-
1
-
-
0034632154
-
Tsay algorithmic analysis of programs with well quasi-ordered domains
-
P. A. Abdulla, K. Cerans, B. Jonsson, Y.-K. Tsay Algorithmic Analysis of Programs with Well Quasi-ordered Domains. Information and Computation 160(1-2): 109-127, 2000.
-
(2000)
Information and Computation
, vol.160
, Issue.1-2
, pp. 109-127
-
-
Abdulla, P.A.1
Cerans, K.2
Jonsson, B.3
Tsay, Y.-K.4
-
2
-
-
0000421604
-
Logic programming with focusing proofs in linear logic
-
J.-M. Andreoli. Logic Programming with Focusing Proofs in Linear Logic. Journal of Logic and Computation, 2(3):297-347, 1992.
-
(1992)
Journal of Logic and Computation
, vol.2
, Issue.3
, pp. 297-347
-
-
Andreoli, J.-M.1
-
3
-
-
0000077769
-
Linear objects: Logical processes with built-in inheritance
-
J.-M. Andreoli and R. Pareschi. Linear Objects: Logical Processes with Built-In Inheritance. New Generation Computing, 9(3-4):445-473, 1991.
-
(1991)
New Generation Computing
, vol.9
, Issue.3-4
, pp. 445-473
-
-
Andreoli, J.-M.1
Pareschi, R.2
-
6
-
-
0013283639
-
An effective fixpoint semantics for linear logic programs
-
M. Bozzano, G. Delzanno, and M. Martelli. An Effective Fixpoint Semantics for Linear Logic Programs. Theory and Practice of Logic Programming, 2(1):85-122, 2002.
-
(2002)
Theory and Practice of Logic Programming
, vol.2
, Issue.1
, pp. 85-122
-
-
Bozzano, M.1
Delzanno, G.2
Martelli, M.3
-
8
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In Proc. of CSFW'01, pages 82-96, 2001.
-
(2001)
Proc. of CSFW'01
, pp. 82-96
-
-
Blanchet, B.1
-
9
-
-
0013177958
-
Ensuring security through model checking in a logical environment (preliminary results)
-
December
-
M. Bozzano. Ensuring Security through Model Checking in a Logical Environment (Preliminary Results). In Proc. of the ICLP/CP 01 workshop SAVE'01, December 2001.
-
(2001)
Proc. of the ICLP/CP 01 Workshop SAVE'01
-
-
Bozzano, M.1
-
11
-
-
0032671775
-
A meta-notation for protocol analysis
-
I. Cervesato, N.A. Durgin, P.D. Lincoln, J.C. Mitchell, and A. Scedrov. A Meta-notation for Protocol Analysis. In Proc. of CSFW'99, pages 55-69, 1999.
-
(1999)
Proc. of CSFW'99
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
12
-
-
0000998131
-
Petri nets and linear logic: A case study for logic programming
-
I. Cervesato. Petri Nets and Linear Logic: a Case Study for Logic Programming. In Proc. of GULP-PRODE'95, pages 313-318, 1995.
-
(1995)
Proc. of GULP-PRODE'95
, pp. 313-318
-
-
Cervesato, I.1
-
13
-
-
0013179374
-
Typed multiset rewriting specifications of security protocols
-
Cork, Ireland
-
I. Cervesato. Typed Multiset Rewriting Specifications of Security Protocols. In Proc. of MFCSIT'00, Cork, Ireland, 2001.
-
(2001)
Proc. of MFCSIT'00
-
-
Cervesato, I.1
-
14
-
-
84949232265
-
Specifying authentication protocols using rewriting and strategies
-
Proc. of PADL'01
-
H. Cirstea. Specifying Authentication Protocols Using Rewriting and Strategies. In Proc. of PADL'01, LNCS 1990, pages 138-152, 2001.
-
(2001)
LNCS
, vol.1990
, pp. 138-152
-
-
Cirstea, H.1
-
16
-
-
23044522745
-
Specifying and debugging security protocols via hereditary harrop formulas and λProlog - A case-study
-
Proc. of FLOPS'01
-
G. Delzanno. Specifying and Debugging Security Protocols via Hereditary Harrop Formulas and λProlog - A Case-study -. In Proc. of FLOPS'01, LNCS 2024, pages 123-137, 2001.
