메뉴 건너뛰기




Volumn 20, Issue 1-2, 2007, Pages 123-160

Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols

Author keywords

Narrowing; Reachability; Rewrite theories; Security protocols

Indexed keywords

CRYPTOGRAPHY; LINEAR ALGEBRA; LINEAR EQUATIONS; PROBLEM SOLVING;

EID: 34047234972     PISSN: 13883690     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10990-007-9000-6     Document Type: Conference Paper
Times cited : (91)

References (68)
  • 1
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic primitives
    • Palamidessi, C, ed, 11th International Conference on Concurrency Theory CONCUR '00, of, Springer
    • Amadio R., Lugiez, D.: On the reachability problem in cryptographic primitives. In: Palamidessi, C. (ed.) 11th International Conference on Concurrency Theory (CONCUR '00), vol. 1877 of Lecture Notes in Computer Science, pp. 380-394. Springer (2000)
    • (2000) Lecture Notes in Computer Science , vol.1877 , pp. 380-394
    • Amadio, R.1    Lugiez, D.2
  • 2
    • 85029547665 scopus 로고
    • Definitional trees
    • Proceedings of the 3rd International Conference on Algebraic and Logic Programming ALP'92, of, Springer, Berlin
    • Antoy, S.: Definitional trees. In: Proceedings of the 3rd International Conference on Algebraic and Logic Programming ALP'92, vol. 632 of Lecture Notes in Computer Science, pp. 143-157. Springer, Berlin (1992)
    • (1992) Lecture Notes in Computer Science , vol.632 , pp. 143-157
    • Antoy, S.1
  • 4
    • 0000481520 scopus 로고    scopus 로고
    • A needed narrowing strategy
    • Antoy, S., Echahed, R., Hanus, M.: A needed narrowing strategy. J. ACM 47(4), 776-822 (2000)
    • (2000) J. ACM , vol.47 , Issue.4 , pp. 776-822
    • Antoy, S.1    Echahed, R.2    Hanus, M.3
  • 5
    • 84922960766 scopus 로고    scopus 로고
    • Narrowing the narrowing space
    • International Symposium on Programming Languages, Implementations, Logics, and Programs, of, Springer
    • Antoy, S., Ariola, Z.M.: Narrowing the narrowing space. In: International Symposium on Programming Languages, Implementations, Logics, and Programs, vol. 1292 of Lecture Notes in Computer Science, pp. 1-15. Springer (1997)
    • (1997) Lecture Notes in Computer Science , vol.1292 , pp. 1-15
    • Antoy, S.1    Ariola, Z.M.2
  • 6
    • 12344277212 scopus 로고    scopus 로고
    • Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols
    • Technical Report TR-405, Swiss Federal Institute of Technology, Zurich May
    • Basin, D., Modersheim, S., Vigano, L.: Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols. Technical Report TR-405, Swiss Federal Institute of Technology, Zurich (May 2003)
    • (2003)
    • Basin, D.1    Modersheim, S.2    Vigano, L.3
  • 7
    • 33750416637 scopus 로고
    • Conditional narrowing modulo of set of equations
    • Bockmayr, A.: Conditional narrowing modulo of set of equations. Appl. Algebra Eng. Commun. Comput. 4(3), 147-168 (1993)
    • (1993) Appl. Algebra Eng. Commun. Comput , vol.4 , Issue.3 , pp. 147-168
    • Bockmayr, A.1
  • 8
    • 84958094956 scopus 로고
    • An optimal narrowing strategy for general canonical systems
    • Rusinowitch, M, Rémy, J.L, eds, 3rd International Workshop on Conditional Term Rewrite systems, of, Springer
    • Bockmayr, A., Krischer, S., Werner, A.: An optimal narrowing strategy for general canonical systems. In: Rusinowitch, M., Rémy, J.L. (eds.) 3rd International Workshop on Conditional Term Rewrite systems, vol. 656 of Lecture Notes in Computer Science, pp. 483-497. Springer (1992)
    • (1992) Lecture Notes in Computer Science , vol.656 , pp. 483-497
    • Bockmayr, A.1    Krischer, S.2    Werner, A.3
  • 9
    • 84957104846 scopus 로고    scopus 로고
    • Model checking lossy vector addition systems
    • Meinel, C, Tison, S, eds, 16th Annual Symposium on Theoretical Aspects of Computer Science, of
