-
1
-
-
84885216561
-
On the reachability problem in cryptographic primitives
-
Palamidessi, C, ed, 11th International Conference on Concurrency Theory CONCUR '00, of, Springer
-
Amadio R., Lugiez, D.: On the reachability problem in cryptographic primitives. In: Palamidessi, C. (ed.) 11th International Conference on Concurrency Theory (CONCUR '00), vol. 1877 of Lecture Notes in Computer Science, pp. 380-394. Springer (2000)
-
(2000)
Lecture Notes in Computer Science
, vol.1877
, pp. 380-394
-
-
Amadio, R.1
Lugiez, D.2
-
2
-
-
85029547665
-
Definitional trees
-
Proceedings of the 3rd International Conference on Algebraic and Logic Programming ALP'92, of, Springer, Berlin
-
Antoy, S.: Definitional trees. In: Proceedings of the 3rd International Conference on Algebraic and Logic Programming ALP'92, vol. 632 of Lecture Notes in Computer Science, pp. 143-157. Springer, Berlin (1992)
-
(1992)
Lecture Notes in Computer Science
, vol.632
, pp. 143-157
-
-
Antoy, S.1
-
3
-
-
0001795798
-
Parallel evaluation strategies for functional logic languages
-
MIT Press
-
Antoy, S., Echahed, R., Hanus, M.: Parallel evaluation strategies for functional logic languages. In: Proceedings of the Fourteenth International Conference on Logic Programming (ICLP'97), pp. 138-152. MIT Press (1997)
-
(1997)
Proceedings of the Fourteenth International Conference on Logic Programming (ICLP'97)
, pp. 138-152
-
-
Antoy, S.1
Echahed, R.2
Hanus, M.3
-
4
-
-
0000481520
-
A needed narrowing strategy
-
Antoy, S., Echahed, R., Hanus, M.: A needed narrowing strategy. J. ACM 47(4), 776-822 (2000)
-
(2000)
J. ACM
, vol.47
, Issue.4
, pp. 776-822
-
-
Antoy, S.1
Echahed, R.2
Hanus, M.3
-
5
-
-
84922960766
-
Narrowing the narrowing space
-
International Symposium on Programming Languages, Implementations, Logics, and Programs, of, Springer
-
Antoy, S., Ariola, Z.M.: Narrowing the narrowing space. In: International Symposium on Programming Languages, Implementations, Logics, and Programs, vol. 1292 of Lecture Notes in Computer Science, pp. 1-15. Springer (1997)
-
(1997)
Lecture Notes in Computer Science
, vol.1292
, pp. 1-15
-
-
Antoy, S.1
Ariola, Z.M.2
-
6
-
-
12344277212
-
Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols
-
Technical Report TR-405, Swiss Federal Institute of Technology, Zurich May
-
Basin, D., Modersheim, S., Vigano, L.: Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols. Technical Report TR-405, Swiss Federal Institute of Technology, Zurich (May 2003)
-
(2003)
-
-
Basin, D.1
Modersheim, S.2
Vigano, L.3
-
7
-
-
33750416637
-
Conditional narrowing modulo of set of equations
-
Bockmayr, A.: Conditional narrowing modulo of set of equations. Appl. Algebra Eng. Commun. Comput. 4(3), 147-168 (1993)
-
(1993)
Appl. Algebra Eng. Commun. Comput
, vol.4
, Issue.3
, pp. 147-168
-
-
Bockmayr, A.1
-
8
-
-
84958094956
-
An optimal narrowing strategy for general canonical systems
-
Rusinowitch, M, Rémy, J.L, eds, 3rd International Workshop on Conditional Term Rewrite systems, of, Springer
-
Bockmayr, A., Krischer, S., Werner, A.: An optimal narrowing strategy for general canonical systems. In: Rusinowitch, M., Rémy, J.L. (eds.) 3rd International Workshop on Conditional Term Rewrite systems, vol. 656 of Lecture Notes in Computer Science, pp. 483-497. Springer (1992)
-
(1992)
Lecture Notes in Computer Science
, vol.656
, pp. 483-497
-
-
Bockmayr, A.1
Krischer, S.2
Werner, A.3
-
9
-
-
84957104846
-
Model checking lossy vector addition systems
-
Meinel, C, Tison, S, eds, 16th Annual Symposium on Theoretical Aspects of Computer Science, of
-
