-
3
-
-
33747376698
-
"Time, logic and computation,"
-
1-49, June 1988.
-
J. van Benthem, "Time, logic and computation," Linear Time, Branching Time ana Partial Order in Logics and Models for Concurrency. J.W. de Bakker, W.-P. de Roever, and G. Rozenberg, eds., Springer-Verlag, pp. 1-49, June 1988.
-
Linear Time, Branching Time Ana Partial order in Logics and Models for Concurrency. J.W. De Bakker, W.-P. De Roever, and G. Rozenberg, Eds., Springer-Verlag, Pp.
-
-
Van Benthem, J.1
-
4
-
-
0025641513
-
"A logic of communication in hostile environment,"
-
14-22, Los Alamitos, Calif., June 1990.
-
P. Bieber, "A logic of communication in hostile environment," Proc. IEEE Computer Security Foundations Workshop III, pp. 14-22, Los Alamitos, Calif., June 1990.
-
Proc. IEEE Computer Security Foundations Workshop III, Pp.
-
-
Bieber, P.1
-
5
-
-
0027617333
-
"Systematic design of a family of attack-resistant authentication protocols,"
-
vol. 11, no. 5, pp. 679-693, June 1993.
-
[51 R. Bird, I. Gobal, A. Herzberg, P.A. Janson, S. Kutten, R. Molva, and C.M. Yung, "Systematic design of a family of attack-resistant authentication protocols," J. Selected Areas in Comm., vol. 11, no. 5, pp. 679-693, June 1993.
-
J. Selected Areas in Comm.
-
-
Bird, R.1
Gobal, I.2
Herzberg, A.3
Janson, P.A.4
Kutten, S.5
Molva, R.6
Yung, C.M.7
-
6
-
-
0011248691
-
"An efficient probabilistic public-key encryption scheme which hides all partial information,"
-
84, Springer-Verlag LNCS no. 196, 1984.
-
M. Blum and S. Goldwasser, "An efficient probabilistic public-key encryption scheme which hides all partial information," Advances in Cryptology: Proc. o/CKYPTO'84, Springer-Verlag LNCS no. 196, 1984.
-
Advances in Cryptology: Proc. O/CKYPTO'
-
-
Blum, M.1
Goldwasser, S.2
-
7
-
-
35048900689
-
"Symbolic model checking: 10 states and beyond,"
-
vol. 98, no. 2, pp. 142-170, June 1992.
-
J.R. Burch, E.M. Clarke, K.L. McMillan, D.L. Dill, and L.J. Hwang. "Symbolic model checking: 10 states and beyond," Information and Computation, vol. 98, no. 2, pp. 142-170, June 1992.
-
Information and Computation
-
-
Burch, J.R.1
Clarke, E.M.2
McMillan, K.L.3
Dill, D.L.4
Hwang, L.J.5
-
8
-
-
0002367651
-
"Synthesis of synchronization skeletons for branching time temporal logic,"
-
vol. 131. Yorktown Heights, N. Y: Springer-Verlag, May 1981.
-
E.M. Clarke and E.A. Emerson "Synthesis of synchronization skeletons for branching time temporal logic," Logic of Programs: Workshop, Lecture notes in Computer Science, vol. 131. Yorktown Heights, N. Y: Springer-Verlag, May 1981.
-
Logic of Programs: Workshop, Lecture Notes in Computer Science
-
-
Clarke, E.M.1
Emerson, E.A.2
-
9
-
-
0022706656
-
"Automatic verification of finite-state concurrent systems using temporal logic specifications,"
-
vol. 8, no. 2, pp. 244-263,1986.
-
E.M. Clarke, E.A. Emerson, and A.P. Sistla, "Automatic verification of finite-state concurrent systems using temporal logic specifications," ACM Trans. Programming Languages and Systems, vol. 8, no. 2, pp. 244-263,1986.
-
ACM Trans. Programming Languages and Systems
-
-
Clarke, E.M.1
Emerson, E.A.2
Sistla, A.P.3
-
10
-
-
33747368314
-
"Basic tense logic,"
-
89-133. Kluwer Academic Publishers, 1986.
-
[10J J. Burgess, "Basic tense logic," Handbook of Philosophical Logic, Volume II: Extensions of Classical Logic, E. Gabbay and F. Guenthner, eds., pp. 89-133. Kluwer Academic Publishers, 1986.
-
Handbook of Philosophical Logic, Volume II: Extensions of Classical Logic, E. Gabbay and F. Guenthner, Eds., Pp.
