Martín Abadi
#18,393
Most Influential Person Now
Argentinian computer scientist
Martín Abadi's AcademicInfluence.com Rankings
Martín Abadicomputer-science Degrees
Computer Science
#983
World Rank
#1019
Historical Rank
#533
USA Rank
Operating Systems
#3
World Rank
#3
Historical Rank
#3
USA Rank
Algorithms
#91
World Rank
#91
Historical Rank
#24
USA Rank
Database
#842
World Rank
#883
Historical Rank
#261
USA Rank
Download Badge
Computer Science
Martín Abadi's Degrees
- PhD Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Martín Abadi Influential?
(Suggest an Edit or Addition)According to Wikipedia, Martín Abadi is an Argentine computer scientist, working at Google . He earned his Doctor of Philosophy in computer science from Stanford University in 1987 as a student of Zohar Manna. He is well known for his work on computer security and on programming languages, including his paper on the Burrows–Abadi–Needham logic for analyzing authentication protocols, and his book A Theory of Objects, laying out formal calculi for the semantics of object-oriented programming languages.
Martín Abadi's Published Works
Published Works
- TensorFlow: A system for large-scale machine learning (2016) (14989)
- TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems (2016) (9876)
- Deep Learning with Differential Privacy (2016) (3519)
- A logic of authentication (1989) (2398)
- A logic of authentication (1990) (1672)
- A calculus for cryptographic protocols: the spi calculus (1997) (1519)
- A Theory of Objects (1996) (1396)
- The existence of refinement mappings (1988) (1014)
- Mobile values, new names, and secure communication (2001) (978)
- Naiad: a timely dataflow system (2013) (821)
- Explicit substitutions (1989) (810)
- Control-flow integrity principles, implementations, and applications (2009) (780)
- Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data (2016) (746)
- Authentication in distributed systems: theory and practice (1991) (741)
- A calculus for access control in distributed systems (1991) (729)
- Prudent engineering practice for cryptographic protocols (1994) (717)
- Control-flow integrity (2005) (663)
- Composing specifications (1989) (602)
- Conjoining specifications (1995) (529)
- Adversarial Patch (2017) (516)
- An old-fashioned recipe for real time (1991) (506)
- Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) (2000) (457)
- XFI: software guards for system address spaces (2006) (436)
- A core calculus of dependency (1999) (424)
- Secrecy by typing in security protocols (1999) (398)
- Automated verification of selected equivalences for security protocols (2005) (387)
- Dynamic typing in a statically-typed language (1989) (343)
- On hiding information from an oracle (1987) (313)
- Moderately hard, memory-bound functions (2005) (289)
- Realizable and Unrealizable Specifications of Reactive Systems (1989) (282)
- Temporal Logic Programming (1989) (266)
- The geometry of optimal lambda reduction (1992) (256)
- Access Control Based on Execution History (2003) (239)
- Types for safe locking: Static race detection for Java (2006) (234)
- A Logic for Parametric Polymorphism (1993) (233)
- A type system for Java bytecode subroutines (1999) (232)
- TensorFlow: learning functions at scale (2016) (231)
- Deciding knowledge in security protocols under equational theories (2004) (221)
- Authentication in distributed systems: theory and practice (1991) (221)
- Authentication in the Taos operating system (1994) (219)
- A semantics for a logic of authentication (extended abstract) (1991) (216)
- Protection in Programming-Language Translations (1998) (199)
- Host Fingerprinting and Tracking on the Web: Privacy and Security Implications (2012) (188)
- Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* (2001) (188)
- A Logic of Object-Oriented Programs (1997) (184)
- Logic in access control (2003) (178)
- Understanding TypeScript (2014) (172)
- Learning to Protect Communications with Adversarial Neural Cryptography (2016) (172)
- An Overview of the Singularity Project (2005) (170)
- Types for Safe Locking (1999) (170)
- Private authentication (2002) (167)
- Just fast keying in the pi calculus (2004) (161)
- Analyzing security protocols with secrecy types and logic programs (2002) (160)
- Formal Eavesdropping and Its Computational Interpretation (2001) (154)
- Dynamic typing in polymorphic languages (1995) (150)
- A Bisimulation Method for Cryptographic Protocols (1998) (150)
- Message-Locked Encryption for Lock-Dependent Messages (2013) (145)