Bouajjani, A., Mayr, R.: Model checking lossy vector addition systems. In: Meinel, C., Tison, S. (eds.) 16th Annual Symposium on Theoretical Aspects of Computer Science, vol. 1563 of Lecture Notes in Computer Science, pp. 323-333 (1999)
-
(1999)
Lecture Notes in Computer Science
, vol.1563
, pp. 323-333
-
-
Bouajjani, A.1
Mayr, R.2
-
10
-
-
0012626037
-
Verification over infinite states
-
Bergstra, J.A, Ponse, A, Smolka, S.A, eds, Elsevier Publishing
-
Burkart, O., Caucal, D., Moller, F., Stoffen, B.: Verification over infinite states. In: Bergstra, J.A., Ponse, A., Smolka, S.A. (eds.) Handbook of Process Algebra, pp. 545-623. Elsevier Publishing (2001)
-
(2001)
Handbook of Process Algebra
, pp. 545-623
-
-
Burkart, O.1
Caucal, D.2
Moller, F.3
Stoffen, B.4
-
11
-
-
35248865266
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
Pandya, P, Radhakrishnan, J, eds, 23rd Conference on Foundations Software Technology and Theoretical Computer Science, of
-
Chevalier, Y., Kusters, R., Rusinowitch, M., Turuani, M.: Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. In: Pandya, P., Radhakrishnan, J. (eds.) 23rd Conference on Foundations Software Technology and Theoretical Computer Science, vol. 2914 of Lecture Notes in Computer Science. Springer (2003)
-
(2003)
Lecture Notes in Computer Science. Springer
, vol.2914
-
-
Chevalier, Y.1
Kusters, R.2
Rusinowitch, M.3
Turuani, M.4
-
12
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
Chevalier, Y., Kusters, R., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: 18th Annual IEEE Symposium on Logic in Computer Science (LICS '03), pp. 261-270 (2003)
-
(2003)
18th Annual IEEE Symposium on Logic in Computer Science (LICS '03)
, pp. 261-270
-
-
Chevalier, Y.1
Kusters, R.2
Rusinowitch, M.3
Turuani, M.4
-
14
-
-
0028513196
-
Model checking and abstraction
-
Clarke, E.M., Grumberg, O., Long, D.E.: Model checking and abstraction. ACM Trans. Program. Lang. Syst. 16(5), 1512-1542 (1994)
-
(1994)
ACM Trans. Program. Lang. Syst
, vol.16
, Issue.5
, pp. 1512-1542
-
-
Clarke, E.M.1
Grumberg, O.2
Long, D.E.3
-
16
-
-
0037190144
-
Maude: Specification and programming in rewriting logic
-
Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Quesada, J.: Maude: specification and programming in rewriting logic. Theor. Comput. Sci. 285, 187-243 (2002)
-
(2002)
Theor. Comput. Sci
, vol.285
, pp. 187-243
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Quesada, J.7
-
17
-
-
33745466917
-
-
version 2.2, Dec
-
Clavel, M., Durán, F., Eker, S., Lincoln, P., Mnrtí-Oliet, N., Meseguer, J., Talcott, C.: Maude Manual (version 2.2) (Dec. 2005)
-
(2005)
Maude Manual
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Mnrtí-Oliet, N.5
Meseguer, J.6
Talcott, C.7
-
19
-
-
0003300896
-
Protocol specification and analysis in Maude
-
Heintze, N, Wing, J, eds, Indianapolis, Indiana
-
Denker, G., Meseguer, J., Talcott, C.L.: Protocol specification and analysis in Maude. In: Heintze, N., Wing, J. (eds.) Proceedings of Workshop on Formal Methods and Security Protocols, June 25, 1998, Indianapolis, Indiana (1998)
-
(1998)
Proceedings of Workshop on Formal Methods and Security Protocols, June 25
-
-
Denker, G.1
Meseguer, J.2
Talcott, C.L.3
-
20
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198-208 (1983)
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
21
-
-
84944872561
-
Principles of Mobile Maude
-
Agent Systems, Mobile Agents, and Applications, ASA/MA of, Springer
-
Durán, F., Eker, S., Lincoln, P., Meseguer, J.: Principles of Mobile Maude. In: Agent Systems, Mobile Agents, and Applications, ASA/MA 2000, vol. 1882 of Lecture Notes in Computer Science, pp. 73-85. Springer (2000)
-
(2000)
Lecture Notes in Computer Science
, vol.1882
, pp. 73-85
-
-
Durán, F.1
Eker, S.2
Lincoln, P.3
Meseguer, J.4
