-
1
-
-
85006614284
-
Verifying security protocols as planning in logic programming
-
October
-
L. Carlucci Aiello and F. Massacci. Verifying security protocols as planning in logic programming. ACM Trans. on Computational Logic, 2(4):542-580, October 2001.
-
(2001)
ACM Trans. on Computational Logic
, vol.2
, Issue.4
, pp. 542-580
-
-
Aiello, L.C.1
Massacci, F.2
-
2
-
-
84937567009
-
The AVISS Security Protocols Analysis Tool
-
A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna, S. Moedersheim, M. Rusinowitch, M. Turuani, L. Viganò, and L. Vigneron. The AVISS Security Protocols Analysis Tool. In 14th International Conference on Computer-Aided Verification (CAV'02). 2002.
-
(2002)
14th International Conference on Computer-Aided Verification (CAV'02)
-
-
Armando, A.1
Basin, D.2
Bouallagui, M.3
Chevalier, Y.4
Compagna, L.5
Moedersheim, S.6
Rusinowitch, M.7
Turuani, M.8
Viganò, L.9
Vigneron, L.10
-
3
-
-
35048872633
-
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning
-
Houston, Texas, November 2002. Also presented at the FCS & Verify Workshops, Copenhagen, Denmark, July
-
A. Armando and L. Compagna. Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. In 22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Houston, Texas, November 2002. Also presented at the FCS & Verify Workshops, Copenhagen, Denmark, July 2002.
-
(2002)
22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE)
-
-
Armando, A.1
Compagna, L.2
-
6
-
-
84944319371
-
Symbolic model checking without BDDs
-
W. R. Cleaveland, editor, Tools and Algorithms for the Construction and Analysis of Systems. Part of European Conferences on Theory and Practice of Software, ETAPS'99, Amsterdam, Springer-Verlag
-
Armin Biere, Alessandro Cimatti, Edmund Clarke, and Yunshan Zhu. Symbolic model checking without BDDs. In W. R. Cleaveland, editor, Tools and Algorithms for the Construction and Analysis of Systems. Part of European Conferences on Theory and Practice of Software, ETAPS'99, Amsterdam, volume 1579 of LNCS, pages 193-207. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1579
, pp. 193-207
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.3
Zhu, Y.4
-
8
-
-
0032671775
-
A meta-notation for protocol analysis
-
Iliano Cervesato, N. A. Durgin, Patrick Lincoln, John C. Mitchell, and Andre Scedrov. A meta-notation for protocol analysis. In CSFW, pages 55-69, 1999.
-
(1999)
CSFW
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.3
Mitchell, J.C.4
Scedrov, A.5
-
9
-
-
84944686372
-
A Tool for Lazy Verification of Security Protocols
-
IEEE Computer Society Press, Long version available as Technical Report A01-R-140, LORIA, Nancy (France)
-
Y. Chevalier and L. Vigneron. A Tool for Lazy Verification of Security Protocols. In Proceedings of the Automated Software Engineering Conference (ASE'01). IEEE Computer Society Press, 2001. Long version available as Technical Report A01-R-140, LORIA, Nancy (France).
-
(2001)
Proceedings of the Automated Software Engineering Conference (ASE'01)
-
-
Chevalier, Y.1
Vigneron, L.2
-
11
-
-
0010311743
-
Investigating the effect of relevance and reachability constraints on SAT encodings of planning
-
Minh Binh Do, Biplav Srivastava, and Subbarao Kambhampati. Investigating the effect of relevance and reachability constraints on SAT encodings of planning. In Artificial Intelligence Planning Systems, pages 308-314, 2000.
-
(2000)
Artificial Intelligence Planning Systems
, pp. 308-314
-
-
Do, M.B.1
Srivastava, B.2
Kambhampati, S.3
-
14
-
-
84880695707
-
Automatic SAT-compilation of planning problems
-
Morgan Kaufmann Publishers, San Francisco
-
Michael D. Ernst, Todd D. Millstein, and Daniel S. Weld. Automatic SAT-compilation of planning problems. In Proceedings of the 15th International Joint Conference on Artificial Intelligence (IJCA1-97), pages 1169-1177. Morgan Kaufmann Publishers, San Francisco, 1997.
