Publisher
Springer Berlin Heidelberg
Reference135 articles.
1. M. Abadi, B. Blanchet, C. Fournet, Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3), 9 (2007)
2. M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’01), ed. by C. Hankin, D. Schmidt, London, UK (ACM, New York, 2001), pp. 104–115
3. M. Abadi, A.D. Gordon, A calculus for cryptographic protocols: the Spi calculus. Inf. Comput. 148, 1–70 (1999)
4. M. Abadi, P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption), in IFIP International Conference on Theoretical Computer Science (IFIP TCS’00), ed. by J. van Leeuwen, O. Watanabe, M. Hagiya, P.D. Mosses, T. Ito, Sendai, Japan (2000), pp. 3–22
5. M. Abadi, M. Tuttle, A semantics for a logic of authentication, in 10th ACM Symposium on Principles of Distributed Computing (PODC’91), Montreal, Canada (ACM, New York, 1991), pp. 201–216