메뉴 건너뛰기




Volumn 5753 LNAI, Issue , 2009, Pages 355-367

A general approach to the verification of cryptographic protocols using answer set programming

Author keywords

[No Author keywords available]

Indexed keywords

ANSWER SET; ANSWER SET PROGRAMMING; AUTOMATED PROCESS; CRYPTOGRAPHIC PROTOCOL VERIFICATION; CRYPTOGRAPHIC PROTOCOLS; EXECUTABLE PROGRAMS; EXTENDED LOGIC; GENERAL APPROACH; INTRUDER MODELS; LOGIC PROGRAMS; PROTOCOL SPECIFICATIONS; PROTOCOL VERIFICATION;

EID: 70349883942     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04238-6_30     Document Type: Conference Paper
Times cited : (4)

References (16)
  • 1
    • 85006614284 scopus 로고    scopus 로고
    • Verifying security protocols as planning in logic programming
    • Aiello, L.C., Massacci, F.: Verifying security protocols as planning in logic programming. ACM Trans. Comput. Logic 2(4), 542-580 (2001)
    • (2001) ACM Trans. Comput. Logic , vol.2 , Issue.4 , pp. 542-580
    • Aiello, L.C.1    Massacci, F.2
  • 2
    • 33746592815 scopus 로고    scopus 로고
    • Security protocols verification in abductive logic programming: A case study
    • Dikenelli, O., Gleizes, M.-P., Ricci, A. (eds.) ESAW 2005. Springer, Heidelberg, 5 The prototype is available for download from
    • Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Security protocols verification in abductive logic programming: A case study. In: Dikenelli, O., Gleizes, M.-P., Ricci, A. (eds.) ESAW 2005. LNCS (LNAI), vol.3963, pp. 106-124. Springer, Heidelberg (2006) 5 The prototype is available for download from http://www.cs.sfu.ca/cl/software/ASP.SP/
    • (2006) LNCS (LNAI) , vol.3963 , pp. 106-124
    • Alberti, M.1    Chesani, F.2    Gavanelli, M.3    Lamma, E.4    Mello, P.5    Torroni, P.6
  • 3
    • 70349858453 scopus 로고    scopus 로고
    • Baral, C., Brewka, G., Schlipf, J. (eds.):LPNMR 2007. Springer, Heidelberg
    • Baral, C., Brewka, G., Schlipf, J. (eds.): LPNMR 2007. LNCS (LNAI), vol.4483. Springer, Heidelberg (2007)
    • (2007) LNCS (LNAI) , vol.4483
  • 8
    • 58549109284 scopus 로고    scopus 로고
    • Engineering an incremental ASP solver
    • Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. Springer, Heidelberg
    • Gebser, M., Kaminski, R., Kaufmann, B., Ostrowski, M., Schaub, T., Thiele, S.: Engineering an incremental ASP solver. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol.5366, pp. 190-205. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5366 , pp. 190-205
    • Gebser, M.1    Kaminski, R.2    Kaufmann, B.3    Ostrowski, M.4    Schaub, T.5    Thiele, S.6
  • 13
    • 70349871895 scopus 로고    scopus 로고
    • Published in Spanish as: Especificacíon formal de protocolos criptogŕaficos en Ćalculo de Situaciones, Novatica, 2000
    • Herńandez-Orallo, J., Pinto, J.: Formal modelling of cryptographic protocols in situation calculus (Published in Spanish as: Especificacíon formal de protocolos criptogŕaficos en Ćalculo de Situaciones, Novatica, 143, pp. 57-63, 2000) (1997)
    • (1997) Formal Modelling of Cryptographic Protocols in Situation Calculus , vol.143 , pp. 57-63
    • Herńandez-Orallo, J.1    Pinto, J.2
  • 15
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems
    • Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.1055, pp. 147-166. Springer, Heidelberg (1996) (Pubitemid 126050413)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1055 , pp. 147-166
    • Lowe, G.1
  • 16
    • 44649158296 scopus 로고    scopus 로고
    • A logic programming based framework for security protocol verification
    • An, A., Matwin, S., Ras, Z.W., Slezak, D. (eds.) Foundations of Intelligent Systems. Springer, Heidelberg
    • Wang, S., Zhang, Y.: A logic programming based framework for security protocol verification. In: An, A., Matwin, S., Ras, Z.W., Slezak, D. (eds.) Foundations of Intelligent Systems. LNCS (LNAI), vol.4994, pp. 638-643. Springer, Heidelberg (2008)
    • (2008) LNCS (LNAI) , vol.4994 , pp. 638-643
    • Wang, S.1    Zhang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.