-
1
-
-
0000421604
-
Logic programming with focusing proofs in linear logic
-
J.-M. Andreoli. Logic programming with focusing proofs in linear logic. Journal of Logic and Computation, 2(3), 1992.
-
(1992)
Journal of Logic and Computation
, vol.2
, Issue.3
-
-
Andreoli, J.-M.1
-
10
-
-
14044264137
-
The authentication protocol
-
Defence Research Agency, Malvern, UK
-
J. A. Bull and D. J. Otway. The authentication protocol. Technical Report CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
-
(1997)
Technical Report CSM/436-04/03
-
-
Bull, J.A.1
Otway, D.J.2
-
14
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
16
-
-
0020720357
-
On the security of public key protocols
-
March
-
D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208, March 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
19
-
-
0004504295
-
A uniform proof-theoretic investigation of linear logic programming
-
April
-
J. Harland and D. Pym. A uniform proof-theoretic investigation of linear logic programming. Journal of Logic and Computation, 4(2), April 1994. 175-207.
-
(1994)
Journal of Logic and Computation
, vol.4
, Issue.2
, pp. 175-207
-
-
Harland, J.1
Pym, D.2
-
21
-
-
43949161369
-
Logic programming in a fragment of intuitionistic linear logic
-
May
-
J. S. Hodas and D. Miller. Logic programming in a fragment of intuitionistic linear logic. Journal of Information and Computation, 110(2):327-365, May 1994.
-
(1994)
Journal of Information and Computation
, vol.110
, Issue.2
, pp. 327-365
-
-
Hodas, J.S.1
Miller, D.2
-
24
-
-
0342658605
-
Breaking and fixing the needham-schroeder public key protocol using csp and fdr
-
T. Margaria and B. Stefien, editors, volume 1055 of Lecture Notes in Computer Science, SpringerVerlag
-
G. Lowe. Breaking and fixing the Needham-Schroeder public key protocol using CSP and FDR. In T. Margaria and B. Stefien, editors, Tools and Algorithms for the Construction and Analysis of Systems Second International Workshop, TACAS '96, volume 1055 of Lecture Notes in Computer Science, pages 147-166. SpringerVerlag, 1996.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems Second International Workshop, TACAS '96
, pp. 147-166
-
-
Lowe, G.1
-
27
-
-
0022047443
-
Why horn formulas matter in computer science: Initial structures and generic examples
-
J. A. Makowsky. Why Horn formulas matter in computer science: Initial structures and generic examples. Journal of Computer and System Sciences, 34:266-292, 1987.
-
(1987)
Journal of Computer and System Sciences
, vol.34
, pp. 266-292
-
-
Makowsky, J.A.1
-
28
-
-
85063324040
-
Development of authentication protocols: Some misconceptions and a new approach
-
IEEE
-
W. Mao and C. Boyd. Development of authentication protocols: Some misconceptions and a new approach. In Proceedings of the Computer Security Foundations Workshop VII, pages 178-186. IEEE, 1994.
-
(1994)
Proceedings of the Computer Security Foundations Workshop VII
, pp. 178-186
-
-
Mao, W.1
Boyd, C.2
-
29
-
-
0003735470
-
Model checking for security protocols
-
School of Computer Science, Carnegie Mellon University, May
-
W. Marrero, E. Clarke, and S. Jha. Model checking for security protocols. Technical Report CMU-CS-97-139, School of Computer Science, Carnegie Mellon University, May 1997.
-
(1997)
Technical Report CMU-CS-97-139
-
-
Marrero, W.1
Clarke, E.2
Jha, S.3
-
30
-
-
0030084918
-
The nrl protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: An overview. The Journal of Logic Programming, pages 113-131, 1996.
-
(1996)
The Journal of Logic Programming
, pp. 113-131
-
-
Meadows, C.1
-
31
-
-
84887475973
-
Analysis of security protocols
-
available at, July
-
J. C. Mitchell. Analysis of security protocols. Slides for a talk at CAV '98, available at http://www.stanford.edu/jcm, July 1998.
-
(1998)
Slides for a Talk at CAV '98
-
-
Mitchell, J.C.1
-
32
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
34
-
-
17744375732
-
Proving properties of security protocols by induction
-
University of Cambridge
-
L. C. Paulson. Proving properties of security protocols by induction. Technical Report TR-409, Computer Laboratory, University of Cambridge, 1996.
-
(1996)
Technical Report TR-409, Computer Laboratory
-
-
Paulson, L.C.1
-
42
-
-
0028459868
-
Proof strategies in linear logic
-
T. Tammet. Proof strategies in linear logic. Journal of Automated Reasoning, 12:273-304, 1994.
-
(1994)
Journal of Automated Reasoning
, vol.12
, pp. 273-304
-
-
Tammet, T.1
|