-
1
-
-
0042908709
-
Alternating-time temporal logic
-
R. Alur, T. A. Henzinger, and O. Kupferman. Alternating-time temporal logic. Journal of the ACM, 49(5):672-713, 2002.
-
(2002)
Journal of the ACM
, vol.49
, Issue.5
, pp. 672-713
-
-
Alur, R.1
Henzinger, T.A.2
Kupferman, O.3
-
2
-
-
35048888740
-
Proving correctness of the basic TESLA multicast stream authentication protocol with TAME
-
M. Archer. Proving correctness of the basic TESLA multicast stream authentication protocol with TAME. In Proceedings of Workshop on Issues in the Theory of Security, 2002.
-
(2002)
Proceedings of Workshop on Issues in the Theory of Security
-
-
Archer, M.1
-
3
-
-
26444497860
-
The Avispa tool for the automated validation of internet security protocols and applications
-
Edinburgh, Scotland, UK, July
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Héam, J. Mantovani, S. Moedersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The Avispa tool for the automated validation of internet security protocols and applications. In CAV 2005, 17th Int. Conf. on Computer Aided Verification, Edinburgh, Scotland, UK, July 2005.
-
(2005)
CAV 2005, 17th Int. Conf. on Computer Aided Verification
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Hankes Drielsma, P.7
Héam, P.-C.8
Mantovani, J.9
Moedersheim, S.10
von Oheimb, D.11
Rusinowitch, M.12
Santiago, J.13
Turuani, M.14
Viganò, L.15
Vigneron, L.16
-
5
-
-
0022769976
-
Graph-based algorithms for boolean function manipulation
-
R. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Transaction on Computers, 35(8):677-691, 1986.
-
(1986)
IEEE Transaction on Computers
, vol.35
, Issue.8
, pp. 677-691
-
-
Bryant, R.1
-
6
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
0003962322
-
-
The MIT Press, Cambridge, Massachusetts
-
E. M. Clarke, O. Grumberg, and D. A. Peled. Model Checking. The MIT Press, Cambridge, Massachusetts, 1999.
-
(1999)
Model Checking
-
-
Clarke, E.M.1
Grumberg, O.2
Peled, D.A.3
-
8
-
-
0003730235
-
-
MIT Press, Cambridge
-
R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi. Reasoning about Knowledge. MIT Press, Cambridge, 1995.
-
(1995)
Reasoning about Knowledge
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
9
-
-
33747046805
-
MCK: Model checking the logic of knowledge
-
Proceedings of 16th International Conference on Computer Aided Verification CAV'04, of, Springer-Verlag
-
P. Gammie and R. van der Meyden. MCK: Model checking the logic of knowledge. In Proceedings of 16th International Conference on Computer Aided Verification (CAV'04), volume 3114 of LNCS, pages 479-483. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3114
, pp. 479-483
-
-
Gammie, P.1
van der Meyden, R.2
-
10
-
-
3142662048
-
Complete axiomatisations for reasoning about knowledge and time
-
J. Halpern, R. van der Meyden, and M. Y. Vardi. Complete axiomatisations for reasoning about knowledge and time. SIAM Journal on Computing, 33(3):674-703, 2003.
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.3
, pp. 674-703
-
-
Halpern, J.1
van der Meyden, R.2
Vardi, M.Y.3
-
11
-
-
35248868917
-
Modeling Adversaries in a Logic for Security Protocol Analysis
-
Proceedings of the Workshop on Formal Aspects of Security FASec'02, of, Springer-Verlag
-
J. Y. Halpern and R. Pucella. Modeling Adversaries in a Logic for Security Protocol Analysis. In Proceedings of the Workshop on Formal Aspects of Security (FASec'02), volume 2629 of LNCS, pages 115-132. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2629
, pp. 115-132
-
-
Halpern, J.Y.1
Pucella, R.2
-
12
-
-
33747048946
-
-
M. Kacprzak, A. Lomuscio, A. Niewiadomski, W. Penczek, F. Raimondi, and M. Szreter. Comparing BDD and SAT based techniques for model checking Chaum's dining cryptographers protocol. Fundamenta Informaticae, 63(2,3):221-240, 2006.
-
M. Kacprzak, A. Lomuscio, A. Niewiadomski, W. Penczek, F. Raimondi, and M. Szreter. Comparing BDD and SAT based techniques for model checking Chaum's dining cryptographers protocol. Fundamenta Informaticae, 63(2,3):221-240, 2006.
-
-
-
-
13
-
-
33745782313
-
MCMAS: A model checker for multi-agent systems
-
H. Hermanns and J. Palsberg, editors, Vienna, Springer Verlag, March
-
A. Lomuscio and F. Raimondi. MCMAS: A model checker for multi-agent systems. In H. Hermanns and J. Palsberg, editors, Proceedings of TACAS 2006, Vienna, volume 3920, pages 450-454. Springer Verlag, March 2006.
