-
2
-
-
57949097882
-
On BAN logics for industrial security protocols
-
Dunin-Keplicz, B, and Nawarecki, E, eds
-
Agray, N.; van der Hoek, W.; and de Vink, E. 2002. On BAN logics for industrial security protocols. In Dunin-Keplicz, B., and Nawarecki, E., eds., Proceedings of CEEMAS 2001, 29-36.
-
(2002)
Proceedings of CEEMAS 2001
, pp. 29-36
-
-
Agray, N.1
van der Hoek, W.2
de Vink, E.3
-
3
-
-
0000128393
-
On the logic of theory change: Partial meet functions for contraction and revision
-
Alchourrón, C.; Gärdenfors, P.; and Makinson, D. 1985. On the logic of theory change: Partial meet functions for contraction and revision. Journal of Symbolic Logic 50(2):510-530.
-
(1985)
Journal of Symbolic Logic
, vol.50
, Issue.2
, pp. 510-530
-
-
Alchourrón, C.1
Gärdenfors, P.2
Makinson, D.3
-
5
-
-
0004215976
-
A logic of authentication
-
Technical Report 39, Digital Systems Research Center
-
Burrows, M.; Abadi, M.; and Needham, R. 1989. A logic of authentication. Technical Report 39, Digital Systems Research Center.
-
(1989)
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
0030712510
-
On the logic of iterated belief revision
-
Darwiche, A., and Pearl, J. 1997. On the logic of iterated belief revision. Artificial Intelligence 89(1-2):1-29.
-
(1997)
Artificial Intelligence
, vol.89
, Issue.1-2
, pp. 1-29
-
-
Darwiche, A.1
Pearl, J.2
-
10
-
-
12244311156
-
Belief Revision: A Critique
-
Friedman, N., and Halpern, J. 1999. Belief Revision: A Critique. In Journal of Logic, Language and Information. 8(4):401-420.
-
(1999)
Journal of Logic, Language and Information
, vol.8
, Issue.4
, pp. 401-420
-
-
Friedman, N.1
Halpern, J.2
-
11
-
-
84880721664
-
Iterated belief change: A transition system approach
-
Hunter, A., and Delgrande, J. 2005. Iterated belief change: A transition system approach. In Proceedings of IJCA105, 460-465.
-
(2005)
Proceedings of IJCA105
, pp. 460-465
-
-
Hunter, A.1
Delgrande, J.2
-
12
-
-
84880202649
-
An Action Description Language for Iterated Belief Change
-
Hunter, A., and Delgrande, J. 2007. An Action Description Language for Iterated Belief Change. In Proceedings of IJCAI07, 2498-2503.
-
(2007)
Proceedings of IJCAI07
, pp. 2498-2503
-
-
Hunter, A.1
Delgrande, J.2
-
13
-
-
36348992684
-
About time, revision, and update
-
Lang, J. 2006. About time, revision, and update. In Proceedings of NMR2006.
-
(2006)
Proceedings of NMR2006
-
-
Lang, J.1
-
14
-
-
84962060059
-
The logic of authentication protocols
-
Focardi, R, and Gorrieri, R, eds, Foundations of Security Analysis and Design, of, Springer-Verlag
-
Syverson, P., and Cervesato, I. 2001. The logic of authentication protocols. In Focardi, R., and Gorrieri, R., eds., Foundations of Security Analysis and Design, volume 2171 of Lecture Notes in Computer Science. Springer-Verlag. 63-136.
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 63-136
-
-
Syverson, P.1
Cervesato, I.2
-
15
-
-
0003527653
-
A unified cryptographic protocol logic
-
Technical Report 5540-227, Naval Research Lab
-
Syverson, P., and van Oorschot, P. 1996. A unified cryptographic protocol logic. Technical Report 5540-227, Naval Research Lab.
-
(1996)
-
-
Syverson, P.1
van Oorschot, P.2
|