-
1
-
-
35048822401
-
Deciding knowledge in security protocols under equational theories
-
Abadi, M., & Cortier, V. (2004). Deciding knowledge in security protocols under equational theories. In ICALP04, LNCS (Vol. 3142, pp. 46-58).
-
(2004)
ICALP04, LNCS
, vol.3142
, pp. 46-58
-
-
Abadi, M.1
Cortier, V.2
-
2
-
-
17644411480
-
Mobile values, new names, and secure communication. In
-
Abadi, M., & Fournet, C. (2001). Mobile values, new names, and secure communication. In POPL'01 (pp. 104-115).
-
(2001)
POPL'01
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
Abadi, M., & Rogaway, P. (2002). Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2), 103-127.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
85031620050
-
A semantics for a logic of authentication (extended abstract)
-
New York, NY, USA
-
Abadi, M., & Tuttle, M. R. (1991). A semantics for a logic of authentication (extended abstract). In PODC'91 (pp. 201-216). New York, NY, USA.
-
(1991)
PODC'91
, pp. 201-216
-
-
Abadi, M.1
Tuttle, M.R.2
-
5
-
-
19144367628
-
Towards an awareness-based semantics for security protocol analysis
-
Accorsi, R., Basin, D., & Vigano, L. (2001). Towards an awareness-based semantics for security protocol analysis. In Logical aspects of cryptographic protocol verification, ENTCS (Vol. 55, pp. 5-24).
-
(2001)
Logical Aspects of Cryptographic Protocol Verification, ENTCS
, vol.55
, pp. 5-24
-
-
Accorsi, R.1
Basin, D.2
Vigano, L.3
-
6
-
-
33646178489
-
Mocha: Modularity in model checking
-
Alur, R., Henzinger, T. A., Mang, F. Y. C., Qadeer, S., Rajamani, S. K., & Tasiran, S. (1998). Mocha: Modularity in model checking. In CAV'98, LNCS (Vol. 1427, pp. 521-525).
-
(1998)
CAV'98, LNCS
, vol.1427
, pp. 521-525
-
-
Alur, R.1
Henzinger, T.A.2
Mang, F.Y.C.3
Qadeer, S.4
Rajamani, S.K.5
Tasiran, S.6
-
7
-
-
37149023024
-
Model checking on trees with path equivalences
-
Alur, R., Černý, P., & Chaudhuri, S. (2007). Model checking on trees with path equivalences. In TACAS'07, LNCS (Vol. 4424, pp. 664-678).
-
(2007)
TACAS'07, LNCS
, vol.4424
, pp. 664-678
-
-
Alur, R.1
Černý, P.2
Chaudhuri, S.3
-
8
-
-
33746373966
-
Preserving secrecy under refinement
-
Alur, R., Černý, P., & Zdancewic, S. (2006). Preserving secrecy under refinement. In ICALP'06, LNCS (Vol. 4052, pp. 107-118).
-
(2006)
ICALP'06, LNCS
, vol.4052
, pp. 107-118
-
-
Alur, R.1
Černý, P.2
Zdancewic, S.3
-
9
-
-
19144369108
-
Programming Satan's computer
-
In J. Leeuwen (Ed.), Chap. 26, Berlin/Heidelberg: Springer
-
Anderson, R., & Needham, R. (1995). Programming Satan's computer. In J. Leeuwen (Ed.), Computer science today, LNCS (Vol. 1000, Chap. 26, pp. 426-440). Berlin/Heidelberg: Springer.
-
(1995)
Computer Science Today, LNCS
, vol.1000
, pp. 426-440
-
-
Anderson, R.1
Needham, R.2
-
10
-
-
14044260543
-
-
Technical Report SEN-R9922, CWI, Amsterdam
-
Baltag, A., Moss, L. S., & Solecki, S. (1999). The logic of public announcements, common knowledge, and private suspicions. Technical Report SEN-R9922, CWI, Amsterdam.
-
(1999)
The Logic of Public Announcements, Common Knowledge, and Private Suspicions
-
-
Baltag, A.1
Moss, L.S.2
Solecki, S.3
-
11
-
-
84954358555
-
Probabilistic dynamic belief revision
-
Baltag, A., & Smets, S. (2008). Probabilistic dynamic belief revision. Synthese, 165(2), 179-202.
-
(2008)
Synthese
, vol.165
, Issue.2
, pp. 179-202
-
-
Baltag, A.1
Smets, S.2
-
12
-
-
58449096556
-
Knowledge-based modelling of voting protocols. In
-
Baskar, A., Ramanujam, R., & Suresh, S. P. (2007). Knowledge-based modelling of voting protocols. In TARK'07 (pp. 62-71).
-
(2007)
TARK'07
, pp. 62-71
-
-
Baskar, A.1
Ramanujam, R.2
Suresh, S.P.3
-
13
-
-
27244455746
-
Probabilistic anonymity
-
Bhargava, M., & Palamidessi, C. (2005). Probabilistic anonymity. In CONCUR'05, LNCS (Vol. 3653, pp. 171-185).
-
(2005)
CONCUR'05, LNCS
, vol.3653
, pp. 171-185
-
-
Bhargava, M.1
Palamidessi, C.2
-
15
-
-
78650512700
-
Automatic verification of temporal-epistemic properties of cryptographic protocols
-
Boureanu, I., Cohen, M., & Lomuscio, A. (2009). Automatic verification of temporal-epistemic properties of cryptographic protocols. Journal of Applied Non-Classical Logics, 19(4), 463-487.
-
(2009)
Journal of Applied Non-Classical Logics
, vol.19
, Issue.4
, pp. 463-487
-
-
Boureanu, I.1
Cohen, M.2
Lomuscio, A.3
-
16
-
-
0021465083
-
A theory of communicating sequential processes
-
Brookes, D., Hoare, C. A. R., & Roscoe, A. W. (1984). A theory of communicating sequential processes. Journal of the ACM, 31(3), 560-599.
-
(1984)
Journal of the ACM
, vol.31
, Issue.3
, pp. 560-599
-
-
Brookes, D.1
Hoare, C.A.R.2
Roscoe, A.W.3
-
17
-
-
0000523051
-
A logic of authentication
-
Burrows, M., Abadi, M., & Needham, R. (1989). A logic of authentication. In Proceedings of the royal society of london, Series A, Mathematical and Physical Sciences (Vol. 426(1871), pp. 233-271).
-
(1989)
Proceedings of the Royal Society of London, Series A, Mathematical and Physical Sciences
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
18
-
-
70349332796
-
Epistemic logic for the applied pi calculus
-
Chadha, R., Delaune, S., & Kremer, S. (2009). Epistemic logic for the applied pi calculus. In FMOODS'09/FORTE'09, LNCS (Vol. 5522, pp. 182-197).
-
(2009)
FMOODS'09/FORTE'09, LNCS
, vol.5522
, pp. 182-197
-
-
Chadha, R.1
Delaune, S.2
Kremer, S.3
-
19
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and receiver untraceability
-
Chaum, D. (1988). The dining cryptographers problem: Unconditional sender and receiver untraceability. Journal of Cryptology, 1, 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
20
-
-
84898947315
-
Multiparty unconditionally secure protocols. In
-
Chaum, D., Crépeau, C., & Damgard, I. (1988). Multiparty unconditionally secure protocols. In STOC'88 (pp. 11-19).
-
(1988)
STOC'88
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
21
-
-
69949148046
-
Computing knowledge in security protocols under convergent equational theories
-
Ciobâča, S., Delaune, S., & Kremer, S
-
Ciobâča, S., Delaune, S., & Kremer, S. (2009). Computing knowledge in security protocols under convergent equational theories. In CADE-22, LNCS (Vol. 5663, pp. 355-370).
-
(2009)
CADE-22, LNCS
, vol.5663
, pp. 355-370
-
-
-
23
-
-
0003257683
-
Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In
-
Clarke, E. M., Jha, S., & Marrero, W. R. (1998). Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In PROCOMET'98 (pp. 87-106).
-
(1998)
PROCOMET'98
, pp. 87-106
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.R.3
-
24
-
-
60349103014
-
A completeness result for BAN logic. In
-
Cohen, M., & Dam, M. (2005a). A completeness result for BAN logic. In Methods for modalities (pp. 202-219).
-
(2005)
Methods For Modalities
, pp. 202-219
-
-
Cohen, M.1
Dam, M.2
-
25
-
-
49049083577
-
Logical omniscience in the semantics of BAN logic. In
-
Cohen, M., & Dam, M. (2005b). Logical omniscience in the semantics of BAN logic. In FCS'05 (pp. 121-132).
-
(2005)
FCS'05
, pp. 121-132
-
-
Cohen, M.1
Dam, M.2
-
26
-
-
78650511607
-
A complete axiomatization of knowledge and cryptography. In
-
Cohen, M., & Dam, M. (2007). A complete axiomatization of knowledge and cryptography. In LICS (pp. 77-88).
-
(2007)
LICS
, pp. 77-88
-
-
Cohen, M.1
Dam, M.2
-
27
-
-
84899803198
-
Abstraction in model checking multi-agent systems. In
-
Cohen, M., Dam, M., Lomuscio, A., & Russo, F. (2009a). Abstraction in model checking multi-agent systems. In AAMAS'09 (pp. 945-952).
-
(2009)
AAMAS'09
, pp. 945-952
-
-
Cohen, M.1
Dam, M.2
Lomuscio, A.3
Russo, F.4
-
28
-
-
78650517677
-
A symmetry reduction technique for model checking temporal epistemic logic. In
-
Cohen, M., Lomuscio, A., Dam, M., & Qu, H. (2009b). A symmetry reduction technique for model checking temporal epistemic logic. In IJCAI'09 (pp. 721-726).
-
(2009)
IJCAI'09
, pp. 721-726
-
-
Cohen, M.1
Lomuscio, A.2
Dam, M.3
Qu, H.4
-
30
-
-
38349003243
-
Operational and epistemic approaches to protocol analysis: Bridging the gap. In
-
Dechesne, F., Mousavi, M. R., & Orzan, S. (2007). Operational and epistemic approaches to protocol analysis: Bridging the gap. In LPAR (pp. 226-241).
-
(2007)
LPAR
, pp. 226-241
-
-
Dechesne, F.1
Mousavi, M.R.2
Orzan, S.3
-
31
-
-
52049115472
-
Refinement of Kripke models for dynamics
-
Dechesne, F., Orzan, S., & Wang, Y. (2008). Refinement of Kripke models for dynamics. In ICTAC'08, LNCS (Vol. 5160, pp. 111-125).
-
(2008)
ICTAC'08, LNCS
, vol.5160
, pp. 111-125
-
-
Dechesne, F.1
Orzan, S.2
Wang, Y.3
-
32
-
-
52049086419
-
Dynamic epistemic verification of security protocols: Framework and case study
-
Dechesne, F., & Wang, Y. (2007). Dynamic epistemic verification of security protocols: Framework and case study. In A meeting of the minds (LORI 2008), Texts in Computer Science (Vol. 8, pp. 129-144).
-
(2007)
A Meeting of the Minds (LORI 2008), Texts In Computer Science
, vol.8
, pp. 129-144
-
-
Dechesne, F.1
Wang, Y.2
-
33
-
-
33947622187
-
Coercion-resistance and receipt-freeness in electronic voting. In
-
Delaune, S., Kremer, S., & Ryan, M. (2006). Coercion-resistance and receipt-freeness in electronic voting. In CSFW'06 (pp. 28-42).
-
(2006)
CSFW'06
, pp. 28-42
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.3
-
34
-
-
68249084846
-
Verifying privacy-type properties of electronic voting protocols
-
Delaune, S., Kremer, S., & Ryan, M. (2009). Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security, 17(4), 435-487.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 435-487
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.3
-
35
-
-
5644251103
-
-
Technical Report ULCS-03-022, University of Liverpool, Department of Computer Science
-
Dixon, C., Carmen, Fisher, M., & van der Hoek, W. (2003). Using temporal logics of knowledge in the formal verification of security protocols. Technical Report ULCS-03-022, University of Liverpool, Department of Computer Science.
-
(2003)
Using Temporal Logics of Knowledge In the Formal Verification of Security Protocols
-
-
Dixon, C.1
Carmen Fisher, M.2
van der Hoek, W.3
-
36
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198-208.
-
(1983)
IEEE Transactions On Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
37
-
-
0042500424
-
Undecidability of bounded security protocols
-
Durgin, N. A., Lincoln, P. D., Mitchell, J. C., & Scedrov, A. (1999). Undecidability of bounded security protocols. In Proceedings of the workshop on formal methods and security protocols.
-
(1999)
Proceedings of the Workshop On Formal Methods and Security Protocols
-
-
Durgin, N.A.1
Lincoln, P.D.2
Mitchell, J.C.3
Scedrov, A.4
-
38
-
-
0023108525
-
Uniform inevitability is tree automaton ineffable
-
Emerson, E. A. (1987). Uniform inevitability is tree automaton ineffable. Information Processing Letters, 24(2), 77-79.
-
(1987)
Information Processing Letters
, vol.24
, Issue.2
, pp. 77-79
-
-
Emerson, E.A.1
-
39
-
-
35448975120
-
Model checking knowledge and linear time: PSPACE cases. In
-
Engelhardt, K., Gammie, P., & van der Meyden, R. (2007). Model checking knowledge and linear time: PSPACE cases. In LFCS (pp. 195-211)
-
(2007)
LFCS
, pp. 195-211
-
-
Engelhardt, K.1
Gammie, P.2
van der Meyden, R.3
-
40
-
-
27244447948
-
Modal logics with a linear hierarchy of local propositional quantifiers
-
Engelhardt, K., Van Der Meyden, R., & Su, K. (2002). Modal logics with a linear hierarchy of local propositional quantifiers. In Advances in modal logic (Vol. 9, pp. 9-30).
-
(2002)
Advances In Modal Logic
, vol.9
, pp. 9-30
-
-
Engelhardt, K.1
van der Meyden, R.2
Su, K.3
-
41
-
-
0029201530
-
Knowledge-based programs. In
-
Fagin, R., Halpern, J. Y., Moses, Y., & Vardi, M. Y. (1995a). Knowledge-based programs. In Symposium on principles of distributed computing (pp. 153-163).
-
(1995)
Symposium On Principles of Distributed Computing
, pp. 153-163
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
42
-
-
0003730235
-
-
Cambridge, MA, USA: MIT Press
-
Fagin, R., Halpern, J. Y., Vardi, M. Y., & Moses, Y. (1995b). Reasoning about knowledge. Cambridge, MA, USA: MIT Press.
-
(1995)
Reasoning About Knowledge
-
-
Fagin, R.1
Halpern, J.Y.2
Vardi, M.Y.3
Moses, Y.4
-
43
-
-
0008814479
-
Bounds on secret key exchange using a random deal of cards
-
Fischer M. J., & Wright R. N. (1996) Bounds on secret key exchange using a random deal of cards. Journal of Cryptology, 9, 71-99
-
(1996)
Journal of Cryptology
, vol.9
, pp. 71-99
-
-
Fischer, M.J.1
Wright, R.N.2
-
44
-
-
35048815468
-
Classification of security properties (Part II: Network Security)
-
Springer
-
Focardi, R., Gorrieri, R., & Martinelli, F. (2004). Classification of security properties (Part II: Network Security), In LNCS (Vol. 2946, pp. 139-185). Springer.
-
(2004)
LNCS
, vol.2946
, pp. 139-185
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
45
-
-
26944497736
-
MCK: Model checking the logic of knowledge
-
Springer
-
Gammie, P., & van der Meyden, R. (2004). MCK: Model checking the logic of knowledge. In CAV'04, LNCS (Vol. 3114 pp. 256-259). Springer.
-
(2004)
CAV'04, LNCS
, vol.3114
, pp. 256-259
-
-
Gammie, P.1
van der Meyden, R.2
-
46
-
-
31844437820
-
Provable anonymity. In
-
Garcia, F. D., Hasuo, I., van Rossum, P., & Pieters, W. (2005). Provable anonymity. In Formal Methods in Security Engineering'05 (pp. 63-72).
-
(2005)
Formal Methods In Security Engineering'05
, pp. 63-72
-
-
Garcia, F.D.1
Hasuo, I.2
van Rossum, P.3
Pieters, W.4
-
47
-
-
53249127415
-
Reasoning about information change
-
Gerbrandy, J., & Groeneveld, W. (1997). Reasoning about information change. Journal of Logic, Language and Information, 6(2), 147-169.
-
(1997)
Journal of Logic, Language and Information
, vol.6
, Issue.2
, pp. 147-169
-
-
Gerbrandy, J.1
Groeneveld, W.2
-
50
-
-
24144492346
-
Anonymity and information hiding in multiagent systems
-
Halpern, J., & O'Neill, K. (2005). Anonymity and information hiding in multiagent systems. Journal of Computer Security, 13(3), 483-514.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 483-514
-
-
Halpern, J.1
O'Neill, K.2
-
51
-
-
0000686226
-
Modelling knowledge and action in distributed systems
-
Halpern, J. Y., & Fagin, R. (1989). Modelling knowledge and action in distributed systems. Distributed Computing, 3(4), 159-177.
-
(1989)
Distributed Computing
, vol.3
, Issue.4
, pp. 159-177
-
-
Halpern, J.Y.1
Fagin, R.2
-
52
-
-
0025460546
-
Knowledge and common knowledge in a distributed environment
-
Halpern, J. Y., & Moses, Y. (1990). Knowledge and common knowledge in a distributed environment. Journal of the ACM, 37(3), 549-587.
-
(1990)
Journal of the ACM
, vol.37
, Issue.3
, pp. 549-587
-
-
Halpern, J.Y.1
Moses, Y.2
-
54
-
-
35248868917
-
Modeling adversaries in a logic for security protocol analysis
-
Springer
-
Halpern, J. Y., & Pucella, R. (2003a). Modeling adversaries in a logic for security protocol analysis. In Formal aspects of security, LNCS (Vol. 2629, pp. 87-100). Springer.
-
(2003)
Formal Aspects of Security, LNCS
, vol.2629
, pp. 87-100
-
-
Halpern, J.Y.1
Pucella, R.2
-
55
-
-
3142594319
-
On the relationship between strand spaces and multi-agent systems
-
Halpern, J. Y., & Pucella, R. (2003). On the relationship between strand spaces and multi-agent systems. ACM Transactions on Information and System Security, 6(1), 43-70.
-
(2003)
ACM Transactions On Information and System Security
, vol.6
, Issue.1
, pp. 43-70
-
-
Halpern, J.Y.1
Pucella, R.2
-
56
-
-
78649738925
-
Dealing with logical omniscience: Expressiveness and Pragmatics
-
doi:10.1016/j.artint.2010.04.009
-
Halpern, J. Y., & Pucella, R. (2010). Dealing with logical omniscience: Expressiveness and pragmatics. Artificial Intelligence. doi:10.1016/j.artint.2010.04.009.
-
(2010)
Artificial Intelligence
, vol.4
, pp. 009
-
-
Halpern, J.Y.1
Pucella, R.2
-
57
-
-
0003015809
-
The complexity of reasoning about knowledge and time. In
-
Halpern, J. Y., & Vardi, M. Y. (1986). The complexity of reasoning about knowledge and time. In STOC'86 (pp. 304-315).
-
(1986)
STOC'86
, pp. 304-315
-
-
Halpern, J.Y.1
Vardi, M.Y.2
-
59
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
Herzog, J. C., & Guttman, J. D. (1999). Strand spaces: Proving security protocols correct. Journal of Computer Security, 7(2-3), 191-230.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Herzog, J.C.1
Guttman, J.D.2
-
61
-
-
78650510856
-
Update semantics of security protocols
-
In W. van der Hoek (Ed.), Berlin: Springer
-
Hommersom, A., Meyer, J.-J., & Vink, E. (2005). Update semantics of security protocols. In W. van der Hoek (Ed.), Information, interaction and agency (pp. 289-327). Berlin: Springer.
-
(2005)
Information, Interaction and Agency
, pp. 289-327
-
-
Hommersom, A.1
Meyer, J.-J.2
Vink, E.3
-
62
-
-
67349179469
-
Dynamic epistemic logic with branching temporal structures
-
Hoshi, T., & Yap, A. (2009). Dynamic epistemic logic with branching temporal structures. Synthese, 169(2), 259-281.
-
(2009)
Synthese
, vol.169
, Issue.2
, pp. 259-281
-
-
Hoshi, T.1
Yap, A.2
-
63
-
-
36348951490
-
Belief change and cryptographic protocol verification. In
-
Hunter, A., & Delgrande, J. P. (2007). Belief change and cryptographic protocol verification. In AAAI (pp. 427-433).
-
(2007)
AAAI
, pp. 427-433
-
-
Hunter, A.1
Delgrande, J.P.2
-
64
-
-
33750257357
-
Formalising receipt-freeness
-
Jonker, H. L., & de Vink, E. P. (2006). Formalising receipt-freeness. In Information security, LNCS (Vol. 4176, pp. 476-488).
-
(2006)
Information Security, LNCS
, vol.4176
, pp. 476-488
-
-
Jonker, H.L.1
de Vink, E.P.2
-
65
-
-
69749087787
-
Receipt-freeness as a special case of anonymity in epistemic logic. In
-
Jonker, H. L., & Pieters, W. (2006). Receipt-freeness as a special case of anonymity in epistemic logic. In Workshop On trustworthy elections 2006.
-
(2006)
Workshop On Trustworthy Elections
, vol.2006
-
-
Jonker, H.L.1
Pieters, W.2
-
66
-
-
77956512631
-
VerICS 2007-A model checker for knowledge and real-time
-
Kacprzak, M., Nabiałek, W., Niewiadomski, A., Penczek, W., Półrola, A., Szreter, M., Wozna, B., & Zbrzezny, A. (2008). VerICS 2007-A model checker for knowledge and real-time. Fundamenta Informaticae, 85(1), 313-328.
-
(2008)
Fundamenta Informaticae
, vol.85
, Issue.1
, pp. 313-328
-
-
Kacprzak, M.1
Nabiałek, W.2
Niewiadomski, A.3
Penczek, W.4
Półrola, A.5
Szreter, M.6
Wozna, B.7
Zbrzezny, A.8
-
68
-
-
0004492731
-
Monadic second order definable relations on the binary tree
-
Läuchli, H., & Savioz, C. (1987). Monadic second order definable relations on the binary tree. The Journal of Symbolic Logic, 52(1), 219-226.
-
(1987)
The Journal of Symbolic Logic
, vol.52
, Issue.1
, pp. 219-226
-
-
Läuchli, H.1
Savioz, C.2
-
69
-
-
57749179039
-
Symbolic model checking for temporal-epistemic logics
-
Lomuscio, A., & Penczek, W. (2007). Symbolic model checking for temporal-epistemic logics. SIGACT News, 38(3), 77-99.
-
(2007)
SIGACT News
, vol.38
, Issue.3
, pp. 77-99
-
-
Lomuscio, A.1
Penczek, W.2
-
70
-
-
70350243070
-
MCMAS: A model checker for the verification of multi-agent systems
-
Lomuscio, A., Qu, H., & Raimondi, F. (2009). MCMAS: A model checker for the verification of multi-agent systems. In CAV'09, LNCS (Vol. 5643, pp. 682-688).
-
(2009)
CAV'09, LNCS
, vol.5643
, pp. 682-688
-
-
Lomuscio, A.1
Qu, H.2
Raimondi, F.3
-
71
-
-
34247282764
-
The complexity of model checking concurrent programs against CTLK specifications. In
-
Lomuscio, A., & Raimondi, F. (2006a). The complexity of model checking concurrent programs against CTLK specifications. In AAMAS'06 (pp. 548-550).
-
(2006)
AAMAS'06
, pp. 548-550
-
-
Lomuscio, A.1
Raimondi, F.2
-
72
-
-
33745782313
-
MCMAS: A model checker for multi-agent systems
-
Lomuscio, A., & Raimondi, F. (2006b). MCMAS: A model checker for multi-agent systems. In TACAS'06, LNCS (Vol. 3920, pp. 450-454).
-
(2006)
TACAS'06, LNCS
, vol.3920
, pp. 450-454
-
-
Lomuscio, A.1
Raimondi, F.2
-
73
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using FDR
-
Lowe, G. (1996). Breaking and fixing the needham-schroeder public-key protocol using FDR. In TACAS'96, LNCS (Vol. 1055, pp. 147-166).
-
(1996)
TACAS'96, LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
74
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R. M., & Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
75
-
-
78650512436
-
-
Available from
-
Orzan, S. (2005). LYS. Available from http://www.mobanet.nl/simona/lys/.
-
(2005)
LYS
-
-
Orzan, S.1
-
76
-
-
85007180552
-
Distributed processes and the logic of knowledge
-
Parikh, R., & Ramanujam, R. (1985). Distributed processes and the logic of knowledge. In Logic of programs, LNCS (Vol. 193, pp. 256-268).
-
(1985)
Logic of Programs, LNCS
, vol.193
, pp. 256-268
-
-
Parikh, R.1
Ramanujam, R.2
-
77
-
-
85055301707
-
A knowledge based semantics of messages
-
Parikh, R., & Ramanujam, R. (2003). A knowledge based semantics of messages. Journal of Logic, Language and Information, 12(4), 453-467.
-
(2003)
Journal of Logic, Language and Information
, vol.12
, Issue.4
, pp. 453-467
-
-
Parikh, R.1
Ramanujam, R.2
-
79
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L. C. (1998). The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6, 85-128.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
80
-
-
70350645240
-
Perfect cryptography, S5 knowledge, and algorithmic knowledge. In
-
Petride, S., & Pucella, R. (2007). Perfect cryptography, S5 knowledge, and algorithmic knowledge. In TARK'07 (pp. 239-247).
-
(2007)
TARK'07
, pp. 239-247
-
-
Petride, S.1
Pucella, R.2
-
82
-
-
33645745601
-
Deductive algorithmic knowledge
-
Pucella, R. (2006). Deductive algorithmic knowledge. Journal of Logic and Computation, 16(2), 287-309.
-
(2006)
Journal of Logic and Computation
, vol.16
, Issue.2
, pp. 287-309
-
-
Pucella, R.1
-
83
-
-
11944251803
-
Decidability of context-explicit security protocols
-
Ramanujam, R., & Suresh, S. P. (2005a). Decidability of context-explicit security protocols. Journal of Computer Security, 13(1), 135-165.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 135-165
-
-
Ramanujam, R.1
Suresh, S.P.2
-
84
-
-
32144452580
-
Deciding knowledge properties of security protocols. In
-
Ramanujam, R., & Suresh, S. P. (2005b). Deciding knowledge properties of security protocols. In TARK'05 (pp. 219-235).
-
(2005)
TARK'05
, pp. 219-235
-
-
Ramanujam, R.1
Suresh, S.P.2
-
87
-
-
37149041356
-
Model checking knowledge and fixpoints
-
Shilov, N. V., & Garanina, N. O. (2002). Model checking knowledge and fixpoints. In FICS, BRICS notes series (Vol. NS-02-2, pp. 25-39).
-
(2002)
FICS, BRICS Notes Series
, vol.2 NS
, pp. 25-39
-
-
Shilov, N.V.1
Garanina, N.O.2
-
88
-
-
3042662497
-
Probabilistic model checking of an anonymity system
-
Shmatikov, V. (2004). Probabilistic model checking of an anonymity system. Journal of Computer Security, 12(3/4), 355-377.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 355-377
-
-
Shmatikov, V.1
-
89
-
-
9444222493
-
Model checking temporal logics of knowledge in distributed systems. In
-
Su, K. (2004). Model checking temporal logics of knowledge in distributed systems. In AAAI (pp. 98-103).
-
(2004)
AAAI
, pp. 98-103
-
-
Su, K.1
-
90
-
-
84974755213
-
Knowledge, belief, and semantics in the analysis of cryptographic protocols
-
Syverson, P. F. (1992). Knowledge, belief, and semantics in the analysis of cryptographic protocols. Journal of Computer Security, 1(3-4), 317-334.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.3-4
, pp. 317-334
-
-
Syverson, P.F.1
-
91
-
-
84924758404
-
Group principals and the formalization of anonymity
-
Syverson, P. F., & Stubblebine, S. G. (1999). Group principals and the formalization of anonymity. In World congress on formal methods, LNCS (Vol. 1708, pp. 814-833).
-
(1999)
World Congress On Formal Methods, LNCS
, vol.1708
, pp. 814-833
-
-
Syverson, P.F.1
Stubblebine, S.G.2
-
92
-
-
78650517588
-
BAN logic is not 'sound', constructing epistemic logics for security is difficult. In
-
Teepe, W. (2006). BAN logic is not 'sound', constructing epistemic logics for security is difficult. In Proceedings of FAMAS'06 (pp. 79-91).
-
(2006)
Proceedings of FAMAS'06
, pp. 79-91
-
-
Teepe, W.1
-
93
-
-
70350373743
-
Merging frameworks for interaction
-
van Benthem, J., Gerbrandy, J., Hoshi, T., & Pacuit, E. (2009).Merging frameworks for interaction. Journal of Philosophical Logic, 38(5), 491-526.
-
(2009)
Journal of Philosophical Logic
, vol.38
, Issue.5
, pp. 491-526
-
-
van Benthem, J.1
Gerbrandy, J.2
Hoshi, T.3
Pacuit, E.4
-
94
-
-
84878170335
-
Merging frameworks for interaction: DEL and ETL. In
-
van Benthem, J., Gerbrandy, J., & Pacuit, E. (2007). Merging frameworks for interaction: DEL and ETL. In TARK'07 (pp. 72-81).
-
(2007)
TARK'07
, pp. 72-81
-
-
van Benthem, J.1
Gerbrandy, J.2
Pacuit, E.3
-
95
-
-
84856010522
-
Logics of communication and change
-
van Benthem, J., van Eijck, J., & Kooi, B. (2006). Logics of communication and change. Information and Computation, 204(11), 1620-1662.
-
(2006)
Information and Computation
, vol.204
, Issue.11
, pp. 1620-1662
-
-
van Benthem, J.1
van Eijck, J.2
Kooi, B.3
-
96
-
-
0036355444
-
Tractable multiagent planning for epistemic goals. In
-
van der Hoek, W., & Wooldridge, M. (2002). Tractable multiagent planning for epistemic goals. In AAMAS'02 (pp. 1167-1174).
-
(2002)
AAMAS'02
, pp. 1167-1174
-
-
van der Hoek, W.1
Wooldridge, M.2
-
97
-
-
84958768940
-
Model checking knowledge and time in systems with perfect recall
-
van der Meyden, R., & Shilov, N. (1999). Model checking knowledge and time in systems with perfect recall. In FSTTCS'99, LNCS (Vol. 1738, pp. 432-445).
-
(1999)
FSTTCS'99, LNCS
, vol.1738
, pp. 432-445
-
-
van der Meyden, R.1
Shilov, N.2
-
98
-
-
4944250729
-
Symbolic model checking the knowledge of the dining cryptographers. In
-
van der Meyden, R., & Su, K. (2004). Symbolic model checking the knowledge of the dining cryptographers. In CSFW'04 (pp. 280-291).
-
(2004)
CSFW'04
, pp. 280-291
-
-
van der Meyden, R.1
Su, K.2
-
99
-
-
69249241046
-
Preservation of epistemic properties in security protocol implementations. In
-
van der Meyden, R., & Wilke, T. (2007). Preservation of epistemic properties in security protocol implementations. In TARK'07 (pp. 212-221).
-
(2007)
TARK'07
, pp. 212-221
-
-
van der Meyden, R.1
Wilke, T.2
-
100
-
-
1142270378
-
The Russian cards problem
-
van Ditmarsch, H. (2003). The Russian cards problem. Studia Logica, 75(1), 31-62.
-
(2003)
Studia Logica
, vol.75
, Issue.1
, pp. 31-62
-
-
van Ditmarsch, H.1
-
102
-
-
31644448537
-
Model checking Russian cards
-
van Ditmarsch, H., van der Hoek, W., van der Meyden, R., & Ruan, J. (2006). Model checking Russian cards. In MoChArt 05, ENTCS (Vol. 149(2), pp. 105-123).
-
(2006)
MoChArt 05, ENTCS
, vol.149
, Issue.2
, pp. 105-123
-
-
van Ditmarsch, H.1
van der Hoek, W.2
van der Meyden, R.3
Ruan, J.4
-
106
-
-
70350627206
-
Verifying epistemic protocols under common knowledge. In
-
Wang, Y., Kuppusamy, L., & van Eijck, J. (2009). Verifying epistemic protocols under common knowledge. In TARK'09 (pp. 257-266).
-
(2009)
TARK'09
, pp. 257-266
-
-
Wang, Y.1
Kuppusamy, L.2
van Eijck, J.3
-
107
-
-
80051558916
-
Logic of information flow on communication channels (extended abstract)
-
(to appear)
-
Wang, Y., Sietsma, F., & van Eijck, J. (2010). Logic of information flow on communication channels (extended abstract). In AAMAS'10 (to appear).
-
(2010)
AAMAS'10
-
-
Wang, Y.1
Sietsma, F.2
van Eijck, J.3
|