default search action
Martín Abadi
Person information
- affiliation: University of California, Santa Cruz, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j67]Martín Abadi, Gordon D. Plotkin:
Smart Choices and the Selection Monad. Log. Methods Comput. Sci. 19(2) (2023) - 2021
- [c177]Ionel Gog, Michael Isard, Martín Abadi:
Falkirk Wheel: Rollback Recovery for Dataflow Systems. SoCC 2021: 373-387 - [c176]Martín Abadi, Gordon D. Plotkin:
Smart Choices and the Selection Monad. LICS 2021: 1-14 - 2020
- [j66]Martín Abadi, Gordon D. Plotkin:
A simple differentiable programming language. Proc. ACM Program. Lang. 4(POPL): 38:1-38:28 (2020) - [i14]Martín Abadi, Gordon D. Plotkin:
Smart Choices and the Selection Monad. CoRR abs/2007.08926 (2020)
2010 – 2019
- 2019
- [i13]Martín Abadi, Gordon D. Plotkin:
A Simple Differentiable Programming Language. CoRR abs/1911.04523 (2019) - 2018
- [j65]Martín Abadi, Bruno Blanchet, Cédric Fournet:
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication. J. ACM 65(1): 1:1-1:41 (2018) - [c175]Yuan Yu, Martín Abadi, Paul Barham, Eugene Brevdo, Mike Burrows, Andy Davis, Jeff Dean, Sanjay Ghemawat, Tim Harley, Peter Hawkins, Michael Isard, Manjunath Kudlur, Rajat Monga, Derek Gordon Murray, Xiaoqiang Zheng:
Dynamic control flow in large-scale machine learning. EuroSys 2018: 18:1-18:15 - [i12]Yuan Yu, Martín Abadi, Paul Barham, Eugene Brevdo, Mike Burrows, Andy Davis, Jeff Dean, Sanjay Ghemawat, Tim Harley, Peter Hawkins, Michael Isard, Manjunath Kudlur, Rajat Monga, Derek Gordon Murray, Xiaoqiang Zheng:
Dynamic Control Flow in Large-Scale Machine Learning. CoRR abs/1805.01772 (2018) - 2017
- [c174]Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang:
On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. CSF 2017: 1-6 - [c173]Arvind Neelakantan, Quoc V. Le, Martín Abadi, Andrew McCallum, Dario Amodei:
Learning a Natural Language Interface with Neural Programmer. ICLR (Poster) 2017 - [c172]Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, Kunal Talwar:
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. ICLR 2017 - [c171]Martín Abadi, Michael Isard, Derek Gordon Murray:
A computational model for TensorFlow: an introduction. MAPL@PLDI 2017: 1-7 - [i11]Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang:
On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches. CoRR abs/1708.08022 (2017) - [i10]Tom B. Brown, Dandelion Mané, Aurko Roy, Martín Abadi, Justin Gilmer:
Adversarial Patch. CoRR abs/1712.09665 (2017) - 2016
- [j64]Derek Gordon Murray, Frank McSherry, Michael Isard, Rebecca Isaacs, Paul Barham, Martín Abadi:
Incremental, iterative data processing with timely dataflow. Commun. ACM 59(10): 75-83 (2016) - [c170]Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang:
Deep Learning with Differential Privacy. CCS 2016: 308-318 - [c169]Martín Abadi:
TensorFlow: learning functions at scale. ICFP 2016: 1 - [c168]Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek Gordon Murray, Benoit Steiner, Paul A. Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, Xiaoqiang Zheng:
TensorFlow: A System for Large-Scale Machine Learning. OSDI 2016: 265-283 - [i9]Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Gregory S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian J. Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Józefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mané, Rajat Monga, Sherry Moore, Derek Gordon Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul A. Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda B. Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, Xiaoqiang Zheng:
TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems. CoRR abs/1603.04467 (2016) - [i8]Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek Gordon Murray, Benoit Steiner, Paul A. Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, Xiaoqiang Zhang:
TensorFlow: A system for large-scale machine learning. CoRR abs/1605.08695 (2016) - [i7]Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang:
Deep Learning with Differential Privacy. CoRR abs/1607.00133 (2016) - [i6]Martín Abadi, Bruno Blanchet, Cédric Fournet:
