledge in security protocols under equational theories Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3142: 46-58. DOI: 10.1016/J.Tcs.2006.08.032 |
0.362 |
|
2004 |
Abadi M, Wobber T. A logical account of NGSCB Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3235: 1-12. |
0.302 |
|
2003 |
Kakkar P, Gunter CA, Abadi M. Reasoning about secrecy for active networks Journal of Computer Security. 11: 245-287. DOI: 10.3233/Jcs-2003-11205 |
0.352 |
|
2003 |
Abadi M, Blanchet B. Secrecy types for asymmetric communication Theoretical Computer Science. 298: 387-415. DOI: 10.1016/S0304-3975(02)00863-0 |
0.342 |
|
2003 |
Abadi M. Private authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2482: 27-40. DOI: 10.1016/J.Tcs.2003.12.023 |
0.371 |
|
2002 |
Abadi M, Blanchet B. Analyzing security protocols with secrecy types and logic programs Conference Record of the Annual Acm Symposium On Principles of Programming Languages. 33-44. DOI: 10.1145/1044731.1044735 |
0.441 |
|
2002 |
Abadi M, Fournet C, Gonthier G. Secure implementation of channel abstractions Information & Computation. 174: 37-83. DOI: 10.1006/Inco.2002.3086 |
0.415 |
|
2001 |
Abadi M, Jürjens J. Formal eavesdropping and its computational interpretation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2215: 82-94. |
0.339 |
|
2000 |
Abadi M. closed relations and admissibility Mathematical Structures in Computer Science. 10: 313-320. DOI: 10.1017/S0960129500003054 |
0.33 |
|
1999 |
Stata R, Abadi M. A type system for Java bytecode subroutines Acm Transactions On Programming Languages and Systems. 21: 90-137. DOI: 10.1145/314602.314606 |
0.386 |
|
1999 |
Abadi M. Secrecy in programming-language semantics Electronic Notes in Theoretical Computer Science. 20: 80-94. DOI: 10.1016/S1571-0661(04)80068-9 |
0.396 |
|
1999 |
Abadi M, Fournet C, Gonthier G. A top-down look at a secure message Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1738: 122-141. DOI: 10.1007/3-540-46691-6_10 |
0.314 |
|
1999 |
Abadi M, Gordon AD. A calculus for cryptographic protocols Information & Computation. 148: 1-70. DOI: 10.1006/Inco.1998.2740 |
0.378 |
|
1999 |
Abadi M. Protection in programming-language translations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1603: 19-34. |
0.326 |
|
1998 |
Abadi M, Fournet C, Gonthier G. Secure Implementation of Channel Abstractions (Abstract) Electronic Notes in Theoretical Computer Science. 10: 202-203. DOI: 10.1016/S1571-0661(05)82514-9 |
0.319 |
|
1998 |
Abadi M. Protection in programming-language translations: Mobile object systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1543: 291. |
0.334 |
|
1998 |
Abadi M. Protection in programming-langiiage translations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1443: 868-883. |
0.303 |
|
1997 |
Abadi M. Secrecy by typing in security protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1281: 611-638. DOI: 10.1145/324133.324266 |
0.434 |
|
1997 |
Abadi M. Explicit communication revisited: Two new attacks on authentication protocols Ieee Transactions On Software Engineering. 23: 185-186. DOI: 10.1109/32.585505 |
0.383 |
|
1995 |
Abadi M, Cardelli L. On subtyping and matching Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 952: 145-167. DOI: 10.1145/233561.233563 |
0.348 |
|
1995 |
Abadi M, Cardelli L, Pierce B, RéMY D. Dynamic typing in polymorphic languages Journal of Functional Programming. 5: 111-130. DOI: 10.1017/S095679680000126X |
0.333 |
|
1994 |
Abadi M, Lamport L. An Old-Fashioned Recipe for Real Time Acm Transactions On Programming Languages and Systems (Toplas). 16: 1543-1571. DOI: 10.1145/186025.186058 |
0.333 |
|
1994 |
Abadi M. Baby Modula-3 and a theory of objects Journal of Functional Programming. 4: 249-283. DOI: 10.1017/S0956796800001052 |
0.357 |
|
1994 |
Abadi M, Halpern JY. Decidability and Expressiveness for First-Order Logics of Probability Information and Computation. 112: 1-36. DOI: 10.1006/Inco.1994.1049 |
0.363 |
|
1993 |
Abadi M, Burrows M, Lampson B, Plotkin G. A calculus for access control in distributed systems Acm Transactions On Programming Languages and Systems. 15: 706-734. DOI: 10.1145/155183.155225 |
0.359 |
|
1993 |
Abadi M, Lamport L. Composing Specifications Acm Transactions On Programming Languages and Systems (Toplas). 15: 73-132. DOI: 10.1145/151646.151649 |
0.302 |
|
1993 |
Abadi M, Plotkin GD. A logical view of composition Theoretical Computer Science. 114: 3-30. DOI: 10.1016/0304-3975(93)90151-I |
0.32 |
|
1992 |
Lampson B, Abadi M, Burrows M, Wobber E. Authentication in distributed systems: theory and practice Acm Transactions On Computer Systems. 10: 265-310. DOI: 10.1145/138873.138874 |
0.353 |
|
1991 |
Abadi M, Alpern B, Apt KR, Francez N, Katz S, Lamport L, Schneider FB. Preserving liveness: Comments on "safety and liveness from a methodological point of view", Information Processing Letters. 40: 141-142. DOI: 10.1016/0020-0190(91)90168-H |
0.344 |
|
1990 |
Abadi M, Manna Z. Nonclausal Deduction in First-Order Temporal Logic Journal of the Acm (Jacm). 37: 279-317. DOI: 10.1145/77600.77617 |
0.349 |
|
1990 |
Burrows M, Abadi M, Needham R. A logic of Authentication Acm Transactions On Computer Systems (Tocs). 8: 18-36. DOI: 10.1098/Rspa.1989.0125 |
0.404 |
|
1989 |
Abadi M, Cardelli L, Pierce B, Plotkin G. Dynamic typing in a statically-typed language . 213-227. DOI: 10.1145/103135.103138 |
0.386 |
|
1989 |
Abadi M, Pierce B, Plotkin G. Faithful ideal models for recursive polymorphic types . 216-225. DOI: 10.1142/S0129054191000029 |
0.345 |
|
1989 |
Abadi M, Manna Z. Temporal logic programming Journal of Symbolic Computation. 8: 277-295. DOI: 10.1016/S0747-7171(89)80070-7 |
0.372 |
|
1989 |
Abadi M. The power of temporal proofs Theoretical Computer Science. 65: 35-83. DOI: 10.1016/0304-3975(89)90138-2 |
0.339 |
|
Show low-probability matches. |