2013
202On Layout Randomization for Arrays and Functions. Martín Abadi, Jérémy Planul. POST 2013, 167-185. Web SearchBibTeXDownload
2012
201Innocent by association: early recognition of legitimate users. Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao. ACM Conference on Computer and Communications Security 2012, 353-364. Web SearchBibTeXDownload
200On Protection by Layout Randomization. Martín Abadi, Gordon D. Plotkin. ACM Trans. Inf. Syst. Secur. (15): 8 (2012). Web SearchBibTeXDownload
199A Functional View of Imperative Information Flow. Thomas H. Austin, Cormac Flanagan, Martín Abadi. APLAS 2012, 34-49. Web SearchBibTeXDownload
198Software Security: A Formal Perspective - (Notes for a Talk). Martín Abadi. FM 2012, 1-5. Web SearchBibTeXDownload
2011
197Semantics of transactional memory and automatic mutual exclusion. Martín Abadi, Andrew Birrell, Tim Harris, Michael Isard. ACM Trans. Program. Lang. Syst. (33): 2 (2011). Web SearchBibTeXDownload
196AC: composable asynchronous IO for native languages. Tim Harris, Martín Abadi, Rebecca Isaacs, Ross McIlroy. OOPSLA 2011, 903-920. Web SearchBibTeXDownload
195deSEO: Combating Search-Result Poisoning. John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi. USENIX Security Symposium 2011. Web SearchBibTeXDownload
194Heat-seeking honeypots: design and experience. John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi. WWW 2011, 207-216. Web SearchBibTeXDownload
2010
193On Protection by Layout Randomization. Martín Abadi, Gordon D. Plotkin. CSF 2010, 337-351. Web SearchBibTeXDownload
192How to tell an airport from a home: techniques and applications. Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage. HotNets 2010, 13. Web SearchBibTeXDownload
191A model of dynamic separation for transactional memory. Martín Abadi, Tim Harris, Katherine F. Moore. Inf. Comput. (208): 1093-1117 (2010). Web SearchBibTeXDownload
190Guessing attacks and the computational soundness of static equivalence. Mathieu Baudet, Bogdan Warinschi, Martín Abadi. Journal of Computer Security (18): 909-968 (2010). Web SearchBibTeXDownload
189The Fine Print of Security. Martín Abadi. LICS 2010, 110. Web SearchBibTeXDownload
188A Model of Cooperative Threads. Martín Abadi, Gordon D. Plotkin. Logical Methods in Computer Science (6) (2010). Web SearchBibTeXDownload
187Searching the Searchers with SearchAudit. John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy. USENIX Security Symposium 2010, 127-142. Web SearchBibTeXDownload
2009
186Control-flow integrity principles, implementations, and applications. Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti. ACM Trans. Inf. Syst. Secur. (13) (2009). Web SearchBibTeXDownload
185Models and Proofs of Protocol Security: A Progress Report. Martín Abadi, Bruno Blanchet, Hubert Comon-Lundh. CAV 2009, 35-49. Web SearchBibTeXDownload
184Implementation and Use of Transactional Memory with Dynamic Separation. Martín Abadi, Andrew Birrell, Tim Harris, Johnson Hsieh, Michael Isard. CC 2009, 63-77. Web SearchBibTeXDownload
183Perspectives on Transactional Memory. Martín Abadi, Tim Harris. CONCUR 2009, 1-14. Web SearchBibTeXDownload
182Logic in Access Control (Tutorial Notes). Martín Abadi. FOSAD 2009, 145-165. Web SearchBibTeXDownload
181Unified Declarative Platform for Secure Netwoked Information Systems. Wenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi. ICDE 2009, 150-161. Cited by 8Web SearchBibTeXDownload
180A model of cooperative threads. Martín Abadi, Gordon D. Plotkin. POPL 2009, 29-40. Web SearchBibTeXDownload