-
22
-
-
0010227585
-
Undecidability of Bounded Security Protocols
-
Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Undecidability of Bounded Security Protocols. In: Workshop on formal methods and security protocols, FMSP (1999)
-
(1999)
Workshop on formal methods and security protocols, FMSP
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
24
-
-
1242265153
-
Refining weakly outermost-needed rewriting and narrowing
-
Miller, D, ed, ACM Press, New York
-
Escobar, S.: Refining weakly outermost-needed rewriting and narrowing. In: Miller, D. (ed.) Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, PPDP'03, pp. 113-123. ACM Press, New York (2003)
-
(2003)
Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, PPDP'03
, pp. 113-123
-
-
Escobar, S.1
-
25
-
-
35048820404
-
Implementing natural rewriting and narrowing efficiently
-
Kameyama, Y, Stuckey, P.J, eds, 7th International Symposium on Functional and Logic Programming FLOPS of, Springer, Berlin
-
Escobar, S.: Implementing natural rewriting and narrowing efficiently. In: Kameyama, Y., Stuckey, P.J. (eds.) 7th International Symposium on Functional and Logic Programming (FLOPS 2004), vol. 2998 of Lecture Notes in Computer Science, pp. 147-162. Springer, Berlin (2004)
-
(2004)
Lecture Notes in Computer Science
, vol.2998
, pp. 147-162
-
-
Escobar, S.1
-
27
-
-
24944538905
-
Natural narrowing for general term rewriting systems
-
Giesl, J, ed, 16th International Conference on Rewriting Techniques and Applications, of, Springer
-
Escobar, S., Meseguer, J., Thati, P.: Natural narrowing for general term rewriting systems. In: Giesl, J. (ed.) 16th International Conference on Rewriting Techniques and Applications, vol. 3467 of Lecture notes in computer science, pp. 279-293. Springer (2005)
-
(2005)
Lecture notes in computer science
, vol.3467
, pp. 279-293
-
-
Escobar, S.1
Meseguer, J.2
Thati, P.3
-
28
-
-
0002436797
-
First order unification in equational theories
-
Bibel, W, Kowalski, R, eds, 4th Conference on Automated Deduction, of, Springer
-
Fay, M.: First order unification in equational theories. In: Bibel, W., Kowalski, R. (eds.) 4th Conference on Automated Deduction, vol. 87 of Lecture Notes in Computer Science, pp. 161-167. Springer (1979)
-
(1979)
Lecture Notes in Computer Science
, vol.87
, pp. 161-167
-
-
Fay, M.1
-
29
-
-
0034911369
-
Well-structured transition systems everywhere!
-
Finkel, A., Schnoebelen, Ph.: Well-structured transition systems everywhere! Theor. Comput. Sci. 256(1), 63-92 (2001)
-
(2001)
Theor. Comput. Sci
, vol.256
, Issue.1
, pp. 63-92
-
-
Finkel, A.1
Schnoebelen, P.2
-
30
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
McAllester, D, ed, Automated Deduction, CADE, 1831 of, Springer
-
Genet, T., Klay, F.: Rewriting for cryptographic protocol verification. In: McAllester, D. (ed.) Automated Deduction - CADE 17, vol. 1831 of Lecture notes in artificial intelligence, pp. 271-290. Springer (2000)
-
(2000)
Lecture notes in artificial intelligence
, vol.17
, pp. 271-290
-
-
Genet, T.1
Klay, F.2
-
31
-
-
84937398672
-
Reachability analysis of term rewriting systems with Timbuk
-
Nieuwenhuis, R, Voronkov, A, eds, 8th International Conference on Logic for Programming, of
-
Genet, T., Tong, V.V.T.: Reachability analysis of term rewriting systems with Timbuk. In: Nieuwenhuis, R., Voronkov, A. (eds.) 8th International Conference on Logic for Programming, vol. 2250 of Lecture Notes in Computer Science, pp. 695-706 (2001)
-
(2001)
Lecture Notes in Computer Science
, vol.2250
, pp. 695-706
-
-
Genet, T.1
Tong, V.V.T.2
-
32
-
-
84947441305
-
Construction of abstract state graphs with PVS
-