- Code-Carrying Authorization (2008) (143)
- On SDSI's linked local name spaces (1997) (139)
- Secure implementation of channel abstractions (1998) (137)
- Security analysis of cryptographically controlled access to XML documents (2005) (133)
- Semantics of transactional memory and automatic mutual exclusion (2011) (131)
- The Power of Temporal Proofs (1989) (131)
- Access control in a core calculus of dependency (2006) (131)
- Learning a Natural Language Interface with Neural Programmer (2016) (129)
- Formal parametric polymorphism (1993) (122)
- A Theory of Primitive Objects - Untyped and First-Order Systems (1994) (120)
- Authentication in the Taos operating system (1993) (119)
- Authentication and Delegation with Smart-cards (1991) (115)
- Secure circuit evaluation (1990) (112)
- Certified email with a light on-line trusted third party: design and implementation (2002) (109)
- Transactional memory with strong atomicity using off-the-shelf memory protection hardware (2009) (109)
- Secrecy types for asymmetric communication (2001) (105)
- Dynamic typing in a statically typed language (1991) (104)
- Computer-assisted verification of a protocol for certified email (2003) (104)
- Analysis and caching of dependencies (1996) (103)
- Reasoning about Cryptographic Protocols in the Spi Calculus (1997) (102)
- Models and Proofs of Protocol Security: A Progress Report (2009) (102)
- Decidability and expressiveness for first-order logics of probability (1989) (102)
- Linear logic without boxes (1992) (99)
- Analyzing security protocols with secrecy types and logic programs (2005) (99)
- Computing symbolic models for verifying cryptographic protocols (2001) (98)
- Dynamic control flow in large-scale machine learning (2018) (94)
- A Logical View of Composition (1993) (93)
- On subtyping and matching (1995) (93)
- A PER model of polymorphism and recursive types (1990) (92)
- An Imperative Object Calculus (1995) (89)
- Secrecy by Typing inSecurity Protocols (1997) (87)
- A Theory of Primitive Objects: Second-Order Systems (1994) (87)
- On Protection by Layout Randomization (2010) (86)
- deSEO: Combating Search-Result Poisoning (2011) (85)
- Bankable Postage for Network Services (2003) (82)
- Object Types against Races (1999) (82)
- The Applied Pi Calculus (2016) (78)
- A computational model for TensorFlow: an introduction (2017) (76)
- A Theory of Secure Control Flow (2005) (75)
- A type system for Java bytecode subroutines (1998) (75)
- Nonclausal deduction in first-order temporal logic (1990) (74)
- An interpretation of objects and object types (1996) (74)
- Extensible Syntax with Lexical Scoping (1994) (71)
- Authentication primitives and their compilation (2000) (71)
- A Modal Deconstruction of Access Control Logics (2008) (70)
- Variations in Access Control Logic (2008) (70)
- Authentication: A Practical Study in Belief and Action (1988) (68)
- The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication (2016) (61)
- Architectural support for software-based protection (2006) (59)
- Hiding Names: Private Authentication in the Applied Pi Calculus (2002) (59)
- Guessing attacks and the computational soundness of static equivalence (2006) (59)
- Modal Theorem Proving (1986) (59)
- Rejoinder to Nessett (1990) (59)
- A semantics of object types (1994) (58)
- Syntactic considerations on recursive types (1996) (58)
- Baby Modula-3 and a theory of objects (1994) (56)
- Secure network objects (1996) (56)
- Temporal-logic theorem proving (1987) (52)
- Unified Declarative Platform for Secure Netwoked Information Systems (2009) (51)
- Security Protocols and Specifications (1999) (50)
- A simple differentiable programming language (2019) (50)
- Nonclausal Temporal Deduction (1985) (48)
- A Theory of Primitive Objects (1996) (47)
- On the Protection of Private Information in Machine Learning Systems: Two Recent Approches (2017) (46)
- Deciding knowledge in security protocols under (many more) equational theories (2005) (45)
- Towards a Declarative Language and System for Secure Networking (2007) (44)
- Innocent by association: early recognition of legitimate users (2012) (44)
- Semantics of transactional memory and automatic mutual exclusion (2008) (43)
- Heat-seeking honeypots: design and experience (2011) (43)
- Explicit Communication Revisited: Two New Attacks on Authentication Protocols (1997) (40)
- A model of cooperative threads (2009) (40)
- A Logical Account of NGSCB (2004) (39)