    • Bouajjani, A., Mayr, R.: Model checking lossy vector addition systems. In: Meinel, C., Tison, S. (eds.) 16th Annual Symposium on Theoretical Aspects of Computer Science, vol. 1563 of Lecture Notes in Computer Science, pp. 323-333 (1999)
    • (1999) Lecture Notes in Computer Science , vol.1563 , pp. 323-333
    • Bouajjani, A.1    Mayr, R.2
  • 10
    • 0012626037 scopus 로고    scopus 로고
    • Verification over infinite states
    • Bergstra, J.A, Ponse, A, Smolka, S.A, eds, Elsevier Publishing
    • Burkart, O., Caucal, D., Moller, F., Stoffen, B.: Verification over infinite states. In: Bergstra, J.A., Ponse, A., Smolka, S.A. (eds.) Handbook of Process Algebra, pp. 545-623. Elsevier Publishing (2001)
    • (2001) Handbook of Process Algebra , pp. 545-623
    • Burkart, O.1    Caucal, D.2    Moller, F.3    Stoffen, B.4
  • 11
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    • Pandya, P, Radhakrishnan, J, eds, 23rd Conference on Foundations Software Technology and Theoretical Computer Science, of
    • Chevalier, Y., Kusters, R., Rusinowitch, M., Turuani, M.: Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. In: Pandya, P., Radhakrishnan, J. (eds.) 23rd Conference on Foundations Software Technology and Theoretical Computer Science, vol. 2914 of Lecture Notes in Computer Science. Springer (2003)
    • (2003) Lecture Notes in Computer Science. Springer , vol.2914
    • Chevalier, Y.1    Kusters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 20
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198-208 (1983)
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 21
    • 84944872561 scopus 로고    scopus 로고
    • Principles of Mobile Maude
    • Agent Systems, Mobile Agents, and Applications, ASA/MA of, Springer
    • Durán, F., Eker, S., Lincoln, P., Meseguer, J.: Principles of Mobile Maude. In: Agent Systems, Mobile Agents, and Applications, ASA/MA 2000, vol. 1882 of Lecture Notes in Computer Science, pp. 73-85. Springer (2000)
    • (2000) Lecture Notes in Computer Science , vol.1882 , pp. 73-85
    • Durán, F.1    Eker, S.2    Lincoln, P.3    Meseguer, J.4
  • 25
    • 35048820404 scopus 로고    scopus 로고
    • Implementing natural rewriting and narrowing efficiently
    • Kameyama, Y, Stuckey, P.J, eds, 7th International Symposium on Functional and Logic Programming FLOPS of, Springer, Berlin
    • Escobar, S.: Implementing natural rewriting and narrowing efficiently. In: Kameyama, Y., Stuckey, P.J. (eds.) 7th International Symposium on Functional and Logic Programming (FLOPS 2004), vol. 2998 of Lecture Notes in Computer Science, pp. 147-162. Springer, Berlin (2004)
    • (2004) Lecture Notes in Computer Science , vol.2998 , pp. 147-162
    • Escobar, S.1
  • 27
    • 24944538905 scopus 로고    scopus 로고
    • Natural narrowing for general term rewriting systems
    • Giesl, J, ed, 16th International Conference on Rewriting Techniques and Applications, of, Springer
    • Escobar, S., Meseguer, J., Thati, P.: Natural narrowing for general term rewriting systems. In: Giesl, J. (ed.) 16th International Conference on Rewriting Techniques and Applications, vol. 3467 of Lecture notes in computer science, pp. 279-293. Springer (2005)
    • (2005) Lecture notes in computer science , vol.3467 , pp. 279-293
    • Escobar, S.1    Meseguer, J.2    Thati, P.3
  • 28
    • 0002436797 scopus 로고
    • First order unification in equational theories
    • Bibel, W, Kowalski, R, eds, 4th Conference on Automated Deduction, of, Springer
    • Fay, M.: First order unification in equational theories. In: Bibel, W., Kowalski, R. (eds.) 4th Conference on Automated Deduction, vol. 87 of Lecture Notes in Computer Science, pp. 161-167. Springer (1979)
    • (1979) Lecture Notes in Computer Science , vol.87 , pp. 161-167
    • Fay, M.1
  • 29
    • 0034911369 scopus 로고    scopus 로고
    • Well-structured transition systems everywhere!