Grumberg, O, ed, Computer Aided Verification. 9th International Conference, CAV'97, Haifa, Israel, June 22-25, 1997, Proceedings, of, Springer
-
Graf, S., Saidi, H.: Construction of abstract state graphs with PVS. In: Grumberg, O. (ed.) Computer Aided Verification. 9th International Conference, CAV'97, Haifa, Israel, June 22-25, 1997, Proceedings, vol. 1254 of Lecture Notes in Computer Science, pp. 72-83. Springer (1997)
-
(1997)
Lecture Notes in Computer Science
, vol.1254
, pp. 72-83
-
-
Graf, S.1
Saidi, H.2
-
33
-
-
0028427164
-
The integration of functions into logic programming: From theory to practice
-
Hanus, M.: The integration of functions into logic programming: From theory to practice. J. Log. Program. 19(20), 583-628 (1994)
-
(1994)
J. Log. Program
, vol.19
, Issue.20
, pp. 583-628
-
-
Hanus, M.1
-
34
-
-
34047194354
-
-
Huet, G., Levy, J.-J.: Computations in Orthogonal Term Rewriting Systems, Part I + II. In: Computational logic: Essays in honour of J. Alan Robinson, pp. 395-414 and 415-443. The MIT Press, Cambridge, MA (1992)
-
Huet, G., Levy, J.-J.: Computations in Orthogonal Term Rewriting Systems, Part I + II. In: Computational logic: Essays in honour of J. Alan Robinson, pp. 395-414 and 415-443. The MIT Press, Cambridge, MA (1992)
-
-
-
-
36
-
-
85035020357
-
Canonical forms and unification
-
Bibel, W, Kowalski, R, eds, 5th Conference on Automated Deduction, of, Springer
-
Hullot, J.M.: Canonical forms and unification. In: Bibel, W., Kowalski, R. (eds.) 5th Conference on Automated Deduction, vol. 87 of Lecture Notes in Computer Science, pp. 318-334. Springer (1980)
-
(1980)
Lecture Notes in Computer Science
, vol.87
, pp. 318-334
-
-
Hullot, J.M.1
-
37
-
-
84956860311
-
Compiling and verifying security protocols
-
Parigot, M, Voronkov, A, eds, Logic Programming and Automated Reasoning, of, Springer
-
Jacquemard, F., Rusinowitch, M., Vigneron, L.: Compiling and verifying security protocols. In: Parigot, M., Voronkov, A. (eds.) Logic Programming and Automated Reasoning, vol. 1955 of Lecture Notes in Computer Science, pp. 131-160. Springer (2000)
-
(2000)
Lecture Notes in Computer Science
, vol.1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
38
-
-
0020985755
-
Incremental construction of unification algorithms in equational theories
-
10th International Colloquium on Automata, Languages and Programming, of, Springer
-
Jouannaud, J.-P., Kirchner, C., Kirchner, H.: Incremental construction of unification algorithms in equational theories. In: 10th International Colloquium on Automata, Languages and Programming, vol. 154 of Lecture Notes in Computer Science, pp. 361-373. Springer (1983)
-
(1983)
Lecture Notes in Computer Science
, vol.154
, pp. 361-373
-
-
Jouannaud, J.-P.1
Kirchner, C.2
Kirchner, H.3
-
39
-
-
51149098006
-
An e-unification algorithm for analyzing protocols that use modular exponentiation
-
Nieuwenhuis, R, ed, International Conference on Rewriting Techniques and Applications RTA'03, of, Springer
-
Kapur, D., Narendran, P., Wang, L.: An e-unification algorithm for analyzing protocols that use modular exponentiation. In: Nieuwenhuis, R. (ed.) International Conference on Rewriting Techniques and Applications (RTA'03), vol. 2706 of Lecture Notes in Computer Science, pp. 165-179. Springer (2003)
-
(2003)
Lecture Notes in Computer Science
, vol.2706
, pp. 165-179
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
40
-
-
84896694022
-
Control and data abstraction: The cornerstones of practical formal verification
-
Kesten, Y., Pnueli, A.: Control and data abstraction: The cornerstones of practical formal verification. Int. J. Softw. Tools Technol. Transfer 4(2), 328-342 (2000)
-
(2000)
Int. J. Softw. Tools Technol. Transfer