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication. CoRR abs/1609.03003 (2016) - [i5]Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, Kunal Talwar:
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. CoRR abs/1610.05755 (2016) - [i4]Martín Abadi, David G. Andersen:
Learning to Protect Communications with Adversarial Neural Cryptography. CoRR abs/1610.06918 (2016) - [i3]Arvind Neelakantan, Quoc V. Le, Martín Abadi, Andrew McCallum, Dario Amodei:
Learning a Natural Language Interface with Neural Programmer. CoRR abs/1611.08945 (2016) - 2015
- [c167]Martín Abadi, Mike Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly:
Distributed Authorization with Distributed Grammars. Programming Languages with Applications to Biology and Security 2015: 10-26 - [c166]Martín Abadi:
The Prophecy of Timely Rollback (Invited Talk). CSL 2015: 1-1 - [c165]Martín Abadi:
The Prophecy of Undo. FASE 2015: 347-361 - [c164]Martín Abadi, Michael Isard:
Timely Dataflow: A Model. FORTE 2015: 131-145 - [c163]Martín Abadi, Frank McSherry, Gordon D. Plotkin:
Foundations of Differential Dataflow. FoSSaCS 2015: 71-83 - [c162]Martín Abadi, Michael Isard:
Timely Rollback: Specification and Verification. NFM 2015: 19-34 - [c161]Martín Abadi, Michael Isard:
On the Flow of Data, Information, and Time. POST 2015: 73-92 - [i2]Michael Isard, Martín Abadi:
Falkirk Wheel: Rollback Recovery for Dataflow Systems. CoRR abs/1503.08877 (2015) - [i1]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. IACR Cryptol. ePrint Arch. 2015: 440 (2015) - 2014
- [c160]Martín Abadi, Jérémy Planul, Gordon D. Plotkin:
Layout Randomization and Nondeterminism. Horizons of the Mind 2014: 1-39 - [c159]Gavin M. Bierman, Martín Abadi, Mads Torgersen:
Understanding TypeScript. ECOOP 2014: 257-281 - [c158]Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Web PKI: Closing the Gap between Guidelines and Practices. NDSS 2014 - [e5]Martín Abadi, Steve Kremer:
Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Lecture Notes in Computer Science 8414, Springer 2014, ISBN 978-3-642-54791-1 [contents] - [e4]Martín Abadi, Alberto Lluch-Lafuente:
Trustworthy Global Computing - 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8358, Springer 2014, ISBN 978-3-319-05118-5 [contents] - 2013
- [c157]Anna Leontjeva, Moisés Goldszmidt, Yinglian Xie, Fang Yu, Martín Abadi:
Early security classification of skype users via machine learning. AISec 2013: 35-44 - [c156]Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao:
SocialWatch: detection of online service abuse via large-scale social graphs. AsiaCCS 2013: 143-148 - [c155]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. CRYPTO (1) 2013: 374-391 - [c154]Martín Abadi, Frank McSherry, Derek Gordon Murray, Thomas L. Rodeheffer:
Formal Analysis of a Distributed Algorithm for Tracking Progress. FMOODS/FORTE 2013: 5-19 - [c153]Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Global Authentication in an Untrustworthy World. HotOS 2013 - [c152]Martín Abadi, Jérémy Planul:
On Layout Randomization for Arrays and Functions. POST 2013: 167-185 - [c151]Derek Gordon Murray, Frank McSherry, Rebecca Isaacs, Michael Isard, Paul Barham, Martín Abadi:
Naiad: a timely dataflow system. SOSP 2013: 439-455 - [c150]Martín Abadi, Jérémy Planul, Gordon D. Plotkin:
Layout Randomization and Nondeterminism. MFPS 2013: 29-50 - 2012
- [j63]Martín Abadi, Gordon D. Plotkin:
On Protection by Layout Randomization. ACM Trans. Inf. Syst. Secur. 15(2): 8:1-8:29 (2012) - [c149]Thomas H. Austin, Cormac Flanagan, Martín Abadi:
A Functional View of Imperative Information Flow. APLAS 2012: 34-49 - [c148]Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao:
Innocent by association: early recognition of legitimate users. CCS 2012: 353-364 - [c147]Martín Abadi:
Software Security: A Formal Perspective - (Notes for a Talk). FM 2012: 1-5 - [c146]Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi:
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. NDSS 2012 - 2011
- [j62]Martín Abadi, Andrew Birrell, Tim Harris, Michael Isard:
Semantics of transactional memory and automatic mutual exclusion. ACM Trans. Program. Lang. Syst. 33(1): 2:1-2:50 (2011) - [c145]Tim Harris, Martín Abadi, Rebecca Isaacs, Ross McIlroy:
