-
1
-
-
85006614284
-
Verifying security protocols as planning in logic programming
-
Aiello, L.C., Massacci, F.: Verifying security protocols as planning in logic programming. ACM Trans. Comput. Logic 2(4), 542-580 (2001)
-
(2001)
ACM Trans. Comput. Logic
, vol.2
, Issue.4
, pp. 542-580
-
-
Aiello, L.C.1
Massacci, F.2
-
2
-
-
33746592815
-
Security protocols verification in abductive logic programming: A case study
-
Dikenelli, O., Gleizes, M.-P., Ricci, A. (eds.) ESAW 2005. Springer, Heidelberg, 5 The prototype is available for download from
-
Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Security protocols verification in abductive logic programming: A case study. In: Dikenelli, O., Gleizes, M.-P., Ricci, A. (eds.) ESAW 2005. LNCS (LNAI), vol.3963, pp. 106-124. Springer, Heidelberg (2006) 5 The prototype is available for download from http://www.cs.sfu.ca/cl/software/ASP.SP/
-
(2006)
LNCS (LNAI)
, vol.3963
, pp. 106-124
-
-
Alberti, M.1
Chesani, F.2
Gavanelli, M.3
Lamma, E.4
Mello, P.5
Torroni, P.6
-
3
-
-
70349858453
-
-
Baral, C., Brewka, G., Schlipf, J. (eds.):LPNMR 2007. Springer, Heidelberg
-
Baral, C., Brewka, G., Schlipf, J. (eds.): LPNMR 2007. LNCS (LNAI), vol.4483. Springer, Heidelberg (2007)
-
(2007)
LNCS (LNAI)
, vol.4483
-
-
-
4
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18-36 (1990)
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
0003730235
-
-
MIT Press, Cambridge
-
Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning about Knowledge. MIT Press, Cambridge (1995)
-
(1995)
Reasoning about Knowledge
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
8
-
-
58549109284
-
Engineering an incremental ASP solver
-
Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. Springer, Heidelberg
-
Gebser, M., Kaminski, R., Kaufmann, B., Ostrowski, M., Schaub, T., Thiele, S.: Engineering an incremental ASP solver. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol.5366, pp. 190-205. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5366
, pp. 190-205
-
-
Gebser, M.1
Kaminski, R.2
Kaufmann, B.3
Ostrowski, M.4
Schaub, T.5
Thiele, S.6
-
9
-
-
38049060388
-
-
Baral et al [3]
-
Gebser, M., Kaufmann, B., Neumann, A., Schaub, T.: clasp: A conflict-driven answer set solver. In: Baral et al [3], pp. 260-265
-
Clasp: A Conflict-driven Answer Set Solver
, pp. 260-265
-
-
Gebser, M.1
Kaufmann, B.2
Neumann, A.3
Schaub, T.4
-
10
-
-
38049073750
-
-
Baral et al [3]
-
Gebser, M., Schaub, T., Thiele, S.: Gringo: A new grounder for answer set programming. In: Baral et al [3], pp. 266-271
-
Gringo: A New Grounder for Answer Set Programming
, pp. 266-271
-
-
Gebser, M.1
Schaub, T.2
Thiele, S.3
-
13
-
-
70349871895
-
-
Published in Spanish as: Especificacíon formal de protocolos criptogŕaficos en Ćalculo de Situaciones, Novatica, 2000
-
Herńandez-Orallo, J., Pinto, J.: Formal modelling of cryptographic protocols in situation calculus (Published in Spanish as: Especificacíon formal de protocolos criptogŕaficos en Ćalculo de Situaciones, Novatica, 143, pp. 57-63, 2000) (1997)
-
(1997)
Formal Modelling of Cryptographic Protocols in Situation Calculus
, vol.143
, pp. 57-63
-
-
Herńandez-Orallo, J.1
Pinto, J.2
-
14
-
-
0003328437
-
Foundations for the situation calculus
-
Levesque, H.J., Pirri, F., Reiter, R.: Foundations for the situation calculus. LinkÖping Electronic Articles in Computer and Information Science 3(18) (1998)
-
(1998)
Linköping Electronic Articles in Computer and Information Science
, vol.3
, Issue.18
-
-
Levesque, H.J.1
Pirri, F.2
Reiter, R.3
-
15
-
-
0342658605
-
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems
-
Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.1055, pp. 147-166. Springer, Heidelberg (1996) (Pubitemid 126050413)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1055
, pp. 147-166
-
-
Lowe, G.1
-
16
-
-
44649158296
-
A logic programming based framework for security protocol verification
-
An, A., Matwin, S., Ras, Z.W., Slezak, D. (eds.) Foundations of Intelligent Systems. Springer, Heidelberg
-
Wang, S., Zhang, Y.: A logic programming based framework for security protocol verification. In: An, A., Matwin, S., Ras, Z.W., Slezak, D. (eds.) Foundations of Intelligent Systems. LNCS (LNAI), vol.4994, pp. 638-643. Springer, Heidelberg (2008)
-
(2008)
LNCS (LNAI)
, vol.4994
, pp. 638-643
-
-
Wang, S.1
Zhang, Y.2
|