- De-anonymizing the internet using unreliable IDs (2009) (39)
- Web PKI: Closing the Gap between Guidelines and Practices (2014) (38)
- A Timely Resolution (1986) (37)
- Incremental, iterative data processing with timely dataflow (2016) (37)
- Extensible Grammars for Language Specialization (1993) (34)
- An Axiomatization of Lamport's Temporal Logic of Actions (1990) (34)
- Language-Based Enforcement of Privacy Policies (2004) (33)
- Secure communications processing for distributed languages (1999) (33)
- A logical view of composition and refinement (1991) (33)
- Authentification and Delegation with Smart-Cards (1993) (32)
- Password-Based Encryption Analyzed (2005) (32)
- Two facets of authentication (1998) (29)
- AC: composable asynchronous IO for native languages (2011) (28)
- An Abstract Account of Composition (1995) (27)
- Global Authentication in an Untrustworthy World (2013) (27)
- On Generating Solved Instances of Computational Problems (1988) (27)
- Searching the Searchers with SearchAudit (2010) (26)
- Strengthening Passwords (1997) (26)
- The World Wide Web Conference (2019) (24)
- On TLA as a logic (1996) (24)
- Faithful ideal models for recursive polymorphic types (1989) (24)
- Open systems in TLA (1994) (23)
- SocialWatch: detection of online service abuse via large-scale social graphs (2013) (23)
- Authorizing applications in singularity (2007) (23)
- A model of dynamic separation for transactional memory (2008) (22)
- Trusted Computing, Trusted Third Parties, and Verified Communications (2004) (22)
- The Scope of a Logic of Authentication (1989) (21)
- Access Control in a World of Software Diversity (2005) (20)
- Logic in Access Control (Tutorial Notes) (2009) (20)
- Secrecy by typing and file-access control (2006) (20)
- By reason and authority: a system for authorization of proof-carrying code (2004) (20)
- Choice in Dynamic Linking (2004) (19)
- Types for the Scott Numerals (1993) (19)
- Implementation and Use of Transactional Memory with Dynamic Separation (2009) (19)
- Secure Web Tunneling (1998) (19)
- A Theory of Primitive Objects - Scond-Order Systems (1994) (19)
- [top ][top ]-closed relations and admissibility (2000) (18)
- Early security classification of skype users via machine learning (2013) (18)
- Methods as Assertions (1994) (18)
- A TLA Solution to the RPC-Memory Specification Problem (2016) (17)
- Computational Secrecy by Typing for the Pi Calculus (2006) (17)
- Subtyping and parametricity (1994) (16)
- Security Protocols: Principles and Calculi (2007) (15)
- Dynamic Separation for Transactional Memory (2008) (15)
- On Layout Randomization for Arrays and Functions (2013) (15)
- Operating system protection against side-channel attacks that exploit memory latency (2007) (14)
- On Access Control, Data Integration, and Their Languages (2004) (13)
- Preserving Liveness: Comments on "Safety and Liveness from a Methodological Point of View" (1991) (13)
- Reasoning about secrecy for active networks (2000) (12)
- Formal security analysis of basic network-attached storage (2005) (12)
- Layout Randomization and Nondeterminism (2013) (12)
- Theoretical Aspects of Computer Software (1991) (11)
- An imperative object calculus: Basic typing and soundness (1995) (11)
- Formal Analysis of a Distributed Algorithm for Tracking Progress (2013) (11)
- An imperative object calculus: Basic typing and soundness (1995) (11)
- A Semantics for Static Type Inference in a Nondeterministic Language (1994) (11)
- Perspectives on Transactional Memory (2009) (10)
- Decomposing Specifications of Concurrent Systems (1994) (10)
- A Top-Down Look at a Secure Message (1999) (10)
- Protection in Programming-Language Translations: Mobile Object Systems (Abstract) (1998) (10)
- A Simple Protocol for Secure Circuit Evaluation (1988) (10)
- Foundations of Differential Dataflow (2015) (9)
- How to tell an airport from a home: techniques and applications (2010) (9)
- The Differentiable Curry (2019) (8)
- On Hiding Information from an Oracle (Extended Abstract) (1987) (8)
- A Model for Formal Parametric Polymorphism: A PER Interpretation for System R (1995) (8)
- Formal Analysis of Dynamic, Distributed File-System Access Controls (2006) (8)
- Secrecy in Programming-Language Semantics (1999) (7)
- A Functional View of Imperative Information Flow (2012) (7)
- Timely Dataflow: A Model (2015) (7)
- Timely Rollback: Specification and Verification (2015) (7)
- Automatic Mutual Exclusion and Atomicity Checks (2008) (7)
