Podelski, A. and A. Rybalchenko: Transition predicate abstraction and fair termination. In: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005 ACM, New York, USA (2005) 124-139.
localid: C1256104005ECAFC-57767FAFB6FB6779C1256FC00041E44D-PodelskiRybalchenkoPOPL2005
Abadi, M. and B. Blanchet: Analyzing Security Protocols with Secrecy Types and Logic Programs. In: Journal of the ACM 52, 1, 102-146 (2005).
url: http://doi.acm.org/10.1145/1044731.1044735
localid: C1256BDD001D715B-5F9A04A5291DE21DC1256FB0005164C4-AbadiBlanchet2005
Blanchet, B., M. Abadi and C. Fournet: Automated Verification of Selected Equivalences for Security Protocols. In: 20th IEEE Symposium on Logic in Computer Science (LICS 2005) IEEE, Los Alamitos, USA (2005) 331-340.
localid: C1256BDD001D715B-4ED43191DFA60AA9C1256FCB0047F288-BlanchetAbadiFournet2005
Abadi, M. and B. Blanchet: Computer-Assisted Verification of a Protocol for Certified Email. In: Science of Computer Programming 58, 1-2, 3-27 (2005).
localid: C1256BDD001D715B-205C31DE36FEC244C1256FB00052677D-AbadiBlanchet2005b
Abadi, M., B. Blanchet and C. Fournet: Just Fast {Keying} in the {Pi} Calculus. In: Programming Languages and Systems : 13th European Symposium on Programming (ESOP 2004), (Eds.) Schmidt, David. Lecture Notes in Computer Science. Springer, Berlin, Germany (2004) 340-354.
localid: C1256BDD001D715B-284E4CE5C9F5B245C1256E56005CE7AD-AbadiBlanchetFournet2004
Abadi, M. and B. Blanchet: Computer-Assisted Verification of a Protocol for Certified Email. In: Static Analysis, 10th International Symposium, SAS'03, (Eds.) Cousot, Radhia. Lecture Notes in Computer Science. Springer, Berlin, Germany (2003) 316-335.
localid: C1256BDD001D715B-A919D91894DD179DC1256D0500580E73-AbadiBlanchet2003b
Abadi, M. and B. Blanchet: Secrecy Types for Asymmetric Communication. In: Theoretical Computer Science 298, 3, 387-415 (2003).
localid: C1256BDD001D715B-6DBC4AFA32CCCFAEC1256D0500571380-AbadiBlanchet2003
Abadi, M. and B. Blanchet: Analyzing Security Protocols with Secrecy Types and Logic Programs. In: Conference Record of POPL 2002: The 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages ACM, New York, USA (2002) 33-44.
localid: C1256BDD001D715B-5D5ADB05B0A19B3AC1256C79003CD989-AbadiBlanchet2002a
http://edoc.mpg.de
The Max Planck Society does not take any responsibility for the content of this export.