-
(1997)
Proceedings of the 15th International Joint Conference on Artificial Intelligence (IJCA1-97)
, pp. 1169-1177
-
-
Ernst, M.D.1
Millstein, T.D.2
Weld, D.S.3
-
15
-
-
84867787499
-
Evaluating search heuristics and optimization techniques in propositional satisfiability
-
Proceedings of IJCAR'2001, Springer-Verlag, Heidelberg
-
E. Giunchiglia, M. Maratea, A. Tacchella, and D. Zambonin. Evaluating search heuristics and optimization techniques in propositional satisfiability. In Proceedings of IJCAR'2001, LNAI 2083, pages 347-363. Springer-Verlag, Heidelberg, 2001.
-
(2001)
LNAI
, vol.2083
, pp. 347-363
-
-
Giunchiglia, E.1
Maratea, M.2
Tacchella, A.3
Zambonin, D.4
-
17
-
-
84956860311
-
Compiling and Verifying Security Protocols
-
M. Parigot and A. Voronkov, editors, Proceedings of LPAR 2000, Springer-Verlag, Heidelberg
-
Florent Jacquemard, Michael Rusinowitch, and Laurent Vigneron. Compiling and Verifying Security Protocols. In M. Parigot and A. Voronkov, editors, Proceedings of LPAR 2000, LNCS 1955, pages 131-160. Springer-Verlag, Heidelberg, 2000.
-
(2000)
LNCS
, vol.1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
18
-
-
0001793083
-
Encoding plans in propositional logic
-
Morgan Kaufmann, San Francisco, California
-
Henry Kautz, David McAllester, and Bart Selman. Encoding plans in propositional logic. In KR '96: Principles of Knowledge Representation and Reasoning, pages 374-384. Morgan Kaufmann, San Francisco, California, 1996.
-
(1996)
KR '96: Principles of Knowledge Representation and Reasoning
, pp. 374-384
-
-
Kautz, H.1
McAllester, D.2
Selman, B.3
-
20
-
-
0342658605
-
Breaking and fixing the Needham-Shroeder public-key protocol using FDR
-
Springer-Verlag
-
G. Lowe. Breaking and fixing the Needham-Shroeder public-key protocol using FDR. In Proceedings of TACAS'96, pages 147-166. Springer-Verlag, 1996.
-
(1996)
Proceedings of TACAS'96
, pp. 147-166
-
-
Lowe, G.1
-
23
-
-
14044269417
-
-
Technical Report CSL-78-4, Xerox Palo Alto Research Center, Palo Alto, CA, USA, Reprinted June
-
R. M. (Roger Michael) Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Technical Report CSL-78-4, Xerox Palo Alto Research Center, Palo Alto, CA, USA, 1978. Reprinted June 1982.
-
(1978)
Using Encryption for Authentication in Large Networks of Computers
-
-
Needham, R.M.1
Schroeder, M.D.2
-
24
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
IEEE Computer Society Press
-
D. Song. Athena: A new efficient automatic checker for security protocol analysis. In Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW '99), pages 192-202. IEEE Computer Society Press, 1999.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW '99)
, pp. 192-202
-
-
Song, D.1
-
25
-
-
0032633177
-
Recent advances in AI planning
-
Daniel S. Weld. Recent advances in AI planning. AI Magazine, 20(2):93-123, 1999.
-
(1999)
AI Magazine
, vol.20
, Issue.2
, pp. 93-123
-
-
Weld, D.S.1
-
26
-
-
84937410369
-
SATO: An efficient prepositional prover
-
William McCune, editor, Proceedings of CADE 14, Springer-Verlag, Heidelberg
-
H. Zhang. SATO: An efficient prepositional prover. In William McCune, editor, Proceedings of CADE 14, LNAI 1249, pages 272-275. Springer-Verlag, Heidelberg, 1997.
-
(1997)
LNAI
, vol.1249
, pp. 272-275
-
-
Zhang, H.1
|