, vol.4
, Issue.2
, pp. 328-342
-
-
Kesten, Y.1
Pnueli, A.2
-
41
-
-
84957016005
-
On the use of constraints in automated deduction
-
Podelski, A, ed, Constraint Programming: Basics and Trends, pp
-
Kirchner, H.: On the use of constraints in automated deduction. In: Podelski, A. (ed.) Constraint Programming: Basics and Trends, pp. 128-146. Springer LNCS 910 (1995)
-
(1995)
Springer LNCS
, vol.910
, pp. 128-146
-
-
Kirchner, H.1
-
42
-
-
0029207880
-
-
Loiseaux, C., Graf, S., Sifakis, J., Bouajjani, A., Bensalem, S.: Property preserving abstractions for the verification of concurrent systems. Form. Methods Syst. Des. 6, 1-36 (1995)
-
Loiseaux, C., Graf, S., Sifakis, J., Bouajjani, A., Bensalem, S.: Property preserving abstractions for the verification of concurrent systems. Form. Methods Syst. Des. 6, 1-36 (1995)
-
-
-
-
43
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Steffen, B, Margaria, T, eds, Tools and algorithms for construction and analysis of systems TACAS '96, of, Springer
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Steffen, B., Margaria, T. (eds.) Tools and algorithms for construction and analysis of systems (TACAS '96), vol. 1055 of Lecture Notes in Computer Science, pp. 147-166. Springer (1996).
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
44
-
-
34047216378
-
-
Martí-Oliet, N., Meseguer, J.: Rewriting logic as a logical and semantic framework. In: Gabbay, D., Guenthner, F. (eds.) Handbook of Philosophical Logic, 2nd. Edn., pp. 1-87. Kluwer Academic Publishers (2002). First published as SRI Tech. Report SRI-CSL-93-05 (Aug. 1993)
-
Martí-Oliet, N., Meseguer, J.: Rewriting logic as a logical and semantic framework. In: Gabbay, D., Guenthner, F. (eds.) Handbook of Philosophical Logic, 2nd. Edn., pp. 1-87. Kluwer Academic Publishers (2002). First published as SRI Tech. Report SRI-CSL-93-05 (Aug. 1993)
-
-
-
-
45
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows, C.: The NRL protocol analyzer: An overview. J. Log. Program. 26(2), 113-131 (1996)
-
(1996)
J. Log. Program
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
46
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows, C.: The NRL protocol analyzer: An overview. J. Log. program. 26(2), 113-131 (1996)
-
(1996)
J. Log. program
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
47
-
-
24944559770
-
Localized fairness: A rewriting semantics
-
Giesl, J, ed, International Conference on Term Rewriting and Applications, of, Springer
-
Meseguer, J.: Localized fairness: A rewriting semantics. In: Giesl, J. (ed.) International Conference on Term Rewriting and Applications, vol. 3467 of Lecture Notes in Computer Science, pp. 250-263. Springer (2005)
-
(2005)
Lecture Notes in Computer Science
, vol.3467
, pp. 250-263
-
-
Meseguer, J.1
-
48
-
-
84944052797
-
Semantic models for distributed object reflection
-
Magnusson, B, ed, Proceedings of ECOOP'02, Malaga, Spain, June
-
Meseguer, J., Talcott, C.: Semantic models for distributed object reflection. In: Magnusson, B. (ed.) Proceedings of ECOOP'02, Malaga, Spain, June 2002, pp. 1-36. Springer LNCS 2374 (2002)
-
(2002)
Springer LNCS
, vol.2374
, pp. 1-36
-
-
Meseguer, J.1
Talcott, C.2
-
49
-
-
12344293529
-
Symbolic reachability analysis using narrowing and it application to verification of cryptographic protocols
-
Martí-Oliet, N, ed, International Workshop on Rewriting Logic and its Application, WRLA'04, of, Elsevier Sciences Publisher
-
Meseguer, .T., Thati, P.: Symbolic reachability analysis using narrowing and it application to verification of cryptographic protocols. In: Martí-Oliet, N. (ed.) International Workshop on Rewriting Logic and its Application, WRLA'04, vol. 117 of Electronic Notes in Theoretical Computer Science, pp. 153-182. Elsevier Sciences Publisher (2004)