179Transactional memory with strong atomicity using off-the-shelf memory protection hardware. Martín Abadi, Tim Harris, Mojtaba Mehrara. PPOPP 2009, 185-196. Web SearchBibTeXDownload
178De-anonymizing the internet using unreliable IDs. Yinglian Xie, Fang Yu, Martín Abadi. SIGCOMM 2009, 75-86. Web SearchBibTeXDownload
2008
177The good, the bad, and the provable. Martín Abadi. ACM Conference on Computer and Communications Security 2008, 1. Web SearchBibTeXDownload
176A Model of Dynamic Separation for Transactional Memory. Martín Abadi, Tim Harris, Katherine F. Moore. CONCUR 2008, 6-20. Web SearchBibTeXDownload
175Automatic Mutual Exclusion and Atomicity Checks. Martín Abadi. Concurrency, Graphs and Models 2008, 510-526. Web SearchBibTeXDownload
174Variations in Access Control Logic. Martín Abadi. DEON 2008, 96-109. Web SearchBibTeXDownload
173Code-Carrying Authorization. Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon. ESORICS 2008, 563-579. Web SearchBibTeXDownload
172A Modal Deconstruction of Access Control Logics. Deepak Garg, Martín Abadi. FoSSaCS 2008, 216-230. Web SearchBibTeXDownload
171Security analysis of cryptographically controlled access to XML documents. Martín Abadi, Bogdan Warinschi. J. ACM (55) (2008). Web SearchBibTeXDownload
170Automated verification of selected equivalences for security protocols. Bruno Blanchet, Martín Abadi, Cédric Fournet. J. Log. Algebr. Program. (75): 3-51 (2008). Web SearchBibTeXDownload
169Semantics of transactional memory and automatic mutual exclusion. Martín Abadi, Andrew Birrell, Tim Harris, Michael Isard. POPL 2008, 63-74. Web SearchBibTeXDownload
2007
168Just fast keying in the pi calculus. Martín Abadi, Bruno Blanchet, Cédric Fournet. ACM Trans. Inf. Syst. Secur. (10) (2007). Web SearchBibTeXDownload
167Policies and Proofs for Code Auditing. Nathan Whitehead, Jordan Johnson, Martín Abadi. ATVA 2007, 1-14. Web SearchBibTeXDownload
166Access Control in a Core Calculus of Dependency. Martín Abadi. Electr. Notes Theor. Comput. Sci. (172): 5-31 (2007). Web SearchBibTeXDownload
165Authorizing applications in singularity. Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon. EuroSys 2007, 355-368. Web SearchBibTeXDownload
164Security Protocols: Principles and Calculi. Martín Abadi. FOSAD 2007, 1-23. Web SearchBibTeXDownload
163Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). Martín Abadi, Phillip Rogaway. J. Cryptology (20): 395 (2007). Web SearchBibTeXDownload
2006
162Types for safe locking: Static race detection for Java. Martín Abadi, Cormac Flanagan, Stephen N. Freund. ACM Trans. Program. Lang. Syst. (28): 207-255 (2006). Web SearchBibTeXDownload
161Computational Secrecy by Typing for the Pi Calculus. Martín Abadi, Ricardo Corin, Cédric Fournet. APLAS 2006, 253-269. Web SearchBibTeXDownload
160Architectural support for software-based protection. Mihai Budiu, Úlfar Erlingsson, Martín Abadi. ASID 2006, 42-51. Web SearchBibTeXDownload
159Secrecy by Typing and File-Access Control. Avik Chaudhuri, Martín Abadi. CSFW 2006, 112-123. Web SearchBibTeXDownload
158Formal Analysis of Dynamic, Distributed File-System Access Controls. Avik Chaudhuri, Martín Abadi. FORTE 2006, 99-114. Web SearchBibTeXDownload
157Guessing Attacks and the Computational Soundness of Static Equivalence. Martín Abadi, Mathieu Baudet, Bogdan Warinschi. FoSSaCS 2006, 398-412. Web SearchBibTeXDownload
156Access control in a core calculus of dependency. Martín Abadi. ICFP 2006, 263-273. Web SearchBibTeXDownload