    • Finkel, A., Schnoebelen, Ph.: Well-structured transition systems everywhere! Theor. Comput. Sci. 256(1), 63-92 (2001)
    • (2001) Theor. Comput. Sci , vol.256 , Issue.1 , pp. 63-92
    • Finkel, A.1    Schnoebelen, P.2
  • 30
    • 84937389998 scopus 로고    scopus 로고
    • Rewriting for cryptographic protocol verification
    • McAllester, D, ed, Automated Deduction, CADE, 1831 of, Springer
    • Genet, T., Klay, F.: Rewriting for cryptographic protocol verification. In: McAllester, D. (ed.) Automated Deduction - CADE 17, vol. 1831 of Lecture notes in artificial intelligence, pp. 271-290. Springer (2000)
    • (2000) Lecture notes in artificial intelligence , vol.17 , pp. 271-290
    • Genet, T.1    Klay, F.2
  • 31
    • 84937398672 scopus 로고    scopus 로고
    • Reachability analysis of term rewriting systems with Timbuk
    • Nieuwenhuis, R, Voronkov, A, eds, 8th International Conference on Logic for Programming, of
    • Genet, T., Tong, V.V.T.: Reachability analysis of term rewriting systems with Timbuk. In: Nieuwenhuis, R., Voronkov, A. (eds.) 8th International Conference on Logic for Programming, vol. 2250 of Lecture Notes in Computer Science, pp. 695-706 (2001)
    • (2001) Lecture Notes in Computer Science , vol.2250 , pp. 695-706
    • Genet, T.1    Tong, V.V.T.2
  • 32
    • 84947441305 scopus 로고    scopus 로고
    • Construction of abstract state graphs with PVS
    • Grumberg, O, ed, Computer Aided Verification. 9th International Conference, CAV'97, Haifa, Israel, June 22-25, 1997, Proceedings, of, Springer
    • Graf, S., Saidi, H.: Construction of abstract state graphs with PVS. In: Grumberg, O. (ed.) Computer Aided Verification. 9th International Conference, CAV'97, Haifa, Israel, June 22-25, 1997, Proceedings, vol. 1254 of Lecture Notes in Computer Science, pp. 72-83. Springer (1997)
    • (1997) Lecture Notes in Computer Science , vol.1254 , pp. 72-83
    • Graf, S.1    Saidi, H.2
  • 33
    • 0028427164 scopus 로고
    • The integration of functions into logic programming: From theory to practice
    • Hanus, M.: The integration of functions into logic programming: From theory to practice. J. Log. Program. 19(20), 583-628 (1994)
    • (1994) J. Log. Program , vol.19 , Issue.20 , pp. 583-628
    • Hanus, M.1
  • 34
    • 34047194354 scopus 로고    scopus 로고
    • Huet, G., Levy, J.-J.: Computations in Orthogonal Term Rewriting Systems, Part I + II. In: Computational logic: Essays in honour of J. Alan Robinson, pp. 395-414 and 415-443. The MIT Press, Cambridge, MA (1992)
    • Huet, G., Levy, J.-J.: Computations in Orthogonal Term Rewriting Systems, Part I + II. In: Computational logic: Essays in honour of J. Alan Robinson, pp. 395-414 and 415-443. The MIT Press, Cambridge, MA (1992)
  • 36
    • 85035020357 scopus 로고
    • Canonical forms and unification
    • Bibel, W, Kowalski, R, eds, 5th Conference on Automated Deduction, of, Springer
    • Hullot, J.M.: Canonical forms and unification. In: Bibel, W., Kowalski, R. (eds.) 5th Conference on Automated Deduction, vol. 87 of Lecture Notes in Computer Science, pp. 318-334. Springer (1980)
    • (1980) Lecture Notes in Computer Science , vol.87 , pp. 318-334
    • Hullot, J.M.1
  • 37
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and verifying security protocols
    • Parigot, M, Voronkov, A, eds, Logic Programming and Automated Reasoning, of, Springer
    • Jacquemard, F., Rusinowitch, M., Vigneron, L.: Compiling and verifying security protocols. In: Parigot, M., Voronkov, A. (eds.) Logic Programming and Automated Reasoning, vol. 1955 of Lecture Notes in Computer Science, pp. 131-160. Springer (2000)
    • (2000) Lecture Notes in Computer Science , vol.1955 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 38
    • 0020985755 scopus 로고
    • Incremental construction of unification algorithms in equational theories
    • 10th International Colloquium on Automata, Languages and Programming, of, Springer