-
(2001)
LNCS
, vol.2024
, pp. 123-137
-
-
Delzanno, G.1
-
18
-
-
84902500281
-
Phase semantics and verification of concurrent constraint programs
-
F. Fages, P. Ruet, and S. Soliman. Phase Semantics and Verification of Concurrent Constraint Programs. In Proc. of LICS'98, 1998.
-
(1998)
Proc. of LICS'98
-
-
Fages, F.1
Ruet, P.2
Soliman, S.3
-
19
-
-
0002338883
-
A model-theoretic reconstruction of the operational semantics of logic programs
-
M. Falaschi, G. Levi, M. Martelli, and C. Palamidessi. A Model-Theoretic Reconstruction of the Operational Semantics of Logic Programs. Information and Computation, 103(1):86-113, 1993.
-
(1993)
Information and Computation
, vol.103
, Issue.1
, pp. 86-113
-
-
Falaschi, M.1
Levi, G.2
Martelli, M.3
Palamidessi, C.4
-
21
-
-
84956860311
-
Compiling and verifying security protocols
-
Proc. of LPAR'00
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and Verifying Security Protocols. In Proc. of LPAR'00, LNCS 1955, pages 131-160, 2000.
-
(2000)
LNCS
, vol.1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
22
-
-
0000508353
-
Asynchronous communication model based on linear logic
-
N. Kobayashi and A. Yonezawa. Asynchronous Communication Model based on Linear Logic. Formal Aspects of Computing, 7(2):113-149, 1995.
-
(1995)
Formal Aspects of Computing
, vol.7
, Issue.2
, pp. 113-149
-
-
Kobayashi, N.1
Yonezawa, A.2
-
23
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using FDR
-
Proc. of TACAS'96
-
G. Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR. In Proc. of TACAS'96, LNCS 1055, pages 147-166, 1996.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
24
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: A Compiler for the Analysis of Security Protocols. Journal of Computer Security, 6(1):53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 53-84
-
-
Lowe, G.1
-
25
-
-
0003735470
-
-
T.R. CMU-CS-97-139, School of Computer Science, Carnegie Mellon University
-
W. Marrero, E. Clarke, and S. Jha. Model Checking for Security Protocols. T.R. CMU-CS-97-139, School of Computer Science, Carnegie Mellon University, 1997.
-
(1997)
Model Checking for Security Protocols
-
-
Marrero, W.1
Clarke, E.2
Jha, S.3
-
26
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
27
-
-
84913004277
-
The π-calculus as a theory in linear logic: Preliminary results
-
Proc. of the Workshop on Extensions of Logic Programming
-
D. Miller. The π-Calculus as a Theory in Linear Logic: Preliminary Results. In Proc. of the Workshop on Extensions of Logic Programming, LNCS 660, pages 242-265, 1992.
-
(1992)
LNCS
, vol.660
, pp. 242-265
-
-
Miller, D.1
-
28
-
-
0030247475
-
Forum: A multiple-conclusion specification logic
-
D. Miller. Forum: A Multiple-Conclusion Specification Logic. Theoretical Computer Science, 165(1):201-232, 1996.
-
(1996)
Theoretical Computer Science
, vol.165
, Issue.1
, pp. 201-232
-
-
Miller, D.1
-
32
-
-
0000829789
-
Uniform proofs as a foundation for logic programming
-
D. Miller, G. Nadathur, F. Pfenning, and A. Scedrov. Uniform Proofs as a Foundation for Logic Programming. Annals of Pure and Applied Logic, 51:125-157, 1991.
-
(1991)
Annals of Pure and Applied Logic
, vol.51
, pp. 125-157
-
-
Miller, D.1
Nadathur, G.2
Pfenning, F.3
Scedrov, A.4
-
33
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
34
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
A. W. Roscoe and P. J. Broadfoot. Proving Security Protocols with Model Checkers by Data Independence Techniques. Journal of Computer Security, 7(2-3):147-190, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 147-190
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
|