155XFI: Software Guards for System Address Spaces. Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula. OSDI 2006, 75-88. Web SearchBibTeXDownload
154Deciding knowledge in security protocols under equational theories. Martín Abadi, Véronique Cortier. Theor. Comput. Sci. (367): 2-32 (2006). Web SearchBibTeXDownload
2005
153Control-flow integrity. Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti. ACM Conference on Computer and Communications Security 2005, 340-353. Web SearchBibTeXDownload
152Moderately hard, memory-bound functions. Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber. ACM Trans. Internet Techn. (5): 299-327 (2005). Web SearchBibTeXDownload
151Deciding Knowledge in Security Protocols under (Many More) Equational Theories. Martín Abadi, Véronique Cortier. CSFW 2005, 62-76. Web SearchBibTeXDownload
150Formal security analysis of basic network-attached storage. Avik Chaudhuri, Martín Abadi. FMSE 2005, 43-52. Web SearchBibTeXDownload
149Access Control in a World of Software Diversity. Martín Abadi, Andrew Birrell, Ted Wobber. HotOS 2005. Web SearchBibTeXDownload
148Password-Based Encryption Analyzed. Martín Abadi, Bogdan Warinschi. ICALP 2005, 664-676. Web SearchBibTeXDownload
147A Theory of Secure Control Flow. Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti. ICFEM 2005, 111-124. Web SearchBibTeXDownload
146Analyzing security protocols with secrecy types and logic programs. Martín Abadi, Bruno Blanchet. J. ACM (52): 102-146 (2005). Web SearchBibTeXDownload
145"Language-Based Security". Martín Abadi, Greg Morrisett, Andrei Sabelfeld. J. Funct. Program. (15): 129 (2005). Web SearchBibTeXDownload
144Automated Verification of Selected Equivalences for Security Protocols. Bruno Blanchet, Martín Abadi, Cédric Fournet. LICS 2005, 331-340. Web SearchBibTeXDownload
143Security analysis of cryptographically controlled access to XML documents. Martín Abadi, Bogdan Warinschi. PODS 2005, 108-117. Web SearchBibTeXDownload
142Computer-assisted verification of a protocol for certified email. Martín Abadi, Bruno Blanchet. Sci. Comput. Program. (58): 3-27 (2005). Web SearchBibTeXDownload
2004
141By Reason and Authority: A System for Authorization of Proof-Carrying Code. Nathan Whitehead, Martín Abadi, George C. Necula. CSFW 2004, 236-250. Web SearchBibTeXDownload
140Just Fast Keying in the Pi Calculus. Martín Abadi, Bruno Blanchet, Cédric Fournet. ESOP 2004, 340-354. Web SearchBibTeXDownload
139A Logical Account of NGSCB. Martín Abadi, Ted Wobber. FORTE 2004, 1-12. Web SearchBibTeXDownload
138Choice in Dynamic Linking. Martín Abadi, Georges Gonthier, Benjamin Werner. FoSSaCS 2004, 12-26. Web SearchBibTeXDownload
137Deciding Knowledge in Security Protocols Under Equational Theories. Martín Abadi, Véronique Cortier. ICALP 2004, 46-58. Web SearchBibTeXDownload
136BCiC: A System for Code Authentication and Verification. Nathan Whitehead, Martín Abadi. LPAR 2004, 110-124. Web SearchBibTeXDownload
135Language-Based Enforcement of Privacy Policies. Katia Hayati, Martín Abadi. Privacy Enhancing Technologies 2004, 302-313. Web SearchBibTeXDownload
134Trusted Computing, Trusted Third Parties, and Verified Communications. Martín Abadi. SEC 2004, 291-308. Web SearchBibTeX
133Private authentication. Martín Abadi, Cédric Fournet. Theor. Comput. Sci. (322): 427-476 (2004). Web SearchBibTeXDownload
2003
132Bankable Postage for Network Services. Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber. ASIAN 2003, 72-90. Web SearchBibTeXDownload
131Built-in Object Security. Martín Abadi. ECOOP 2003, 1. Web SearchBibTeXDownload
