-
1
-
-
85006614284
-
Verifying security protocols as planning in logic programming
-
L. Carlucci Aiello and F. Massacci. Verifying security protocols as planning in logic programming. ACM Trans, on Computational Logic, 2(4):542-580, 2001.
-
(2001)
ACM Trans, on Computational Logic
, vol.2
, Issue.4
, pp. 542-580
-
-
Carlucci Aiello, L.1
Massacci, F.2
-
2
-
-
84937567009
-
The AVISS Security Protocols Analysis Tool
-
A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna, S. Moedersheim, M. Rusinowitch, M. Turuani, L. Viganò, and L. Vigneron. The AVISS Security Protocols Analysis Tool. In Proc. CAV'02. 2002.
-
(2002)
Proc. CAV'02
-
-
Armando, A.1
Basin, D.2
Bouallagui, M.3
Chevalier, Y.4
Compagna, L.5
Moedersheim, S.6
Rusinowitch, M.7
Turuani, M.8
Viganò, L.9
Vigneron, L.10
-
5
-
-
0009956081
-
Maude versus haskell: An experimental comparison in security protocol analysis
-
Kokichi Futatsugi, editor, Elsevier Science Publishers
-
David Basin and Grit Denker. Maude versus haskell: an experimental comparison in security protocol analysis. In Kokichi Futatsugi, editor, Electronic Notes in Theoretical Computer Science, volume 36. Elsevier Science Publishers, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.36
-
-
Basin, D.1
Denker, G.2
-
13
-
-
0027708548
-
Experimental results on the crossover point in satisfiability problems
-
Richard Fikes and Wendy Lehnert, editors, California, AAAI Press
-
James M. Crawford and L. D. Anton. Experimental results on the crossover point in satisfiability problems. In Richard Fikes and Wendy Lehnert, editors, Proceedings of the 11th AAAI Conference, pages 21-27, California, 1993. AAAI Press.
-
(1993)
Proceedings of the 11th AAAI Conference
, pp. 21-27
-
-
Crawford, J.M.1
Anton, L.D.2
-
14
-
-
0003902378
-
The CAPSL Integrated Protocol Environment
-
SRI International, Menlo Park, CA, October
-
Grit Denker, Jonathan Millen, and Harald Rueß. The CAPSL Integrated Protocol Environment. Technical Report SRI-CSL-2000-02, SRI International, Menlo Park, CA, October 2000. Available at http://www.csl.sri.com/~millen/capsl/ .
-
(2000)
Technical Report
, vol.SRI-CSL-2000-02
-
-
Denker, G.1
Millen, J.2
Rueß, H.3
-
17
-
-
84880695707
-
Automatic SAT-compilation of planning problems
-
Morgan Kaufmann Publishers, San Francisco
-
Michael D. Ernst, Todd D. Millstein, and Daniel S. Weld. Automatic SAT-compilation of planning problems. In Proceedings of the 15th International Joint Conference on Artificial Intelligence (IJCAI-97), pages 1169-1177. Morgan Kaufmann Publishers, San Francisco, 1997.
-
(1997)
Proceedings of the 15th International Joint Conference on Artificial Intelligence (IJCAI-97)
, pp. 1169-1177
-
-
Ernst, M.D.1
Millstein, T.D.2
Weld, D.S.3
-
18
-
-
84867787499
-
Evaluating search heuristics and optimization techniques in propositional satisfiability
-
Springer-Verlag
-
E. Giunchiglia, M. Maratea, A. Tacchella, and D. Zambonin. Evaluating search heuristics and optimization techniques in propositional satisfiability. In Proceedings of IJCAR'2001, pages 347-363. Springer-Verlag, 2001.
-
(2001)
Proceedings of IJCAR'2001
, pp. 347-363
-
-
Giunchiglia, E.1
Maratea, M.2
Tacchella, A.3
Zambonin, D.4
-
20
-
-
84956860311
-
Compiling and Verifying Security Protocols
-
M. Parigot and A. Voronkov, editors, LNCS 1955, Springer-Verlag, Heidelberg
-
Florent Jacquemard, Michael Rusinowitch, and Laurent Vigneron. Compiling and Verifying Security Protocols. In M. Parigot and A. Voronkov, editors, Proceedings of LPAR 2000, LNCS 1955, pages 131-160. Springer-Verlag, Heidelberg, 2000.
-
(2000)
Proceedings of LPAR 2000
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
21
-
-
0001793083
-
Encoding plans in propositional logic
-
Morgan Kaufmann, San Francisco, California
-
Henry Kautz, David McAllester, and Bart Selman. Encoding plans in propositional logic. In KR '96: Principles of Knowledge Representation and Reasoning, pages 374-384. Morgan Kaufmann, San Francisco, California, 1996.
-
(1996)
KR '96: Principles of Knowledge Representation and Reasoning
, pp. 374-384
-
-
Kautz, H.1
McAllester, D.2
Selman, B.3
-
22
-
-
0342658605
-
Breaking and fixing the Needham-Shroeder public-key protocol using FDR
-
Springer-Verlag
-
G. Lowe. Breaking and fixing the Needham-Shroeder public-key protocol using FDR. In Proceedings of TACAS'96, pages 147-166. Springer-Verlag, 1996.
-
(1996)
Proceedings of TACAS'96
, pp. 147-166
-
-
Lowe, G.1
-
23
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Gawin Lowe. Casper: a compiler for the analysis of security protocols. Journal of Computer Security, 6(1):53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 53-84
-
-
Lowe, G.1
-
25
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Catherine Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
28
-
-
14044269417
-
Using encryption for authentication in large networks of computers
-
Xerox Palo Alto Research Center, Palo Alto, CA, USA, 1978. Reprinted June
-
R. M. (Roger Michael) Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Technical Report CSL-78-4, Xerox Palo Alto Research Center, Palo Alto, CA, USA, 1978. Reprinted June 1982.
-
(1982)
Technical Report
, vol.CSL-78-4
-
-
Needham, R.M.1
Schroeder, M.D.2
-
29
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.C.1
-
31
-
-
84937410369
-
SATO: An efficient propositional prover
-
William McCune, editor, LNAI 1249, Springer-Verlag
-
H. Zhang. SATO: An efficient propositional prover. In William McCune, editor, Proceedings of CADE 14, LNAI 1249, pages 272-275. Springer-Verlag, 1997.
-
(1997)
Proceedings of CADE
, vol.14
, pp. 272-275
-
-
Zhang, H.1
|