    • Jouannaud, J.-P., Kirchner, C., Kirchner, H.: Incremental construction of unification algorithms in equational theories. In: 10th International Colloquium on Automata, Languages and Programming, vol. 154 of Lecture Notes in Computer Science, pp. 361-373. Springer (1983)
    • (1983) Lecture Notes in Computer Science , vol.154 , pp. 361-373
    • Jouannaud, J.-P.1    Kirchner, C.2    Kirchner, H.3
  • 39
    • 51149098006 scopus 로고    scopus 로고
    • An e-unification algorithm for analyzing protocols that use modular exponentiation
    • Nieuwenhuis, R, ed, International Conference on Rewriting Techniques and Applications RTA'03, of, Springer
    • Kapur, D., Narendran, P., Wang, L.: An e-unification algorithm for analyzing protocols that use modular exponentiation. In: Nieuwenhuis, R. (ed.) International Conference on Rewriting Techniques and Applications (RTA'03), vol. 2706 of Lecture Notes in Computer Science, pp. 165-179. Springer (2003)
    • (2003) Lecture Notes in Computer Science , vol.2706 , pp. 165-179
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 40
    • 84896694022 scopus 로고    scopus 로고
    • Control and data abstraction: The cornerstones of practical formal verification
    • Kesten, Y., Pnueli, A.: Control and data abstraction: The cornerstones of practical formal verification. Int. J. Softw. Tools Technol. Transfer 4(2), 328-342 (2000)
    • (2000) Int. J. Softw. Tools Technol. Transfer , vol.4 , Issue.2 , pp. 328-342
    • Kesten, Y.1    Pnueli, A.2
  • 41
    • 84957016005 scopus 로고
    • On the use of constraints in automated deduction
    • Podelski, A, ed, Constraint Programming: Basics and Trends, pp
    • Kirchner, H.: On the use of constraints in automated deduction. In: Podelski, A. (ed.) Constraint Programming: Basics and Trends, pp. 128-146. Springer LNCS 910 (1995)
    • (1995) Springer LNCS , vol.910 , pp. 128-146
    • Kirchner, H.1
  • 42
    • 0029207880 scopus 로고    scopus 로고
    • Loiseaux, C., Graf, S., Sifakis, J., Bouajjani, A., Bensalem, S.: Property preserving abstractions for the verification of concurrent systems. Form. Methods Syst. Des. 6, 1-36 (1995)
    • Loiseaux, C., Graf, S., Sifakis, J., Bouajjani, A., Bensalem, S.: Property preserving abstractions for the verification of concurrent systems. Form. Methods Syst. Des. 6, 1-36 (1995)
  • 43
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Steffen, B, Margaria, T, eds, Tools and algorithms for construction and analysis of systems TACAS '96, of, Springer
    • Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Steffen, B., Margaria, T. (eds.) Tools and algorithms for construction and analysis of systems (TACAS '96), vol. 1055 of Lecture Notes in Computer Science, pp. 147-166. Springer (1996).
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 44
    • 34047216378 scopus 로고    scopus 로고
    • Martí-Oliet, N., Meseguer, J.: Rewriting logic as a logical and semantic framework. In: Gabbay, D., Guenthner, F. (eds.) Handbook of Philosophical Logic, 2nd. Edn., pp. 1-87. Kluwer Academic Publishers (2002). First published as SRI Tech. Report SRI-CSL-93-05 (Aug. 1993)
    • Martí-Oliet, N., Meseguer, J.: Rewriting logic as a logical and semantic framework. In: Gabbay, D., Guenthner, F. (eds.) Handbook of Philosophical Logic, 2nd. Edn., pp. 1-87. Kluwer Academic Publishers (2002). First published as SRI Tech. Report SRI-CSL-93-05 (Aug. 1993)
  • 45
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows, C.: The NRL protocol analyzer: An overview. J. Log. Program. 26(2), 113-131 (1996)
    • (1996) J. Log. Program , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 46
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows, C.: The NRL protocol analyzer: An overview. J. Log. program. 26(2), 113-131 (1996)
    • (1996) J. Log. program , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 47
    • 24944559770 scopus 로고    scopus 로고
    • Localized fairness: A rewriting semantics
    • Giesl, J, ed, International Conference on Term Rewriting and Applications, of, Springer
    • Meseguer, J.: Localized fairness: A rewriting semantics. In: Giesl, J. (ed.) International Conference on Term Rewriting and Applications, vol. 3467 of Lecture Notes in Computer Science, pp. 250-263. Springer (2005)