130Reasoning About Secrecy for Active Networks. Pankaj Kakkar, Carl A. Gunter, Martín Abadi. Journal of Computer Security (11): 245-287 (2003). Cited by 13Web SearchBibTeXDownload
129Logic in Access Control. Martín Abadi. LICS 2003, 228. Web SearchBibTeXDownload
128Access Control Based on Execution History. Martín Abadi, Cédric Fournet. NDSS 2003. Web SearchBibTeXDownload
127Moderately Hard, Memory-Bound Functions. Martín Abadi, Michael Burrows, Ted Wobber. NDSS 2003. Web SearchBibTeXDownload
126Computer-Assisted Verification of a Protocol for Certified Email. Martín Abadi, Bruno Blanchet. SAS 2003, 316-335. Web SearchBibTeXDownload
125Secrecy types for asymmetric communication. Martín Abadi, Bruno Blanchet. Theor. Comput. Sci. (3): 387-415 (2003). Web SearchBibTeXDownload
124A Logic of Object-Oriented Programs. Martín Abadi, K. Rustan M. Leino. Verification: Theory and Practice 2003, 11-41. Web SearchBibTeXDownload
2002
123Secure Implementation of Channel Abstractions. Martín Abadi, Cédric Fournet, Georges Gonthier. Inf. Comput. (174): 37-83 (2002). Web SearchBibTeXDownload
122Hiding Names: Private Authentication in the Applied Pi Calculus. Cédric Fournet, Martín Abadi. ISSS 2002, 317-338. Web SearchBibTeXDownload
121Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). Martín Abadi, Phillip Rogaway. J. Cryptology (15): 103-127 (2002). Web SearchBibTeXDownload
120Analyzing security protocols with secrecy types and logic programs. Martín Abadi, Bruno Blanchet. POPL 2002, 33-44. Web SearchBibTeXDownload
119Private Authentication. Martín Abadi. Privacy Enhancing Technologies 2002, 27-40. Web SearchBibTeXDownload
118Certified email with a light on-line trusted third party: design and implementation. Martín Abadi, Neal Glew. WWW 2002, 387-395. Web SearchBibTeXDownload
2001
117Computing Symbolic Models for Verifying Cryptographic Protocols. Marcelo P. Fiore, Martín Abadi. CSFW 2001, 160-173. Web SearchBibTeXDownload
116Secrecy Types for Asymmetric Communication. Martín Abadi, Bruno Blanchet. FoSSaCS 2001, 25-41. Web SearchBibTeXDownload
115Leslie Lamport's properties and actions. Martín Abadi. PODC 2001, 15. Web SearchBibTeXDownload
114Mobile values, new names, and secure communication. Martín Abadi, Cédric Fournet. POPL 2001, 104-115. Web SearchBibTeXDownload
113Formal Eavesdropping and Its Computational Interpretation. Martín Abadi, Jan Jürjens. TACS 2001, 82-94. Web SearchBibTeXDownload
2000
112Taming the Adversary. Martín Abadi. CRYPTO 2000, 353-358. Web SearchBibTeXDownload
111Reasoning about Secrecy for Active Networks. Pankaj Kakkar, Carl A. Gunter, Martín Abadi. CSFW 2000, 118-129. Cited by 2Web SearchBibTeXDownload
110Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). Martín Abadi, Phillip Rogaway. IFIP TCS 2000, 3-22. Web SearchBibTeXDownload
109top-top-closed relations and admissibility. Martín Abadi. Mathematical Structures in Computer Science (10): 313-320 (2000). Web SearchBibTeXDownload
108Authentication Primitives and Their Compilation. Martín Abadi, Cédric Fournet, Georges Gonthier. POPL 2000, 302-315. Web SearchBibTeXDownload
1999
107A Type System for Java Bytecode Subroutines. Raymie Stata, Martín Abadi. ACM Trans. Program. Lang. Syst. (21): 90-137 (1999). Web SearchBibTeXDownload
106Object Types against Races. Cormac Flanagan, Martín Abadi. CONCUR 1999, 288-303. Web SearchBibTeXDownload
105Secrecy in Programming-Language Semantics. Martín Abadi. Electr. Notes Theor. Comput. Sci. (20): 80-94 (1999). Web SearchBibTeXDownload
104Types for Safe Locking. Cormac Flanagan, Martín Abadi. ESOP 1999, 91-108. Web SearchBibTeXDownload