-
(2006)
Proceedings of TACAS
, vol.3920
, pp. 450-454
-
-
Lomuscio, A.1
Raimondi, F.2
-
14
-
-
0038812256
-
Deontic interpreted systems
-
A. Lomuscio and M. Sergot. Deontic interpreted systems. Studia Logica, 75(1):63-92, 2003.
-
(2003)
Studia Logica
, vol.75
, Issue.1
, pp. 63-92
-
-
Lomuscio, A.1
Sergot, M.2
-
15
-
-
33745764348
-
A combination of explicit and deductive knowledge with branching time: Completeness and decidability results
-
Matteo Baldoni, Ulle Endriss, Andrea Omicini, and Paolo Torroni, editors, Declarative Agent Languages and Technologies III: Third International Workshop, DALT, Utrecht, The Netherlands, July 25, Selected and Revised Papers, of, Springer Berlin/Heidelberg, 2006
-
A. Lomuscio and B. Woźna. A combination of explicit and deductive knowledge with branching time: completeness and decidability results. In Matteo Baldoni, Ulle Endriss, Andrea Omicini, and Paolo Torroni, editors, Declarative Agent Languages and Technologies III: Third International Workshop, DALT 2005, Utrecht, The Netherlands, July 25, 2005, Selected and Revised Papers, volume 3904 of LNAI, pages 188-204. Springer Berlin/Heidelberg, 2006.
-
(2005)
LNAI
, vol.3904
, pp. 188-204
-
-
Lomuscio, A.1
Woźna, B.2
-
17
-
-
34247215146
-
A complete and decidable security-specialised logic and its application to the tesla protocol
-
Peter Stone and Gerhard Weiss, editors, Hakodake, Japan, ACM Press
-
A. Lomuscio and B. Woźna. A complete and decidable security-specialised logic and its application to the tesla protocol. In Peter Stone and Gerhard Weiss, editors, Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems (AAMAS'06), pages 145-152, Hakodake, Japan, 2006. ACM Press.
-
(2006)
Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems (AAMAS'06)
, pp. 145-152
-
-
Lomuscio, A.1
Woźna, B.2
-
18
-
-
0028014172
-
Axioms for knowledge and time in distributed systems with perfect recall
-
Paris, France, IEEE Computer Society Press
-
R. van der Meyden. Axioms for knowledge and time in distributed systems with perfect recall. In Proceedings, Ninth Annual IEEE Symposium on Logic in Computer Science, pages 448-457, Paris, France, 1994. IEEE Computer Society Press.
-
(1994)
Proceedings, Ninth Annual IEEE Symposium on Logic in Computer Science
, pp. 448-457
-
-
van der Meyden, R.1
-
19
-
-
0037797779
-
Complete axiomatizations for reasoning about knowledge and branching time
-
R. van der Meyden and K. Wong. Complete axiomatizations for reasoning about knowledge and branching time. Studia Logica, 75(1):93-123,2003.
-
(2003)
Studia Logica
, vol.75
, Issue.1
, pp. 93-123
-
-
van der Meyden, R.1
Wong, K.2
-
21
-
-
34548654003
-
-
W. Nabialek, A. Niewiadomski, W. Penczek, A. Pólrola, and M. Szreter. Venes 2004: A model checker for real time and multi-agent systems. In Proceedings of the International Workshop on Concurrency, Specification and Programming (CS&P'04), 170 of Informatik-Berichte, pages 88-99. Humboldt University, 2004.
-
W. Nabialek, A. Niewiadomski, W. Penczek, A. Pólrola, and M. Szreter. Venes 2004: A model checker for real time and multi-agent systems. In Proceedings of the International Workshop on Concurrency, Specification and Programming (CS&P'04), volume 170 of Informatik-Berichte, pages 88-99. Humboldt University, 2004.
-
-
-
-
22
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
May
-
A. Perrig, R. Canetti, J. D. Tygar, and Dawn X. Song. Efficient authentication and signing of multicast streams over lossy channels. In IEEE Symposium on Security and Privacy, pages 56-73, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.X.4
-
23
-
-
34548649073
-
-
R. Pucella. Deductive Algorithmic Knowledge. In Proceedings of the 8th International Symposium on Artificial Intelligence and Mathematics (SAIM'04), Online Proceedings: AI&M 22-2004, 2004.
-
R. Pucella. Deductive Algorithmic Knowledge. In Proceedings of the 8th International Symposium on Artificial Intelligence and Mathematics (SAIM'04), Online Proceedings: AI&M 22-2004, 2004.
-
-
-
-
25
-
-
34548647121
-
-
F. Raimondi and A. Lomuscio. http://www.cs.ucl.ac.uk/staff/f.raimondi/ MCMAS/, 2006.
-
F. Raimondi and A. Lomuscio. http://www.cs.ucl.ac.uk/staff/f.raimondi/ MCMAS/, 2006.
-
-
-
-
26
-
-
34247126144
-
Automatic verification of multi-agent systems by model checking via OBDDs
-
To appear in Special issue on Logic-based agent verification
-
F. Raimondi and A. Lomuscio. Automatic verification of multi-agent systems by model checking via OBDDs. Journal of Applied Logic, 2007. To appear in Special issue on Logic-based agent verification.
-
(2007)
Journal of Applied Logic
-
-
Raimondi, F.1
Lomuscio, A.2
|