    • (2005) Lecture Notes in Computer Science , vol.3467 , pp. 250-263
    • Meseguer, J.1
  • 48
    • 84944052797 scopus 로고    scopus 로고
    • Semantic models for distributed object reflection
    • Magnusson, B, ed, Proceedings of ECOOP'02, Malaga, Spain, June
    • Meseguer, J., Talcott, C.: Semantic models for distributed object reflection. In: Magnusson, B. (ed.) Proceedings of ECOOP'02, Malaga, Spain, June 2002, pp. 1-36. Springer LNCS 2374 (2002)
    • (2002) Springer LNCS , vol.2374 , pp. 1-36
    • Meseguer, J.1    Talcott, C.2
  • 49
    • 12344293529 scopus 로고    scopus 로고
    • Symbolic reachability analysis using narrowing and it application to verification of cryptographic protocols
    • Martí-Oliet, N, ed, International Workshop on Rewriting Logic and its Application, WRLA'04, of, Elsevier Sciences Publisher
    • Meseguer, .T., Thati, P.: Symbolic reachability analysis using narrowing and it application to verification of cryptographic protocols. In: Martí-Oliet, N. (ed.) International Workshop on Rewriting Logic and its Application, WRLA'04, vol. 117 of Electronic Notes in Theoretical Computer Science, pp. 153-182. Elsevier Sciences Publisher (2004)
    • (2004) Electronic Notes in Theoretical Computer Science , vol.117 , pp. 153-182
    • Meseguer, T.1    Thati, P.2
  • 50
    • 0027113376 scopus 로고
    • Conditional rewriting logic as a unified model of concurrency
    • Meseguer, J.: Conditional rewriting logic as a unified model of concurrency. Theor. Comput. Sci. 96(1), 73-155 (1992)
    • (1992) Theor. Comput. Sci , vol.96 , Issue.1 , pp. 73-155
    • Meseguer, J.1
  • 51
    • 0002893365 scopus 로고
    • A logical theory of concurrent objects and its realization in the Maude language
    • Agha, G, Wegner, P, Yonezawa, A, eds, The MIT Press
    • Meseguer, J.: A logical theory of concurrent objects and its realization in the Maude language. In:Agha, G., Wegner, P., Yonezawa, A. (eds.) Research Directions in Concurrent Object-Oriented Programming, pp. 314-390. The MIT Press (1993)
    • (1993) Research Directions in Concurrent Object-Oriented Programming , pp. 314-390
    • Meseguer, J.1
  • 52
    • 84957873927 scopus 로고    scopus 로고
    • Membership algebra as a logical framework for equational specification
    • Parisi-Presicce, F, ed, International Workshop on Algebraic Development Techniques, of, Springer
    • Meseguer, J. Membership algebra as a logical framework for equational specification. In: Parisi-Presicce, F. (ed.) International Workshop on Algebraic Development Techniques, vol. 1376 of Lecture Notes in Computer Science, pp. 18-61. Springer (1998)
    • (1998) Lecture Notes in Computer Science , vol.1376 , pp. 18-61
    • Meseguer, J.1
  • 56
    • 84955618412 scopus 로고
    • On narrowing, refutation proofs and constraints
    • Hsiang, J, ed, 6th International Conference on Rewriting Techniques and Applications
    • Nieuwenhuis, R.: On narrowing, refutation proofs and constraints. In: Hsiang, J. (ed.) 6th International Conference on Rewriting Techniques and Applications, vol. 914, pp. 56-70. Springer LNCS (1995)
    • (1995) Springer LNCS , vol.914 , pp. 56-70
    • Nieuwenhuis, R.1
  • 57
    • 84947742359 scopus 로고    scopus 로고
    • Recognizing boolean closed A-tree languages with membership conditional mechanism
    • th International Conference on Rewriting Techniques and Applications, of, Springer
    • th International Conference on Rewriting Techniques and Applications, vol. 2706 of Lecture notes in computer science, pp. 483-498. Springer (2003)
    • (2003) Lecture notes in computer science , vol.2706 , pp. 483-498
    • Ohsaki, H.1    Seki, H.2    Takai, T.3
  • 59
    • 34047216113 scopus 로고    scopus 로고
    • Paulson, L.: Isabelle: A Generic Theorem Prover, 828 of Lecture Notes in Computer Science. Springer (1994)
    • Paulson, L.: Isabelle: A Generic Theorem Prover, volume 828 of Lecture Notes in Computer Science. Springer (1994)
  • 61
    • 0034822801 scopus 로고    scopus 로고