103Security Protocols and Specifications. Martín Abadi. FoSSaCS 1999, 1-13. Web SearchBibTeXDownload
102A Top-Down Look at a Secure Message. Martín Abadi, Cédric Fournet, Georges Gonthier. FSTTCS 1999, 122-141. Web SearchBibTeXDownload
101Secure Communications Processing for Distributed Languages. Martín Abadi, Cédric Fournet, Georges Gonthier. IEEE Symposium on Security and Privacy 1999, 74-88. Web SearchBibTeXDownload
100A Calculus for Cryptographic Protocols: The spi Calculus. Martín Abadi, Andrew D. Gordon. Inf. Comput. (148): 1-70 (1999). Web SearchBibTeXDownload
99A Core Calculus of Dependency. Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke. POPL 1999, 147-160. Web SearchBibTeXDownload
98Protection in Programming-Language Translations. Martín Abadi. Secure Internet Programming 1999, 19-34. Web SearchBibTeXDownload
97Secure Network Objects. Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber. Secure Internet Programming 1999, 395-412. Web SearchBibTeXDownload
1998
96Secure Web Tunneling. Martín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber. Computer Networks (30): 531-539 (1998). Web SearchBibTeXDownload
95Two Facets of Authentication. Martín Abadi. CSFW 1998, 27-32. Web SearchBibTeXDownload
94Panel Introduction: Varieties of Authentication. Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows. CSFW 1998, 79-82. Web SearchBibTeXDownload
93Protection in Programming-Language Translations: Mobile Object Systems (Abstract). Martín Abadi. ECOOP Workshops 1998, 291. Web SearchBibTeXDownload
92A Bisimulation Method for Cryptographic Protocols. Martín Abadi, Andrew D. Gordon. ESOP 1998, 12-26. Web SearchBibTeXDownload
91Protection in Programming-Language Translations. Martín Abadi. ICALP 1998, 868-883. Web SearchBibTeXDownload
90On SDSI's Linked Local Name Spaces. Martín Abadi. Journal of Computer Security (6): 3-22 (1998). Web SearchBibTeXDownload
89Secure Implementation of Channel Abstractions. Martín Abadi, Cédric Fournet, Georges Gonthier. LICS 1998, 105-116. Web SearchBibTeXDownload
88A Type System for Java Bytecode Subroutines. Raymie Stata, Martín Abadi. POPL 1998, 149-160. Web SearchBibTeXDownload
1997
87A Calculus for Cryptographic Protocols: The Spi Calculus. Martín Abadi, Andrew D. Gordon. ACM Conference on Computer and Communications Security 1997, 36-47. Web SearchBibTeXDownload
86Reasoning about Cryptographic Protocols in the Spi Calculus. Martín Abadi, Andrew D. Gordon. CONCUR 1997, 59-73. Web SearchBibTeXDownload
85On SDSI's Linked Local Name Spaces. Martín Abadi. CSFW 1997, 98-108. Web SearchBibTeXDownload
84Secure Implementation of Channel Abstractions. Martín Abadi, Cédric Fournet, Georges Gonthier. Electr. Notes Theor. Comput. Sci. (10): 202-203 (1997). Web SearchBibTeXDownload
83Explicit Communication Revisited: Two New Attacks on Authentication Protocols. Martín Abadi. IEEE Trans. Software Eng. (23): 185-186 (1997). Web SearchBibTeXDownload
82Secrecy by Typing inSecurity Protocols. Martín Abadi. TACS 1997, 611-638. Web SearchBibTeXDownload
81A Logic of Object-Oriented Programs. Martín Abadi, K. Rustan M. Leino. TAPSOFT 1997, 682-696. Web SearchBibTeXDownload
1996
80On Subtyping and Matching. Martín Abadi, Luca Cardelli. ACM Trans. Program. Lang. Syst. (18): 401-423 (1996). Web SearchBibTeXDownload
79Analysis and Caching of Dependencies. Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy. ICFP 1996, 83-91. Web SearchBibTeXDownload
78Secure Network Objects. Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber. IEEE Symposium on Security and Privacy 1996, 211-221. Web SearchBibTeXDownload
77Prudent Engineering Practice for Cryptographic Protocols. Martín Abadi, Roger M. Needham. IEEE Trans. Software Eng. (22): 6-15 (1996). Web SearchBibTeXDownload
76A Theory of Primitive Objects: Untyped and First-Order Systems. Martín Abadi, Luca Cardelli. Inf. Comput. (125): 78-102 (1996). Web SearchBibTeXDownload
75Syntactic Considerations on Recursive Types. Martín Abadi, Marcelo P. Fiore. LICS 1996, 242-252. Web SearchBibTeXDownload
74On TLA as a logic. Martín Abadi, Stephan Merz. NATO ASI DPD 1996, 235-271. Web SearchBibTeX
73An Interpretation of Objects and Object Types. Martín Abadi, Luca Cardelli, Ramesh Viswanathan. POPL 1996, 396-409. Web SearchBibTeXDownload
1995
72Conjoining Specifications. Martín Abadi, Leslie Lamport. ACM Trans. Program. Lang. Syst. (17): 507-534 (1995). Web SearchBibTeXDownload
71On Subtyping and Matching. Martín Abadi, Luca Cardelli. ECOOP 1995, 145-167. Web SearchBibTeXDownload
70Dynamic Typing in Polymorphic Languages. Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Didier Rémy. J. Funct. Program. (5): 111-130 (1995). Web SearchBibTeXDownload
69An Abstract Account of Composition. Martín Abadi, Stephan Merz. MFCS 1995, 499-508. Web SearchBibTeXDownload
68A Theory of Primitive Objects: Second-Order Systems. Martín Abadi, Luca Cardelli. Sci. Comput. Program. (25): 81-116 (1995). Web SearchBibTeXDownload
67Methods as Assertions. John Lamping, Martín Abadi. TAPOS (1): 5-18 (1995). Web SearchBibTeX
66An Imperative Object Calculus (Invited Paper). Martín Abadi, Luca Cardelli. TAPOS (1): 151-166 (1995). Web SearchBibTeX
65An Imperative Object Calculus. Martín Abadi, Luca Cardelli. TAPSOFT 1995, 471-485. Web SearchBibTeXDownload
64A Model for Formal Parametric Polymorphism: A PER Interpretation for System R. Roberto Bellucci, Martín Abadi, Pierre-Louis Curien. TLCA 1995, 32-46. Web SearchBibTeXDownload
1994
63Authentication in the Taos Operating System. Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson. ACM Trans. Comput. Syst. (12): 3-32 (1994). Web SearchBibTeXDownload
62An Old-Fashined Recipe for Real-Time. Martín Abadi, Leslie Lamport. ACM Trans. Program. Lang. Syst. (16): 1543-1571 (1994). Web SearchBibTeXDownload
61Methods as Assertions. John Lamping, Martín Abadi. ECOOP 1994, 60-80. Web SearchBibTeXDownload
60A Theory of Primitive Objects - Scond-Order Systems. Martín Abadi, Luca Cardelli. ESOP 1994, 1-25. Web SearchBibTeXDownload
59A TLA Solution to the RPC-Memory Specification Problem. Martín Abadi, Leslie Lamport, Stephan Merz. Formal Systems Specification 1994, 21-66. Web SearchBibTeXDownload
58A Semantics for Static Type Inference in a Nondeterministic Language. Martín Abadi. Inf. Comput. (109): 300-306 (1994). Web SearchBibTeXDownload
57Decidability and Expressiveness for First-Order Logics of Probability. Martín Abadi, Joseph Y. Halpern. Inf. Comput. (112): 1-36 (1994). Web SearchBibTeXDownload
56Baby Modula-3 and a Theory of Objects. Martín Abadi. J. Funct. Program. (4): 249-283 (1994). Web SearchBibTeXDownload
55A Semantics of Object Types. Martín Abadi, Luca Cardelli. LICS 1994, 332-341. Web SearchBibTeXDownload
54Subtyping and Parametricity. Gordon D. Plotkin, Martín Abadi, Luca Cardelli. LICS 1994, 310-319. Web SearchBibTeXDownload
53Open Systems in TLA. Martín Abadi, Leslie Lamport. PODC 1994, 81-90. Web SearchBibTeXDownload
52Decomposing Specifications of Concurrent Systems. Martín Abadi, Leslie Lamport. PROCOMET 1994, 327-340. Web SearchBibTeX
51A Theory of Primitive Objects - Untyped and First-Order Systems. Martín Abadi, Luca Cardelli. TACS 1994, 296-320. Web SearchBibTeXDownload
1993
50Composing Specifications. Martín Abadi, Leslie Lamport. ACM Trans. Program. Lang. Syst. (15): 73-132 (1993). Web SearchBibTeXDownload
49A Calculus for Access Control in Distributed Systems. Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin. ACM Trans. Program. Lang. Syst. (15): 706-734 (1993). Web SearchBibTeXDownload
48Extensible Grammars for Language Specialization. Luca Cardelli, Florian Matthes, Martín Abadi. DBPL 1993, 11-31. Web SearchBibTeX
47Formal Parametric Polymorphism. Martín Abadi, Luca Cardelli, Pierre-Louis Curien. POPL (121): 9-58 (1993). Web SearchBibTeXDownload
46Authentification and Delegation with Smart-Cards. Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson. Sci. Comput. Program. (21): 93-113 (1993). Web SearchBibTeXDownload
45Authentication in the Taos Operating System. Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson. SOSP 1993, 256-269. Web SearchBibTeXDownload
44A Logical View of Composition. Martín Abadi, Gordon D. Plotkin. Theor. Comput. Sci. (114): 3-30 (1993). Web SearchBibTeXDownload
43A Logic for Parametric Polymorphism. Gordon D. Plotkin, Martín Abadi. TLCA 1993, 361-375. Web SearchBibTeXDownload
1992
42Authentication in Distributed Systems: Theory and Practice. Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber. ACM Trans. Comput. Syst. (10): 265-310 (1992). Web SearchBibTeXDownload
41Linear Logic Without Boxes. Georges Gonthier, Martín Abadi, Jean-Jacques Lévy. LICS 1992, 223-234. Web SearchBibTeXDownload
40The Geometry of Optimal Lambda Reduction. Georges Gonthier, Martín Abadi, Jean-Jacques Lévy. POPL 1992, 15-26. Web SearchBibTeXDownload
1991
39Dynamic Typing in a Statically Typed Language. Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin. ACM Trans. Program. Lang. Syst. (13): 237-268 (1991). Web SearchBibTeXDownload
38A Calculus for Access Control in Distributed Systems. Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin. CRYPTO 1991, 1-23. Web SearchBibTeXDownload
37Preserving Liveness: Comments on ``Safety and Liveness from a Methodological Point of View''. Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider. Inf. Process. Lett. (40): 141-142 (1991). Web SearchBibTeXDownload
36Faithful Ideal Models for Recursive Polymorphic Types. Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin. Int. J. Found. Comput. Sci. (2): 1-21 (1991). Web SearchBibTeXDownload
35Explicit Substitutions. Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy. J. Funct. Program. (1): 375-416 (1991). Web SearchBibTeXDownload
34A Semantics for a Logic of Authentication (Extended Abstract). Martín Abadi, Mark R. Tuttle. PODC 1991, 201-216. Web SearchBibTeXDownload
33A Logical View of Composition and Refinement. Martín Abadi, Gordon D. Plotkin. POPL 1991, 323-332. Web SearchBibTeXDownload
32An Old-Fashioned Recipe for Real Time. Martín Abadi, Leslie Lamport. REX Workshop 1991, 1-27. Web SearchBibTeXDownload
31Authentication in Distributed Systems: Theory and Practice. Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber. SOSP 1991, 165-182. Web SearchBibTeXDownload
30Authentication and Delegation with Smart-cards. Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson. TACS 1991, 326-345. Web SearchBibTeXDownload
29The Existence of Refinement Mappings. Martín Abadi, Leslie Lamport. Theor. Comput. Sci. (82): 253-284 (1991). Web SearchBibTeXDownload
1990