-
(2004)
Electronic Notes in Theoretical Computer Science
, vol.117
, pp. 153-182
-
-
Meseguer, T.1
Thati, P.2
-
50
-
-
0027113376
-
Conditional rewriting logic as a unified model of concurrency
-
Meseguer, J.: Conditional rewriting logic as a unified model of concurrency. Theor. Comput. Sci. 96(1), 73-155 (1992)
-
(1992)
Theor. Comput. Sci
, vol.96
, Issue.1
, pp. 73-155
-
-
Meseguer, J.1
-
51
-
-
0002893365
-
A logical theory of concurrent objects and its realization in the Maude language
-
Agha, G, Wegner, P, Yonezawa, A, eds, The MIT Press
-
Meseguer, J.: A logical theory of concurrent objects and its realization in the Maude language. In:Agha, G., Wegner, P., Yonezawa, A. (eds.) Research Directions in Concurrent Object-Oriented Programming, pp. 314-390. The MIT Press (1993)
-
(1993)
Research Directions in Concurrent Object-Oriented Programming
, pp. 314-390
-
-
Meseguer, J.1
-
52
-
-
84957873927
-
Membership algebra as a logical framework for equational specification
-
Parisi-Presicce, F, ed, International Workshop on Algebraic Development Techniques, of, Springer
-
Meseguer, J. Membership algebra as a logical framework for equational specification. In: Parisi-Presicce, F. (ed.) International Workshop on Algebraic Development Techniques, vol. 1376 of Lecture Notes in Computer Science, pp. 18-61. Springer (1998)
-
(1998)
Lecture Notes in Computer Science
, vol.1376
, pp. 18-61
-
-
Meseguer, J.1
-
56
-
-
84955618412
-
On narrowing, refutation proofs and constraints
-
Hsiang, J, ed, 6th International Conference on Rewriting Techniques and Applications
-
Nieuwenhuis, R.: On narrowing, refutation proofs and constraints. In: Hsiang, J. (ed.) 6th International Conference on Rewriting Techniques and Applications, vol. 914, pp. 56-70. Springer LNCS (1995)
-
(1995)
Springer LNCS
, vol.914
, pp. 56-70
-
-
Nieuwenhuis, R.1
-
57
-
-
84947742359
-
Recognizing boolean closed A-tree languages with membership conditional mechanism
-
th International Conference on Rewriting Techniques and Applications, of, Springer
-
th International Conference on Rewriting Techniques and Applications, vol. 2706 of Lecture notes in computer science, pp. 483-498. Springer (2003)
-
(2003)
Lecture notes in computer science
, vol.2706
, pp. 483-498
-
-
Ohsaki, H.1
Seki, H.2
Takai, T.3
-
58
-
-
27844468125
-
-
version 2.4. Computer Science Laboratory, SRI International
-
Owre, S., Shankar, N., Rushby, J., Stringer-Calvert, D.: PVS system guide, PVS language reference, and PVS prover guide version 2.4. Computer Science Laboratory, SRI International (2001)
-
(2001)
PVS system guide, PVS language reference, and PVS prover guide
-
-
Owre, S.1
Shankar, N.2
Rushby, J.3
Stringer-Calvert, D.4
-
59
-
-
34047216113
-
-
Paulson, L.: Isabelle: A Generic Theorem Prover, 828 of Lecture Notes in Computer Science. Springer (1994)
-
Paulson, L.: Isabelle: A Generic Theorem Prover, volume 828 of Lecture Notes in Computer Science. Springer (1994)
-
-
-
-
60
-
-
33745192310
-
Fast Narrowing-Driven Partial Evaluation for Inductively Sequential Systems
-
ACM Press
-
Ramos,.T.G., Silva, J., Vidai, G.: Fast Narrowing-Driven Partial Evaluation for Inductively Sequential Systems. In: Proceedings of the 10th ACM SIGPLAN International Conference on Functional Programming (ICFP 2005), pp. 228-239. ACM Press (2005)
-
(2005)
Proceedings of the 10th ACM SIGPLAN International Conference on Functional Programming (ICFP
, pp. 228-239
-
-
Ramos, T.G.1
Silva, J.2
Vidai, G.3
-
61
-
-
0034822801
-
Protocol insecurity with a finite number of sessions and composed keys is NP-complete
