-
1
-
-
0034593095
-
A Bottom-up semantics for Linear Logic Programs
-
M. Bozzano, G. Delzanno, and M. Martelli. A Bottom-up semantics for Linear Logic Programs. In Proc. PPDP’00, page 92-102, 2000.
-
(2000)
Proc. PPDP’00
, pp. 92-102
-
-
Bozzano, M.1
Delzanno, G.2
Martelli, M.3
-
2
-
-
84959024706
-
An Effective Bottom-up Semantics for First-Order Linear Logic Programs
-
March
-
M. Bozzano, G. Delzanno, and M. Martelli.: An Effective Bottom-up Semantics for First-Order Linear Logic Programs. To appear in Proc. FLOPS 2001, March 2001.
-
(2001)
Proc. FLOPS 2001
-
-
Bozzano, M.1
Delzanno, G.2
Martelli, M.3
-
3
-
-
0025386404
-
A Logic of Authentication
-
M. Burrows, M. Abadi, R. M. Needham. A Logic of Authentication. TOCS 8(1): 18-36, 1990.
-
(1990)
TOCS
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
4
-
-
84944138379
-
A Meta- Notation for Protocol Analysis
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. A Meta- Notation for Protocol Analysis. In Proc. Computer Security Foundations Workshop CSFW’99, pages 28-30, 1999.
-
(1999)
Proc. Computer Security Foundations Workshop CSFW’99
, pp. 28-30
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
6
-
-
0033698744
-
Relating Strands and Multiset Rewriting for Security Protocol Analysis
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Relating Strands and Multiset Rewriting for Security Protocol Analysis. In Proc. of Computer Security Foundations Workshop CSFW’00, pages 35-51, 2000.
-
(2000)
Proc. Of Computer Security Foundations Workshop CSFW’00
, pp. 35-51
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
7
-
-
0003257683
-
Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols
-
E. Clarke, S. Jha, W. Marrero. Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols. In Proc. of PRO-COMET’98, 1998.
-
(1998)
Proc. Of PRO-COMET’98
-
-
Clarke, E.1
Jha, S.2
Marrero, W.3
-
8
-
-
84863949796
-
Partial Order Reductions for Security Protocol Verification
-
LNCS 1785
-
E. Clarke, S. Jha, W. Marrero. Partial Order Reductions for Security Protocol Verification. In Proc. of TACAS 2000, pages 503-518, LNCS 1785, 2000.
-
(2000)
Proc. Of TACAS 2000
, pp. 503-518
-
-
Clarke, E.1
Jha, S.2
Marrero, W.3
-
11
-
-
43949161369
-
Logic Programming in a Fragment of Intuitionistic Linear Logic
-
J. Hodas and D. Miller. Logic Programming in a Fragment of Intuitionistic Linear Logic. Information and Computation, 110(2):327-365, 1994.
-
(1994)
Information and Computation
, vol.110
, Issue.2
, pp. 327-365
-
-
Hodas, J.1
Miller, D.2
-
12
-
-
84959024709
-
A Bottom-Up Interpreter for a Higher-Order Logic Programming Language
-
LNCS
-
A. Hui Bon Hoa. A Bottom-Up Interpreter for a Higher-Order Logic Programming Language. In Proc. PLILP 1992, pages 326-340, LNCS 631, 1992.
-
(1992)
Proc. PLILP 1992
, vol.631
, pp. 326-340
-
-
Hui Bon Hoa, A.1
-
13
-
-
0342658605
-
Breaking and Fixing the Needham-Schroeder Public-key Protocol usinmg CSP and FDR
-
LNCS
-
G. Lowe. Breaking and Fixing the Needham-Schroeder Public-key Protocol usinmg CSP and FDR. In Proc. TACAS’96, page 147-166, LNCS 1055, 1996.
-
(1996)
Proc. TACAS’96
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
14
-
-
84957370905
-
Automated Reasoning and the Verification of Security Protocols
-
LNAI
-
F. Massacci. Automated Reasoning and the Verification of Security Protocols In Proc. of TABLEAUX ‘99, pages 32-33, LNAI 1617, 1999.
-
(1999)
In Proc. Of TABLEAUX ‘99
, vol.1617
, pp. 32-33
-
-
Massacci, F.1
-
15
-
-
0030084918
-
The NRL Protocol Analyzer: An Overview
-
C. Meadows. The NRL Protocol Analyzer: An Overview. JLP 26(2): 113-131, 1996.
-
(1996)
JLP
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
16
-
-
0030703520
-
A Logic for Reasoning with Higher-Order Abstract Syntax
-
R. McDowell, D. Miller. A Logic for Reasoning with Higher-Order Abstract Syntax. In Proc. LICS ‘97, pages 434-445, 1997.
-
(1997)
Proc. LICS ‘97
, pp. 434-445
-
-
McDowell, R.1
Miller, D.2
-
17
-
-
0039631145
-
Lexical Scoping as Universal Quantification
-
D. Miller. Lexical Scoping as Universal Quantification. In Proc. ICLP ‘89, pages 268-283, 1989.
-
(1989)
Proc. ICLP ‘89
, pp. 268-283
-
-
Miller, D.1
-
18
-
-
0024480570
-
A Logical Analysis of Modules in Logic Programming
-
D. Miller. A Logical Analysis of Modules in Logic Programming. JLP 6(1&2): 79-108, 1989.
-
(1989)
JLP
, vol.6
, Issue.1-2
, pp. 79-108
-
-
Miller, D.1
-
19
-
-
0030247475
-
Forum: A Multiple-Conclusion Specification Logic
-
D. Miller. Forum: A Multiple-Conclusion Specification Logic. Theoretical Computer Science, 165(1):201-232, 1996.
-
(1996)
Theoretical Computer Science
, vol.165
, Issue.1
, pp. 201-232
-
-
Miller, D.1
-
20
-
-
0000829789
-
Uniform Proofs as a Foundation for Logic Programming
-
D. Miller, G. Nadathur, F. Pfenning, and A. Scedrov. Uniform Proofs as a Foundation for Logic Programming. Annals of Pure and Applied Logic, 51:125-157, 1991.
-
(1991)
Annals of Pure and Applied Logic
, vol.51
, pp. 125-157
-
-
Miller, D.1
Nadathur, G.2
Pfenning, F.3
Scedrov, A.4
-
22
-
-
84957611918
-
System Description: Teyjus - A Compiler and Abstract Machine Based Implementation of lambda-Prolog
-
G. Nadathur, D. J. Mitchell. System Description: Teyjus - A Compiler and Abstract Machine Based Implementation of lambda-Prolog. In Proc CADE’99, LNCS 1632, pages 287-291, 1999.
-
(1999)
Proc CADE’99, LNCS
, vol.1632
, pp. 287-291
-
-
Nadathur, G.1
Mitchell, D.J.2
-
23
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. CACM 21(12): 993-999, 1978.
-
(1978)
CACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
|