28A Logic of Authentication. Michael Burrows, Martín Abadi, Roger M. Needham. ACM Trans. Comput. Syst. (8): 18-36 (1990). Web SearchBibTeXDownload
27An Axiomatization of Lamport's Temporal Logic of Actions. Martín Abadi. CONCUR 1990, 57-69. Web SearchBibTeXDownload
26Nonclausal Deduction in First-Order Temporal Logic. Martín Abadi, Zohar Manna. J. ACM (37): 279-317 (1990). Web SearchBibTeXDownload
25Secure Circuit Evaluation. Martín Abadi, Joan Feigenbaum. J. Cryptology (2): 1-12 (1990). Web SearchBibTeXDownload
24A Per Model of Polymorphism and Recursive Types. Martín Abadi, Gordon D. Plotkin. LICS 1990, 355-365. Web SearchBibTeXDownload
23Rejoinder to Nessett. Michael Burrows, Martín Abadi, Roger M. Needham. Operating Systems Review (24): 39-40 (1990). Web SearchBibTeXDownload
22Explicit Substitutions. Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy. POPL 1990, 31-46. Web SearchBibTeXDownload
21Corrigendum: The Power of Temporal Proofs. Martín Abadi. Theor. Comput. Sci. (70): 275 (1990). Web SearchBibTeXDownload
1989
20Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract). Martín Abadi, Joseph Y. Halpern. FOCS 1989, 148-153. Web SearchBibTeXDownload
19Realizable and Unrealizable Specifications of Reactive Systems. Martín Abadi, Leslie Lamport, Pierre Wolper. ICALP 1989, 1-17. Web SearchBibTeXDownload
18On Hiding Information from an Oracle. Martín Abadi, Joan Feigenbaum, Joe Kilian. J. Comput. Syst. Sci. (39): 21-50 (1989). Web SearchBibTeXDownload
17Temporal Logic Programming. Martín Abadi, Zohar Manna. J. Symb. Comput. (8): 277-295 (1989). Web SearchBibTeXDownload
16Faithful Ideal Models for Recursive Polymorphic Types. Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin. LICS 1989, 216-225. Web SearchBibTeXDownload
15Dynamic Typing in a Statically-Typed Language. Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin. POPL 1989, 213-227. Web SearchBibTeXDownload
14Composing Specifications. Martín Abadi, Leslie Lamport. REX Workshop 1989, 1-41. Web SearchBibTeXDownload
13A Logic of Authentication. Michael Burrows, Martín Abadi, Roger M. Needham. SOSP 1989, 1-13. Web SearchBibTeXDownload
12The Power of Temporal Proofs. Martín Abadi. Theor. Comput. Sci. (65): 35-83 (1989). Web SearchBibTeXDownload
1988
11On Generating Solved Instances of Computational Problems. Martín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra. CRYPTO 1988, 297-310. Web SearchBibTeXDownload
10The Existence of Refinement Mappings. Martín Abadi, Leslie Lamport. LICS 1988, 165-175. Web SearchBibTeXDownload
9A Simple Protocol for Secure Circuit Evaluation. Martín Abadi, Joan Feigenbaum. STACS 1988, 264-272. Web SearchBibTeXDownload
8Authentication: A Practical Study in Belief and Action. Michael Burrows, Martín Abadi, Roger M. Needham. TARK 1988, 325-342. Web SearchBibTeX
1987
7The Power of Temporal Proofs. Martín Abadi. LICS 1987, 123-130. Web SearchBibTeX
6Temporal Logic Programming. Martín Abadi, Zohar Manna. SLP 1987, 4-16. Web SearchBibTeX
5On Hiding Information from an Oracle (Extended Abstract). Martín Abadi, Joan Feigenbaum, Joe Kilian. STOC 1987, 195-203. Web SearchBibTeXDownload
4On hiding information from an oracle. Martín Abadi, Joan Feigenbaum, Joe Kilian. Structure in Complexity Theory Conference 1987. Web SearchBibTeX
1986
3Modal Theorem Proving. Martín Abadi, Zohar Manna. CADE 1986, 172-189. Web SearchBibTeXDownload
2A Timely Resolution. Martín Abadi, Zohar Manna. LICS 1986, 176-186. Web SearchBibTeX
1985
1Nonclausal Temporal Deduction. Martín Abadi, Zohar Manna. Logic of Programs 1985, 1-15. Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research