-
Rusinowitch, M., Turuani, M.: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. In: 14th IEEE Computer Security Foundations Workshop, pp. 174-190 (2001)
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 174-190
-
-
Rusinowitch, M.1
Turuani, M.2
-
62
-
-
0002219322
-
An attack on a recursive authentication protocol
-
Ryan, P., Schneider, S.: An attack on a recursive authentication protocol. Inf. Process. Lett. 65, 7-10 (1998)
-
(1998)
Inf. Process. Lett
, vol.65
, pp. 7-10
-
-
Ryan, P.1
Schneider, S.2
-
63
-
-
84957079461
-
Abstract and model check while you prove
-
Halbwachs, N, Peled, D, eds, Computer Aided Verification, 11th International Conference, CAV'99, Trento, Italy, July 6-10, 1999, Proceedings, of, Springer
-
Saïdi, H., Shankar, N.: Abstract and model check while you prove. In: Halbwachs, N., Peled, D. (eds.) Computer Aided Verification, 11th International Conference, CAV'99, Trento, Italy, July 6-10, 1999, Proceedings, vol. 1633 of Lecture Notes in Computer Science, pp. 443-454. Springer (1999)
-
(1999)
Lecture Notes in Computer Science
, vol.1633
, pp. 443-454
-
-
Saïdi, H.1
Shankar, N.2
-
64
-
-
0003060532
-
Programming in equational logic: Beyond strong sequentiality
-
Sekar, R.C., Ramakrishnan, I.V.: Programming in equational logic: Beyond strong sequentiality. Inf. Comput. 104(1), 78-109 (1993)
-
(1993)
Inf. Comput
, vol.104
, Issue.1
, pp. 78-109
-
-
Sekar, R.C.1
Ramakrishnan, I.V.2
-
65
-
-
0009953384
-
Rewriting logic as a unifying framework for Petri nets
-
Unifying Petri Nets, of, Springer
-
Stehr, M.-O., Meseguer, J., Ölveczky, P.: Rewriting logic as a unifying framework for Petri nets. In: Unifying Petri Nets, vol. 2128 of Lecture Notes in Computer Science, pp. 250-303. Springer (2001)
-
(2001)
Lecture Notes in Computer Science
, vol.2128
, pp. 250-303
-
-
Stehr, M.-O.1
Meseguer, J.2
Ölveczky, P.3
-
66
-
-
26944493332
-
Complete symbolic reachability analysis using back-and-forth narrowing
-
Fiadeiro, J.L, Harman, N, Roggenbach, M, Rutten, J, eds, Conference on Algebra and Co-algebra in Computer Science, of, Springer
-
Thati, P., Meseguer, J.: Complete symbolic reachability analysis using back-and-forth narrowing. In: Fiadeiro, J.L., Harman, N., Roggenbach, M., Rutten, J. (eds.) Conference on Algebra and Co-algebra in Computer Science, vol. 3629 of Lecture Notes in Computer Science, pp. 379-394. Springer (2005)
-
(2005)
Lecture Notes in Computer Science
, vol.3629
, pp. 379-394
-
-
Thati, P.1
Meseguer, J.2
-
67
-
-
35048862423
-
A verification technique using term rewriting systems and abstract interpretation
-
Halatsis et al, eds, Proceedings RTA of, Springer
-
Takai, T.: A verification technique using term rewriting systems and abstract interpretation. In: Halatsis et al., (eds.) Proceedings RTA 2004, vol. 3091 of Lecture Notes in Computer Science, pp. 119-133. Springer (2004)
-
(2004)
Lecture Notes in Computer Science
, vol.3091
, pp. 119-133
-
-
Takai, T.1
-
68
-
-
0001111462
-
Rewriting: An effective model of concurrency
-
Halatsis, C, Maritsas, D, Philokyprou, G, Theodoridis, S, eds, PARLE'94 Parallel Architectures and Languages Europe, 6th International PARLE Conference, Athens, Greece, July 4-8, 1994, Proceedings, of, Springer
-
Viry, P.: Rewriting: An effective model of concurrency. In: Halatsis, C., Maritsas, D., Philokyprou, G., Theodoridis, S. (eds.) PARLE'94 Parallel Architectures and Languages Europe, 6th International PARLE Conference, Athens, Greece, July 4-8, 1994, Proceedings, vol. 817 of Lecture Notes in Computer Science, pp. 648-660. Springer (1994)
-
(1994)
Lecture Notes in Computer Science
, vol.817
, pp. 648-660
-
-
Viry, P.1
|