- The power of temporal proofs (corrigendum) (1990) (6)
- Distributed Authorization with Distributed Grammars (2015) (5)
- Corrigendum: The Power of Temporal Proofs (1990) (5)
- A ug 2 01 7 On the Protection of Private Information in Machine Learning Systems : Two Recent Approaches ( Invited Paper ) (2018) (4)
- BCiC: A System for Code Authentication and Verification (2005) (4)
- "Language-Based Security" (2005) (4)
- The Prophecy of Undo (2015) (4)
- Prudent Engineering Practice for Cryptographic Protocols-Software Engineering, IEEE Transactions on (2004) (3)
- Differential privacy with information flow control (2011) (3)
- Number 20 (1998) (3)
- Falkirk Wheel: Rollback Recovery for Dataflow Systems (2015) (3)
- Software Security: A Formal Perspective - (Notes for a Talk) (2012) (2)
- Built-in Object Security (2003) (2)
- On the Flow of Data, Information, and Time (2015) (2)
- An Imperative Object Calculus (Invited Paper) (1995) (2)
- Panel Introduction: Varieties of Authentication (1998) (2)
- Policies and Proofs for Code Auditing (2007) (2)
- Smart Choices and the Selection Monad (2020) (2)
- Security protocols: principles and calculi tutorial notes (2007) (2)
- Proceedings of the Third International Symposium on Theoretical Aspects of Computer Software (1997) (1)
- Object-Based Languages (1996) (1)
- CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings (2005) (1)
- Taming the Adversary (2000) (1)
- Leslie Lamport's properties and actions (2001) (1)
- Type Dynamic (2010) (1)
- Decomposing Speciications of Concurrent Systems (1)
- A Functional View of Imperative Information Flow Extended Version (2012) (1)
- A Language with Matching (1996) (0)
- Self-stabilization by Tree Correction (info) Self-stabilization by Tree Correction (info) Self-stabilization by Tree Correction (1995) (0)
- Class-Based Languages (1996) (0)
- Foundations of Software Science and Computational Structures - FOSSACS 2006 (2006) (0)
- Primitive Covariant Self Types (1996) (0)
- An Overview of the Singularity Project 1 (2005) (0)
- Advanced Class-Based Features (1996) (0)
- The good, the bad, and the provable (2008) (0)
- Weakly Growing Context-sensitive Grammars Chicago Journal of Theoretical Computer Science (1996) (0)
- A First-Order Language (1996) (0)
- used access control sub-system and method for a distributed computing system, the locally stored authentication data (1993) (0)
- A Second-Order Language (1996) (0)
- A Higher-Order Calculus (1996) (0)
- The Fine Print of Security (2010) (0)
- Modeling Object-Oriented Languages (1996) (0)
- Explorer Foundations of Differential Dataflow (2014) (0)
- Pspace-hard Functions Checkable Debate Systems and Approximation Algorithms for Pspace (2007) (0)
- Tutorial on Static Inference of Numeric (2017) (0)
- The Prophecy of Timely Rollback (Invited Talk) (2015) (0)
- Edinburgh Research Explorer Layout Randomization and Nondeterminism (2016) (0)
- Packet receiver in a computer network and computer network with modified crypto keys between the computer and respective pairs process (1993) (0)
- First-Order Imperative Calculi (1996) (0)
- Proceedings Combined 20th International Workshop on Expressiveness in Concurrency and 10th Workshop on Structural Operational Semantics: A Timely Dataflow Model and the Naiad System (2013) (0)
- Second-Order Calculi (1996) (0)
- Horizons of the Mind. A Tribute to Prakash Panangaden (2014) (0)
- Security Protocols : Principles and Calculi Tutorial (2007) (0)
- 1 Realizable and Unrealizable Specifications of Reactive Systems (2000) (0)
- Imperative Calculi with Self Types (1996) (0)
- Unified Platform for Secure Networked Information Systems (2008) (0)
- Principles of Security and Trust (2014) (0)
- TensorFlow Distributions Joshua (2017) (0)
- Interpretations of Object Calculi (1996) (0)
- First-Order Calculi (1996) (0)
- Untyped Imperative Calculi (1996) (0)
- Neural Guidance for SAT Solving (2018) (0)
- Theoretical aspects of computer software : Third International Symposium, TACS '97, Sendai, Japan, September 23-26, 1997 ; proceedings (1997) (0)
- On implementation of global concurrent systems with local asynchronous controllers (2005) (0)
- On SDSI ’ s Linked Local Name Spaces Martı́n (1997) (0)
- Explorer On Protection by Layout Randomization (2011) (0)
- Definable Covariant Self Types (1996) (0)
This paper list is powered by the following services:
Other Resources About Martín Abadi
What Schools Are Affiliated With Martín Abadi?
Martín Abadi is affiliated with the following schools: