메뉴 건너뛰기




Volumn 1, Issue , 2007, Pages 427-433

Belief change and cryptographic protocol verification

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; HOSTILE ENVIRONMENTS; MONOTONIE LOGIC; STRUCTURED SEQUENCES;

EID: 36348951490     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (15)
  • 2
    • 57949097882 scopus 로고    scopus 로고
    • On BAN logics for industrial security protocols
    • Dunin-Keplicz, B, and Nawarecki, E, eds
    • Agray, N.; van der Hoek, W.; and de Vink, E. 2002. On BAN logics for industrial security protocols. In Dunin-Keplicz, B., and Nawarecki, E., eds., Proceedings of CEEMAS 2001, 29-36.
    • (2002) Proceedings of CEEMAS 2001 , pp. 29-36
    • Agray, N.1    van der Hoek, W.2    de Vink, E.3
  • 3
    • 0000128393 scopus 로고
    • On the logic of theory change: Partial meet functions for contraction and revision
    • Alchourrón, C.; Gärdenfors, P.; and Makinson, D. 1985. On the logic of theory change: Partial meet functions for contraction and revision. Journal of Symbolic Logic 50(2):510-530.
    • (1985) Journal of Symbolic Logic , vol.50 , Issue.2 , pp. 510-530
    • Alchourrón, C.1    Gärdenfors, P.2    Makinson, D.3
  • 5
    • 0004215976 scopus 로고
    • A logic of authentication
    • Technical Report 39, Digital Systems Research Center
    • Burrows, M.; Abadi, M.; and Needham, R. 1989. A logic of authentication. Technical Report 39, Digital Systems Research Center.
    • (1989)
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 7
    • 0030712510 scopus 로고    scopus 로고
    • On the logic of iterated belief revision
    • Darwiche, A., and Pearl, J. 1997. On the logic of iterated belief revision. Artificial Intelligence 89(1-2):1-29.
    • (1997) Artificial Intelligence , vol.89 , Issue.1-2 , pp. 1-29
    • Darwiche, A.1    Pearl, J.2
  • 11
    • 84880721664 scopus 로고    scopus 로고
    • Iterated belief change: A transition system approach
    • Hunter, A., and Delgrande, J. 2005. Iterated belief change: A transition system approach. In Proceedings of IJCA105, 460-465.
    • (2005) Proceedings of IJCA105 , pp. 460-465
    • Hunter, A.1    Delgrande, J.2
  • 12
    • 84880202649 scopus 로고    scopus 로고
    • An Action Description Language for Iterated Belief Change
    • Hunter, A., and Delgrande, J. 2007. An Action Description Language for Iterated Belief Change. In Proceedings of IJCAI07, 2498-2503.
    • (2007) Proceedings of IJCAI07 , pp. 2498-2503
    • Hunter, A.1    Delgrande, J.2
  • 13
    • 36348992684 scopus 로고    scopus 로고
    • About time, revision, and update
    • Lang, J. 2006. About time, revision, and update. In Proceedings of NMR2006.
    • (2006) Proceedings of NMR2006
    • Lang, J.1
  • 14
    • 84962060059 scopus 로고    scopus 로고
    • The logic of authentication protocols
    • Focardi, R, and Gorrieri, R, eds, Foundations of Security Analysis and Design, of, Springer-Verlag
    • Syverson, P., and Cervesato, I. 2001. The logic of authentication protocols. In Focardi, R., and Gorrieri, R., eds., Foundations of Security Analysis and Design, volume 2171 of Lecture Notes in Computer Science. Springer-Verlag. 63-136.
    • (2001) Lecture Notes in Computer Science , vol.2171 , pp. 63-136
    • Syverson, P.1    Cervesato, I.2
  • 15
    • 0003527653 scopus 로고    scopus 로고
    • A unified cryptographic protocol logic
    • Technical Report 5540-227, Naval Research Lab
    • Syverson, P., and van Oorschot, P. 1996. A unified cryptographic protocol logic. Technical Report 5540-227, Naval Research Lab.
    • (1996)
    • Syverson, P.1    van Oorschot, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.