-
1
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
2
-
-
0033719708
-
C3PO: A tool for automatic sound cryptographic protocol analysis
-
Cambridge, UK, 3-5 July IEEE Computer Society
-
A. Dekker. C3PO: A tool for automatic sound cryptographic protocol analysis. In Proceedings of the 13th IEEE Computer Security Foundations Workshop, pages 77-87, Cambridge, UK, 3-5 July 2000. IEEE Computer Society.
-
(2000)
Proceedings of the 13th IEEE Computer Security Foundations Workshop
, pp. 77-87
-
-
Dekker, A.1
-
3
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, 11(2003):677-721.
-
Journal of Computer Security
, vol.11
, Issue.2003
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.2
Pavlovic, D.3
-
7
-
-
0004295027
-
-
Oxford University Press, Oxford
-
Dov M. Gabbay. Fibring Logics. Oxford University Press, Oxford, 1999.
-
(1999)
Fibring Logics
-
-
Gabbay, D.M.1
-
8
-
-
0026853865
-
A guide to completeness and complexity for modal logics of knowledge and belief
-
J. Y. Halpern and Y. Moses. A guide to completeness and complexity for modal logics of knowledge and belief. Artificial Intelligence 54, pages 319-379, 1992.
-
(1992)
Artificial Intelligence
, vol.54
, pp. 319-379
-
-
Halpern, J.Y.1
Moses, Y.2
-
10
-
-
84957609297
-
Formal analysis of models for the dynamics of trust based on experiences
-
Multi-Agent System Engineering, Proc. of MAAMAW'99, Springer
-
C. M. Jonker and J. Treur. Formal analysis of models for the dynamics of trust based on experiences. In Multi-Agent System Engineering, Proc. of MAAMAW'99, Lecture Notes in Artificial Intelligence, Vol. 1647, pages 221-231. Springer, 1999.
-
(1999)
Lecture Notes in Artificial Intelligence
, vol.1647
, pp. 221-231
-
-
Jonker, C.M.1
Treur, J.2
-
11
-
-
0003088851
-
Properties of independently axiomatizable bimodal logics
-
M. Kracht and F. Wolter. Properties of independently axiomatizable bimodal logics. The Journal of Symbolic Logic, 56(4):1469-1485, 1991.
-
(1991)
The Journal of Symbolic Logic
, vol.56
, Issue.4
, pp. 1469-1485
-
-
Kracht, M.1
Wolter, F.2
-
12
-
-
0001972488
-
Semantical considerations on modal logic
-
S. Kripke. Semantical considerations on modal logic. Acta Philosophica Fennica, 16:83-94, 1963.
-
(1963)
Acta Philosophica Fennica
, vol.16
, pp. 83-94
-
-
Kripke, S.1
-
13
-
-
84944881195
-
Logical foundations for reasoning about trust in secure digital communication
-
AI2001: Advances in Artificial Intelligence, Springer
-
C. Liu. Logical foundations for reasoning about trust in secure digital communication. In AI2001: Advances in Artificial Intelligence, Lecture Notes in Artificial Intelligence, Vol. 2256, pages 333-344. Springer, 2001.
-
(2001)
Lecture Notes in Artificial Intelligence
, vol.2256
, pp. 333-344
-
-
Liu, C.1
-
14
-
-
0030295687
-
Dealing with multiple granularity of time in temporal logic programming
-
C. Liu and M. A. Orgun. Dealing with multiple granularity of time in temporal logic programming. Journal of Symbolic Computation, 22:699-720, 1996.
-
(1996)
Journal of Symbolic Computation
, vol.22
, pp. 699-720
-
-
Liu, C.1
Orgun, M.A.2
-
15
-
-
84943240165
-
Trust in secure communication systems - The concept, representations, and reasoning techniques
-
AI2002: Advances in Artificial Intelligence, Springer
-
C. Liu and M. A. Ozols. Trust in secure communication systems - the concept, representations, and reasoning techniques. In AI2002: Advances in Artificial Intelligence, Lecture Notes in Artificial Intelligence, Vol. 2257, pages 60-70. Springer, 2002.
-
(2002)
Lecture Notes in Artificial Intelligence
, vol.2257
, pp. 60-70
-
-
Liu, C.1
Ozols, M.A.2
-
16
-
-
84958779525
-
An axiomatic basis for reasoning about trust in PKIs
-
Proceedings of the 6th Australasian Conference on Information Security and Privacy (ACISP 2001), Springer
-
C. Liu, M. A. Ozols, and T. Cant. An axiomatic basis for reasoning about trust in PKIs. In Proceedings of the 6th Australasian Conference on Information Security and Privacy (ACISP 2001), Lecture Notes in Computer Science, Vol. 2119, pages 274-291. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2119
, pp. 274-291
-
-
Liu, C.1
Ozols, M.A.2
Cant, T.3
-
17
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
|