    • Protocol insecurity with a finite number of sessions and composed keys is NP-complete
    • Rusinowitch, M., Turuani, M.: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. In: 14th IEEE Computer Security Foundations Workshop, pp. 174-190 (2001)
    • (2001) 14th IEEE Computer Security Foundations Workshop , pp. 174-190
    • Rusinowitch, M.1    Turuani, M.2
  • 62
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol
    • Ryan, P., Schneider, S.: An attack on a recursive authentication protocol. Inf. Process. Lett. 65, 7-10 (1998)
    • (1998) Inf. Process. Lett , vol.65 , pp. 7-10
    • Ryan, P.1    Schneider, S.2
  • 63
    • 84957079461 scopus 로고    scopus 로고
    • Abstract and model check while you prove
    • Halbwachs, N, Peled, D, eds, Computer Aided Verification, 11th International Conference, CAV'99, Trento, Italy, July 6-10, 1999, Proceedings, of, Springer
    • Saïdi, H., Shankar, N.: Abstract and model check while you prove. In: Halbwachs, N., Peled, D. (eds.) Computer Aided Verification, 11th International Conference, CAV'99, Trento, Italy, July 6-10, 1999, Proceedings, vol. 1633 of Lecture Notes in Computer Science, pp. 443-454. Springer (1999)
    • (1999) Lecture Notes in Computer Science , vol.1633 , pp. 443-454
    • Saïdi, H.1    Shankar, N.2
  • 64
    • 0003060532 scopus 로고
    • Programming in equational logic: Beyond strong sequentiality
    • Sekar, R.C., Ramakrishnan, I.V.: Programming in equational logic: Beyond strong sequentiality. Inf. Comput. 104(1), 78-109 (1993)
    • (1993) Inf. Comput , vol.104 , Issue.1 , pp. 78-109
    • Sekar, R.C.1    Ramakrishnan, I.V.2
  • 65
    • 0009953384 scopus 로고    scopus 로고
    • Rewriting logic as a unifying framework for Petri nets
    • Unifying Petri Nets, of, Springer
    • Stehr, M.-O., Meseguer, J., Ölveczky, P.: Rewriting logic as a unifying framework for Petri nets. In: Unifying Petri Nets, vol. 2128 of Lecture Notes in Computer Science, pp. 250-303. Springer (2001)
    • (2001) Lecture Notes in Computer Science , vol.2128 , pp. 250-303
    • Stehr, M.-O.1    Meseguer, J.2    Ölveczky, P.3
  • 66
    • 26944493332 scopus 로고    scopus 로고
    • Complete symbolic reachability analysis using back-and-forth narrowing
    • Fiadeiro, J.L, Harman, N, Roggenbach, M, Rutten, J, eds, Conference on Algebra and Co-algebra in Computer Science, of, Springer
    • Thati, P., Meseguer, J.: Complete symbolic reachability analysis using back-and-forth narrowing. In: Fiadeiro, J.L., Harman, N., Roggenbach, M., Rutten, J. (eds.) Conference on Algebra and Co-algebra in Computer Science, vol. 3629 of Lecture Notes in Computer Science, pp. 379-394. Springer (2005)
    • (2005) Lecture Notes in Computer Science , vol.3629 , pp. 379-394
    • Thati, P.1    Meseguer, J.2
  • 67
    • 35048862423 scopus 로고    scopus 로고
    • A verification technique using term rewriting systems and abstract interpretation
    • Halatsis et al, eds, Proceedings RTA of, Springer
    • Takai, T.: A verification technique using term rewriting systems and abstract interpretation. In: Halatsis et al., (eds.) Proceedings RTA 2004, vol. 3091 of Lecture Notes in Computer Science, pp. 119-133. Springer (2004)
    • (2004) Lecture Notes in Computer Science , vol.3091 , pp. 119-133
    • Takai, T.1
  • 68
    • 0001111462 scopus 로고
    • Rewriting: An effective model of concurrency
    • Halatsis, C, Maritsas, D, Philokyprou, G, Theodoridis, S, eds, PARLE'94 Parallel Architectures and Languages Europe, 6th International PARLE Conference, Athens, Greece, July 4-8, 1994, Proceedings, of, Springer
    • Viry, P.: Rewriting: An effective model of concurrency. In: Halatsis, C., Maritsas, D., Philokyprou, G., Theodoridis, S. (eds.) PARLE'94 Parallel Architectures and Languages Europe, 6th International PARLE Conference, Athens, Greece, July 4-8, 1994, Proceedings, vol. 817 of Lecture Notes in Computer Science, pp. 648-660. Springer (1994)
    • (1994) Lecture Notes in Computer Science , vol.817 , pp. 648-660
    • Viry, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.