AC: composable asynchronous IO for native languages. OOPSLA 2011: 903-920 - [c144]Arnar Birgisson, Frank McSherry, Martín Abadi:
Differential privacy with information flow control. PLAS 2011: 2 - [c143]John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi:
deSEO: Combating Search-Result Poisoning. USENIX Security Symposium 2011 - [c142]John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi:
Heat-seeking honeypots: design and experience. WWW 2011: 207-216 - 2010
- [j61]Martín Abadi, Gordon D. Plotkin:
A Model of Cooperative Threads. Log. Methods Comput. Sci. 6(4) (2010) - [j60]Martín Abadi, Tim Harris, Katherine F. Moore:
A model of dynamic separation for transactional memory. Inf. Comput. 208(10): 1093-1117 (2010) - [j59]Mathieu Baudet, Bogdan Warinschi, Martín Abadi:
Guessing attacks and the computational soundness of static equivalence. J. Comput. Secur. 18(5): 909-968 (2010) - [c141]Martín Abadi, Gordon D. Plotkin:
On Protection by Layout Randomization. CSF 2010: 337-351 - [c140]Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage:
How to tell an airport from a home: techniques and applications. HotNets 2010: 13 - [c139]Martín Abadi:
The Fine Print of Security. LICS 2010: 110 - [c138]John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy:
Searching the Searchers with SearchAudit. USENIX Security Symposium 2010: 127-142
2000 – 2009
- 2009
- [j58]Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur. 13(1): 4:1-4:40 (2009) - [c137]Martín Abadi, Bruno Blanchet, Hubert Comon-Lundh:
Models and Proofs of Protocol Security: A Progress Report. CAV 2009: 35-49 - [c136]Martín Abadi, Andrew Birrell, Tim Harris, Johnson Hsieh, Michael Isard:
Implementation and Use of Transactional Memory with Dynamic Separation. CC 2009: 63-77 - [c135]Martín Abadi, Tim Harris:
Perspectives on Transactional Memory. CONCUR 2009: 1-14 - [c134]Martín Abadi:
Logic in Access Control (Tutorial Notes). FOSAD 2009: 145-165 - [c133]Wenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi:
Unified Declarative Platform for Secure Netwoked Information Systems. ICDE 2009: 150-161 - [c132]Martín Abadi, Gordon D. Plotkin:
A model of cooperative threads. POPL 2009: 29-40 - [c131]Martín Abadi, Tim Harris, Mojtaba Mehrara:
Transactional memory with strong atomicity using off-the-shelf memory protection hardware. PPoPP 2009: 185-196 - [c130]Yinglian Xie, Fang Yu, Martín Abadi:
De-anonymizing the internet using unreliable IDs. SIGCOMM 2009: 75-86 - 2008
- [j57]Martín Abadi, Bogdan Warinschi:
Security analysis of cryptographically controlled access to XML documents. J. ACM 55(2): 6:1-6:29 (2008) - [j56]Bruno Blanchet, Martín Abadi, Cédric Fournet:
Automated verification of selected equivalences for security protocols. J. Log. Algebraic Methods Program. 75(1): 3-51 (2008) - [c129]Martín Abadi:
Automatic Mutual Exclusion and Atomicity Checks. Concurrency, Graphs and Models 2008: 510-526 - [c128]Martín Abadi:
The good, the bad, and the provable. CCS 2008: 1 - [c127]Martín Abadi, Tim Harris, Katherine F. Moore:
A Model of Dynamic Separation for Transactional Memory. CONCUR 2008: 6-20 - [c126]Martín Abadi:
Variations in Access Control Logic. DEON 2008: 96-109 - [c125]Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon:
Code-Carrying Authorization. ESORICS 2008: 563-579 - [c124]Deepak Garg, Martín Abadi:
A Modal Deconstruction of Access Control Logics. FoSSaCS 2008: 216-230 - [c123]Martín Abadi, Andrew Birrell, Tim Harris, Michael Isard:
Semantics of transactional memory and automatic mutual exclusion. POPL 2008: 63-74 - 2007
- [j55]Martín Abadi, Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptol. 20(3): 395 (2007) - [j54]Martín Abadi, Bruno Blanchet, Cédric Fournet:
Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3): 9 (2007) - [j53]Martín Abadi, Jens Palsberg:
Editorial. ACM Trans. Program. Lang. Syst. 29(3): 14 (2007) - [c122]Nathan Whitehead, Jordan Johnson, Martín Abadi:
Policies and Proofs for Code Auditing. ATVA 2007: 1-14 - [c121]Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon:
Authorizing applications in singularity. EuroSys 2007: 355-368 - [c120]Martín Abadi:
Security Protocols: Principles and Calculi. FOSAD 2007: 1-23 - [c119]Martín Abadi, Boon Thau Loo:
Towards a Declarative Language and System for Secure Networking. NetDB 2007 - [c118]Martín Abadi:
Access Control in a Core Calculus of Dependency. Computation, Meaning, and Logic 2007: 5-31 - 2006
- [j52]Martín Abadi, Véronique Cortier:
Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1-2): 2-32 (2006) - [j51]Martín Abadi, Cormac Flanagan, Stephen N. Freund:
Types for safe locking: Static race detection for Java. ACM Trans. Program. Lang. Syst. 28(2): 207-255 (2006) - [c117]Martín Abadi, Ricardo Corin, Cédric Fournet:
Computational Secrecy by Typing for the Pi Calculus. APLAS 2006: 253-269 - [c116]Mihai Budiu, Úlfar Erlingsson, Martín Abadi:
Architectural support for software-based protection. ASID 2006: 42-51 - [c115]Avik Chaudhuri, Martín Abadi:
Secrecy by Typing and File-Access Control. CSFW 2006: 112-123 - [c114]Avik Chaudhuri, Martín Abadi:
Formal Analysis of Dynamic, Distributed File-System Access Controls. FORTE 2006: 99-114 - [c113]Martín Abadi, Mathieu Baudet, Bogdan Warinschi:
Guessing Attacks and the Computational Soundness of Static Equivalence. FoSSaCS 2006: 398-412 - [c112]Martín Abadi:
Access control in a core calculus of dependency. ICFP 2006: 263-273 - [c111]Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula:
XFI: Software Guards for System Address Spaces. OSDI 2006: 75-88 - 2005
- [j50]Martín Abadi, Bruno Blanchet:
Analyzing security protocols with secrecy types and logic programs. J. ACM 52(1): 102-146 (2005) - [j49]Martín Abadi, Greg Morrisett, Andrei Sabelfeld:
"Language-Based Security". J. Funct. Program. 15(2): 129 (2005) - [j48]Martín Abadi, Bruno Blanchet:
Computer-assisted verification of a protocol for certified email. Sci. Comput. Program. 58(1-2): 3-27 (2005) - [j47]Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber:
Moderately hard, memory-bound functions. ACM Trans. Internet Techn. 5(2): 299-327 (2005) - [c110]Avik Chaudhuri, Martín Abadi:
Formal security analysis of basic network-attached storage. FMSE 2005: 43-52 - [c109]Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
Control-flow integrity. CCS 2005: 340-353 - [c108]Martín Abadi, Véronique Cortier:
Deciding Knowledge in Security Protocols under (Many More) Equational Theories. CSFW 2005: 62-76 - [c107]Martín Abadi, Andrew Birrell, Ted Wobber:
Access Control in a World of Software Diversity. HotOS 2005 - [c106]Martín Abadi, Bogdan Warinschi:
Password-Based Encryption Analyzed. ICALP 2005: 664-676 - [c105]Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
A Theory of Secure Control Flow. ICFEM 2005: 111-124 - [c104]Bruno Blanchet, Martín Abadi, Cédric Fournet:
Automated Verification of Selected Equivalences for Security Protocols. LICS 2005: 331-340 - [c103]Martín Abadi, Bogdan Warinschi:
Security analysis of cryptographically controlled access to XML documents. PODS 2005: 108-117 - [e3]Martín Abadi, Luca de Alfaro:
CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings. Lecture Notes in Computer Science 3653, Springer 2005, ISBN 3-540-28309-9 [contents] - [e2]Jens Palsberg, Martín Abadi:
Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005. ACM 2005, ISBN 1-58113-830-X [contents] - 2004
- [j46]Martín Abadi, Cédric Fournet:
Private authentication. Theor. Comput. Sci. 322(3): 427-476 (2004) - [c102]Nathan Whitehead, Martín Abadi, George C. Necula:
By Reason and Authority: A System for Authorization of Proof-Carrying Code. CSFW 2004: 236-250 - [c101]Martín Abadi, Bruno Blanchet, Cédric Fournet:
Just Fast Keying in the Pi Calculus. ESOP 2004: 340-354 - [c100]Martín Abadi, Ted Wobber:
A Logical Account of NGSCB. FORTE 2004: 1-12 - [c99]Martín Abadi, Georges Gonthier, Benjamin Werner:
Choice in Dynamic Linking. FoSSaCS 2004: 12-26 - [c98]Martín Abadi, Véronique Cortier:
Deciding Knowledge in Security Protocols Under Equational Theories. ICALP 2004: 46-58 - [c97]Nathan Whitehead, Martín Abadi:
BCiC: A System for Code Authentication and Verification. LPAR 2004: 110-124 - [c96]Katia Hayati, Martín Abadi:
Language-Based Enforcement of Privacy Policies. Privacy Enhancing Technologies 2004: 302-313 - [c95]Martín Abadi:
Trusted Computing, Trusted Third Parties, and Verified Communications. SEC 2004: 291-308 - 2003