-
-
Burgess, J.J.1
-
11
-
-
0025386404
-
"A logic of authentication,"
-
vol. 8, no. 1, pp. 18-36, Feb. 1990. Also see Research Report no. 39, DEC SRC, 48 pp., 1989.
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Computer Systems, vol. 8, no. 1, pp. 18-36, Feb. 1990. Also see Research Report no. 39, DEC SRC, 48 pp., 1989.
-
ACM Trans. Computer Systems
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
12
-
-
0020720357
-
"On the security of public key protocols,"
-
vol. 29, no. 2, Mar. 1983. Also appears in the 22nd FOCS, 1981.
-
D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Trans. Information Theory, vol. 29, no. 2, Mar. 1983. Also appears in the 22nd FOCS, 1981.
-
IEEE Trans. Information Theory
-
-
Dolev, D.1
Yao, A.C.2
-
13
-
-
0020889144
-
"On the security of multi-party pingpong protocols,"
-
24th IEEE Symp. Foundation of Computer Science, pp. 34-39, Oct. 1983.
-
S. Even and O. Goldreich, "On the security of multi-party pingpong protocols," Proc. 24th IEEE Symp. Foundation of Computer Science, pp. 34-39, Oct. 1983.
-
Proc.
-
-
Even, S.1
Goldreich, O.2
-
14
-
-
85050160774
-
"Probabilistic encryption and how to play mental poker keeping secret all private information,"
-
14th ACM Symp. Theory of Computing, 1982.
-
S. Goldwasser and S. Micali, "Probabilistic encryption and how to play mental poker keeping secret all private information," Proc. 14th ACM Symp. Theory of Computing, 1982.
-
Proc.
-
-
Goldwasser, S.1
Micali, S.2
-
16
-
-
0020127727
-
"A key management scheme for end-to-end encryption and a formal verification of its security,"
-
vol. 13, pp. 59-69,1982.
-
T. Kasami, S. Yamamura, and K. Mori, "A key management scheme for end-to-end encryption and a formal verification of its security," Systems, Computers, Control, vol. 13, pp. 59-69,1982.
-
Systems, Computers, Control
-
-
Kasami, T.1
Yamamura, S.2
Mori, K.3
-
17
-
-
0017996760
-
"Time, clocks and the ordering of events in a distributed system,"
-
vol. 21, no. 7, pp. 558-565, July 1978.
-
L. Lamport, "Time, clocks and the ordering of events in a distributed system," Comm. ACM, vol. 21, no. 7, pp. 558-565, July 1978.
-
Comm. ACM
-
-
Lamport, L.1
-
19
-
-
0342880800
-
"Applying formal methods to the analysis of key management protocol,"
-
vol. 1, pp. 5-53,1992.
-
C.A. Meadows, "Applying formal methods to the analysis of key management protocol," J. Computer Security, vol. 1, pp. 5-53,1992.
-
J. Computer Security
-
-
Meadows, C.A.1
-
20
-
-
33747370477
-
-
M.J. Merritt, "Cryptographic protocols," PhD thesis, Georgia Instil, of Technology, Feb. 1983.
-
"Cryptographic protocols," PhD thesis, Georgia Instil, of Technology, Feb. 1983
-
-
Merritt, M.J.1
-
21
-
-
0023247970
-
"Efficient and timely mutual authentication,"
-
vol. 21, no. 1, pp. 8-10, Jan. 1987.
-
D. Otway and O. Rees, "Efficient and timely mutual authentication," Operating Systems Review, vol. 21, no. 1, pp. 8-10, Jan. 1987.
-
Operating Systems Review
-
-
Otway, D.1
Rees, O.2
-
22
-
-
0027227136
-
"A logical language for specifying cryptographic protocol requirements,"
-
1993 IEEE Symp. Research in Security and Privacy, May 1993.
-
P. Syverson and C. Meadows, "A logical language for specifying cryptographic protocol requirements," Proc. 1993 IEEE Symp. Research in Security and Privacy, May 1993.
-
Proc.
-
-
Syverson, P.1
Meadows, C.2
-
23
-
-
0012009804
-
"The use of logic in the analysis of cryptographic protocols,"
-
1991 IEEE Symp. Research in Security and Privacy, May 1991.
-
P. Syverson, "The use of logic in the analysis of cryptographic protocols," Proc. 1991 IEEE Symp. Research in Security and Privacy, May 1991.
-
Proc.
-
-
Syverson, P.1
|