- [j45]Pankaj Kakkar, Carl A. Gunter, Martín Abadi:
Reasoning About Secrecy for Active Networks. J. Comput. Secur. 11(2): 245-287 (2003) - [j44]Martín Abadi, Bruno Blanchet:
Secrecy types for asymmetric communication. Theor. Comput. Sci. 298(3): 387-415 (2003) - [c94]Martín Abadi, Andrew Birrell, Michael Burrows, Frank Dabek, Ted Wobber:
Bankable Postage for Network Services. ASIAN 2003: 72-90 - [c93]Martín Abadi, K. Rustan M. Leino:
A Logic of Object-Oriented Programs. Verification: Theory and Practice 2003: 11-41 - [c92]Martín Abadi:
Built-in Object Security. ECOOP 2003: 1 - [c91]Martín Abadi:
Logic in Access Control. LICS 2003: 228- - [c90]Martín Abadi, Michael Burrows, Ted Wobber:
Moderately Hard, Memory-Bound Functions. NDSS 2003 - [c89]Martín Abadi, Cédric Fournet:
Access Control Based on Execution History. NDSS 2003 - [c88]Martín Abadi, Bruno Blanchet:
Computer-Assisted Verification of a Protocol for Certified Email. SAS 2003: 316-335 - 2002
- [j43]Martín Abadi, Cédric Fournet, Georges Gonthier:
Secure Implementation of Channel Abstractions. Inf. Comput. 174(1): 37-83 (2002) - [j42]Martín Abadi, Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptol. 15(2): 103-127 (2002) - [j41]Martín Abadi, Leonid Libkin, Frank Pfenning:
Editorial. ACM Trans. Comput. Log. 3(3): 335-335 (2002) - [c87]Cédric Fournet, Martín Abadi:
Hiding Names: Private Authentication in the Applied Pi Calculus. ISSS 2002: 317-338 - [c86]Martín Abadi:
Private Authentication. Privacy Enhancing Technologies 2002: 27-40 - [c85]Martín Abadi, Bruno Blanchet:
Analyzing security protocols with secrecy types and logic programs. POPL 2002: 33-44 - [c84]Martín Abadi, Neal Glew:
Certified email with a light on-line trusted third party: design and implementation. WWW 2002: 387-395 - 2001
- [c83]Marcelo P. Fiore, Martín Abadi:
Computing Symbolic Models for Verifying Cryptographic Protocols. CSFW 2001: 160-173 - [c82]Martín Abadi, Bruno Blanchet:
Secrecy Types for Asymmetric Communication. FoSSaCS 2001: 25-41 - [c81]Martín Abadi:
Leslie Lamport's properties and actions. PODC 2001: 15 - [c80]Martín Abadi, Cédric Fournet:
Mobile values, new names, and secure communication. POPL 2001: 104-115 - [c79]Martín Abadi, Jan Jürjens:
Formal Eavesdropping and Its Computational Interpretation. TACS 2001: 82-94 - 2000
- [j40]Martín Abadi:
top-top-closed relations and admissibility. Math. Struct. Comput. Sci. 10(3): 313-320 (2000) - [c78]Martín Abadi:
Taming the Adversary. CRYPTO 2000: 353-358 - [c77]Pankaj Kakkar, Carl A. Gunter, Martín Abadi:
Reasoning about Secrecy for Active Networks. CSFW 2000: 118-129 - [c76]Martín Abadi, Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). IFIP TCS 2000: 3-22 - [c75]Martín Abadi, Cédric Fournet, Georges Gonthier:
Authentication Primitives and Their Compilation. POPL 2000: 302-315
1990 – 1999
- 1999
- [j39]Martín Abadi, Andrew D. Gordon:
A Calculus for Cryptographic Protocols: The spi Calculus. Inf. Comput. 148(1): 1-70 (1999) - [j38]Raymie Stata, Martín Abadi:
A Type System for Java Bytecode Subroutines. ACM Trans. Program. Lang. Syst. 21(1): 90-137 (1999) - [c74]Cormac Flanagan, Martín Abadi:
Object Types against Races. CONCUR 1999: 288-303 - [c73]Martín Abadi:
Protection in Programming-Language Translations. Secure Internet Programming 1999: 19-34 - [c72]Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:
Secure Network Objects. Secure Internet Programming 1999: 395-412 - [c71]Cormac Flanagan, Martín Abadi:
Types for Safe Locking. ESOP 1999: 91-108 - [c70]Martín Abadi:
Security Protocols and Specifications. FoSSaCS 1999: 1-13 - [c69]Martín Abadi, Cédric Fournet, Georges Gonthier:
A Top-Down Look at a Secure Message. FSTTCS 1999: 122-141 - [c68]Martín Abadi, Anindya Banerjee, Nevin Heintze, Jon G. Riecke:
A Core Calculus of Dependency. POPL 1999: 147-160 - [c67]Martín Abadi, Cédric Fournet, Georges Gonthier:
Secure Communications Processing for Distributed Languages. S&P 1999: 74-88 - [c66]Martín Abadi:
Secrecy in Programming-Language Semantics. MFPS 1999: 80-94 - 1998
- [j37]Martín Abadi, Andrew Birrell, Raymie Stata, Edward Wobber:
Secure Web Tunneling. Comput. Networks 30(1-7): 531-539 (1998) - [j36]Martín Abadi:
On SDSI's Linked Local Name Spaces. J. Comput. Secur. 6(1-2): 3-22 (1998) - [j35]Martín Abadi, Andrew D. Gordon:
A Bisimulation Method for Cryptographic Protocols. Nord. J. Comput. 5(4): 267- (1998) - [c65]Martín Abadi:
Two Facets of Authentication. CSFW 1998: 27-32 - [c64]Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows:
Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 - [c63]Martín Abadi:
Protection in Programming-Language Translations: Mobile Object Systems (Abstract). ECOOP Workshops 1998: 291 - [c62]Martín Abadi, Andrew D. Gordon:
A Bisimulation Method for Cryptographic Protocols. ESOP 1998: 12-26 - [c61]Martín Abadi:
Protection in Programming-Language Translations. ICALP 1998: 868-883 - [c60]Martín Abadi, Cédric Fournet, Georges Gonthier:
Secure Implementation of Channel Abstractions. LICS 1998: 105-116 - [c59]Raymie Stata, Martín Abadi:
A Type System for Java Bytecode Subroutines. POPL 1998: 149-160 - 1997
- [j34]Martín Abadi:
Explicit Communication Revisited: Two New Attacks on Authentication Protocols. IEEE Trans. Software Eng. 23(3): 185-186 (1997) - [c58]Martín Abadi, Andrew D. Gordon:
A Calculus for Cryptographic Protocols: The Spi Calculus. CCS 1997: 36-47 - [c57]Martín Abadi, Andrew D. Gordon:
Reasoning about Cryptographic Protocols in the Spi Calculus. CONCUR 1997: 59-73 - [c56]Martín Abadi:
On SDSI's Linked Local Name Spaces. CSFW 1997: 98-108 - [c55]Martín Abadi:
Secrecy by Typing inSecurity Protocols. TACS 1997: 611-638 - [c54]Martín Abadi, K. Rustan M. Leino:
A Logic of Object-Oriented Programs. TAPSOFT 1997: 682-696 - [c53]Martín Abadi, Cédric Fournet, Georges Gonthier:
Secure Implementation of Channel Abstractions. HOOTS 1997: 202-203 - [e1]Martín Abadi, Takayasu Ito:
Theoretical Aspects of Computer Software, Third International Symposium, TACS '97, Sendai, Japan, September 23-26, 1997, Proceedings. Lecture Notes in Computer Science 1281, Springer 1997, ISBN 3-540-63388-X [contents] - 1996
- [b2]Martín Abadi, Luca Cardelli:
A Theory of Objects. Monographs in Computer Science, Springer 1996, ISBN 978-0-387-94775-4, pp. I-XIII, 1-396 - [j33]Martín Abadi, Luca Cardelli:
A Theory of Primitive Objects: Untyped and First-Order Systems. Inf. Comput. 125(2): 78-102 (1996) - [j32]Martín Abadi, Luca Cardelli:
On Subtyping and Matching. ACM Trans. Program. Lang. Syst. 18(4): 401-423 (1996) - [j31]Martín Abadi, Roger M. Needham:
Prudent Engineering Practice for Cryptographic Protocols. IEEE Trans. Software Eng. 22(1): 6-15 (1996) - [j30]Steven C. Glassman, Mark S. Manasse, Martín Abadi, Paul Gauthier, Patrick Sobalvarro:
The Millicent Protocol for Inexpensive Electronic Commerce. World Wide Web J. 1(1) (1996) - [c52]Martín Abadi, Butler W. Lampson, Jean-Jacques Lévy:
Analysis and Caching of Dependencies. ICFP 1996: 83-91 - [c51]Martín Abadi, Marcelo P. Fiore:
Syntactic Considerations on Recursive Types. LICS 1996: 242-252 - [c50]Martín Abadi, Stephan Merz:
On TLA as a logic. NATO ASI DPD 1996: 235-271 - [c49]Martín Abadi, Luca Cardelli, Ramesh Viswanathan:
An Interpretation of Objects and Object Types. POPL 1996: 396-409 - [c48]Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:
Secure Network Objects. S&P 1996: 211-221 - 1995
- [j29]Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Didier Rémy:
Dynamic Typing in Polymorphic Languages. J. Funct. Program. 5(1): 111-130 (1995) - [j28]Martín Abadi, Luca Cardelli:
A Theory of Primitive Objects: Second-Order Systems. Sci. Comput. Program. 25(2-3): 81-116 (1995) - [j27]John Lamping, Martín Abadi:
Methods as Assertions. Theory Pract. Object Syst. 1(1): 5-18 (1995) - [j26]Martín Abadi, Luca Cardelli:
An Imperative Object Calculus (Invited Paper). Theory Pract. Object Syst. 1(3): 151-166 (1995) - [j25]Martín Abadi, Leslie Lamport:
Conjoining Specifications. ACM Trans. Program. Lang. Syst. 17(3): 507-534 (1995) - [c47]Martín Abadi, Luca Cardelli:
On Subtyping and Matching. ECOOP 1995: 145-167 - [c46]Martín Abadi, Stephan Merz:
An Abstract Account of Composition. MFCS 1995: 499-508 - [c45]Martín Abadi, Luca Cardelli:
An Imperative Object Calculus. TAPSOFT 1995: 471-485 - [c44]Roberto Bellucci, Martín Abadi, Pierre-Louis Curien:
A Model for Formal Parametric Polymorphism: A PER Interpretation for System R. TLCA 1995: 32-46 - [c43]Steven C. Glassman, Mark S. Manasse, Martín Abadi, Paul Gauthier, Patrick Sobalvarro:
The Millicent Protocol for Inexpensive Electronic Commerce. WWW (Fall) 1995: 603-618 - 1994
- [j24]Martín Abadi:
A Semantics for Static Type Inference in a Nondeterministic Language. Inf. Comput. 109(1/2): 300-306 (1994) - [j23]Martín Abadi, Joseph Y. Halpern:
Decidability and Expressiveness for First-Order Logics of Probability. Inf. Comput. 112(1): 1-36 (1994) - [j22]Martín Abadi:
Baby Modula-3 and a Theory of Objects. J. Funct. Program. 4(2): 249-283 (1994) - [j21]Edward Wobber, Martín Abadi, Michael Burrows:
Authentication in the Taos Operating System. ACM Trans. Comput. Syst. 12(1): 3-32 (1994) - [j20]Martín Abadi, Leslie Lamport:
An Old-Fashined Recipe for Real-Time. ACM Trans. Program. Lang. Syst. 16(5): 1543-1571 (1994) - [c42]Martín Abadi, Leslie Lamport, Stephan Merz:
A TLA Solution to the RPC-Memory Specification Problem. Formal Systems Specification 1994: 21-66 - [c41]John Lamping, Martín Abadi:
Methods as Assertions. ECOOP 1994: 60-80 - [c40]Martín Abadi, Luca Cardelli:
A Theory of Primitive Objects - Scond-Order Systems. ESOP 1994: 1-25 - [c39]Gordon D. Plotkin, Martín Abadi, Luca Cardelli:
Subtyping and Parametricity. LICS 1994: 310-319 - [c38]Martín Abadi, Luca Cardelli:
A Semantics of Object Types. LICS 1994: 332-341 - [c37]Martín Abadi, Leslie Lamport:
Open Systems in TLA. PODC 1994: 81-90 - [c36]Martín Abadi, Leslie Lamport:
Decomposing Specifications of Concurrent Systems. PROCOMET 1994: 327-340 - [c35]Martín Abadi, Roger M. Needham:
Prudent engineering practice for cryptographic protocols. S&P 1994: 122-136 - [c34]Martín Abadi, Luca Cardelli:
A Theory of Primitive Objects - Untyped and First-Order Systems. TACS 1994: 296-320 - 1993
- [j19]Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson:
Authentification and Delegation with Smart-Cards. Sci. Comput. Program. 21(2): 93-113 (1993) - [j18]Martín Abadi, Gordon D. Plotkin:
A Logical View of Composition. Theor. Comput. Sci. 114(1): 3-30 (1993) - [j17]Martín Abadi, Luca Cardelli, Pierre-Louis Curien:
Formal Parametric Polymorphism. Theor. Comput. Sci. 121(1&2): 9-58 (1993) - [j16]Martín Abadi, Leslie Lamport:
Composing Specifications. ACM Trans. Program. Lang. Syst. 15(1): 73-132 (1993) - [j15]Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin:
A Calculus for Access Control in Distributed Systems. ACM Trans. Program. Lang. Syst. 15(4): 706-734 (1993) - [c33]Luca Cardelli, Florian Matthes, Martín Abadi:
Extensible Grammars for Language Specialization. DBPL 1993: 11-31 - [c32]Martín Abadi, Luca Cardelli, Pierre-Louis Curien:
Formal Parametric Polymorphism. POPL 1993: 157-170 - [c31]Edward Wobber, Martín Abadi, Michael Burrows, Butler W. Lampson:
Authentication in the Taos Operating System. SOSP 1993: 256-269 - [c30]Gordon D. Plotkin, Martín Abadi:
A Logic for Parametric Polymorphism. TLCA 1993: 361-375 - 1992
- [j14]Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber:
Authentication in Distributed Systems: Theory and Practice. ACM Trans. Comput. Syst. 10(4): 265-310 (1992) - [c29]Georges Gonthier, Martín Abadi, Jean-Jacques Lévy:
Linear Logic Without Boxes. LICS 1992: 223-234 - [c28]Georges Gonthier, Martín Abadi, Jean-Jacques Lévy:
The Geometry of Optimal Lambda Reduction. POPL 1992: 15-26 - 1991
- [j13]Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin:
Faithful Ideal Models for Recursive Polymorphic Types. Int. J. Found. Comput. Sci. 2(1): 1-21 (1991) - [j12]Martín Abadi, Bowen Alpern, Krzysztof R. Apt, Nissim Francez, Shmuel Katz, Leslie Lamport, Fred B. Schneider:
Preserving Liveness: Comments on "Safety and Liveness from a Methodological Point of View". Inf. Process. Lett. 40(3): 141-142 (1991) - [j11]Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy:
Explicit Substitutions. J. Funct. Program. 1(4): 375-416 (1991) - [j10]Martín Abadi, Leslie Lamport:
The Existence of Refinement Mappings. Theor. Comput. Sci. 82(2): 253-284 (1991) - [j9]Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin:
Dynamic Typing in a Statically Typed Language. ACM Trans. Program. Lang. Syst. 13(2): 237-268 (1991) - [c27]Martín Abadi, Michael Burrows, Butler W. Lampson, Gordon D. Plotkin:
A Calculus for Access Control in Distributed Systems. CRYPTO 1991: 1-23 - [c26]Martín Abadi, Mark R. Tuttle:
A Semantics for a Logic of Authentication (Extended Abstract). PODC 1991: 201-216 - [c25]Martín Abadi, Gordon D. Plotkin:
A Logical View of Composition and Refinement. POPL 1991: 323-332 - [c24]Martín Abadi, Leslie Lamport:
An Old-Fashioned Recipe for Real Time. REX Workshop 1991: 1-27 - [c23]Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber:
Authentication in Distributed Systems: Theory and Practice. SOSP 1991: 165-182 - [c22]Martín Abadi, Michael Burrows, C. Kaufman, Butler W. Lampson:
Authentication and Delegation with Smart-cards. TACS 1991: 326-345 - 1990
- [j8]Martín Abadi, Zohar Manna:
Nonclausal Deduction in First-Order Temporal Logic. J. ACM 37(2): 279-317 (1990) - [j7]Martín Abadi, Joan Feigenbaum:
Secure Circuit Evaluation. J. Cryptol. 2(1): 1-12 (1990) - [j6]Michael Burrows, Martín Abadi, Roger M. Needham:
Rejoinder to Nessett. ACM SIGOPS Oper. Syst. Rev. 24(2): 39-40 (1990) - [j5]Martín Abadi:
Corrigendum: The Power of Temporal Proofs. Theor. Comput. Sci. 70(2): 275 (1990) - [j4]Michael Burrows, Martín Abadi, Roger M. Needham:
A Logic of Authentication. ACM Trans. Comput. Syst. 8(1): 18-36 (1990) - [c21]Martín Abadi:
An Axiomatization of Lamport's Temporal Logic of Actions. CONCUR 1990: 57-69 - [c20]Martín Abadi, Gordon D. Plotkin:
A Per Model of Polymorphism and Recursive Types. LICS 1990: 355-365 - [c19]Martín Abadi, Luca Cardelli, Pierre-Louis Curien, Jean-Jacques Lévy:
Explicit Substitutions. POPL 1990: 31-46
1980 – 1989
- 1989
- [j3]Martín Abadi, Joan Feigenbaum, Joe Kilian:
On Hiding Information from an Oracle. J. Comput. Syst. Sci. 39(1): 21-50 (1989) - [j2]Martín Abadi, Zohar Manna:
Temporal Logic Programming. J. Symb. Comput. 8(3): 277-295 (1989) - [j1]Martín Abadi:
The Power of Temporal Proofs. Theor. Comput. Sci. 65(1): 35-83 (1989) - [c18]Michael Burrows, Martín Abadi, Roger M. Needham:
The Scope of a Logic of Authentication. Distributed Computing And Cryptography 1989: 119-126 - [c17]Martín Abadi, Joseph Y. Halpern:
Decidability and Expressiveness for First-Order Logics of Probability (Extended Abstract). FOCS 1989: 148-153 - [c16]Martín Abadi, Leslie Lamport, Pierre Wolper:
Realizable and Unrealizable Specifications of Reactive Systems. ICALP 1989: 1-17 - [c15]Martín Abadi, Benjamin C. Pierce, Gordon D. Plotkin:
Faithful Ideal Models for Recursive Polymorphic Types. LICS 1989: 216-225 - [c14]Martín Abadi, Luca Cardelli, Benjamin C. Pierce, Gordon D. Plotkin:
Dynamic Typing in a Statically-Typed Language. POPL 1989: 213-227 - [c13]Martín Abadi, Leslie Lamport:
Composing Specifications. REX Workshop 1989: 1-41 - [c12]Michael Burrows, Martín Abadi, Roger M. Needham:
A Logic of Authentication. SOSP 1989: 1-13 - 1988
- [c11]Martín Abadi, Eric Allender, Andrei Z. Broder, Joan Feigenbaum, Lane A. Hemachandra:
On Generating Solved Instances of Computational Problems. CRYPTO 1988: 297-310 - [c10]Martín Abadi, Leslie Lamport:
The Existence of Refinement Mappings. LICS 1988: 165-175 - [c9]Martín Abadi, Joan Feigenbaum:
A Simple Protocol for Secure Circuit Evaluation. STACS 1988: 264-272 - [c8]Michael Burrows, Martín Abadi, Roger M. Needham:
Authentication: A Practical Study in Belief and Action. TARK 1988: 325-342 - 1987
- [b1]Martín Abadi:
Temporal-logic theorem proving. Stanford University, USA, 1987 - [c7]Martín Abadi, Joan Feigenbaum, Joe Kilian:
On hiding information from an oracle. SCT 1987: 9 - [c6]Martín Abadi:
The Power of Temporal Proofs. LICS 1987: 123-130 - [c5]Martín Abadi, Zohar Manna:
Temporal Logic Programming. SLP 1987: 4-16 - [c4]Martín Abadi, Joan Feigenbaum, Joe Kilian:
On Hiding Information from an Oracle (Extended Abstract). STOC 1987: 195-203 - 1986
- [c3]Martín Abadi, Zohar Manna:
Modal Theorem Proving. CADE 1986: 172-189 - [c2]Martín Abadi, Zohar Manna:
A Timely Resolution. LICS 1986: 176-186 - 1985
- [c1]Martín Abadi, Zohar Manna:
Nonclausal Temporal Deduction. Logic of Programs 1985: 1-15
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint