메뉴 건너뛰기




Volumn , Issue , 2009, Pages 41-46

Modelling cryptographic protocols in a theory of action

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; DIFFERENT PROTOCOLS; SEQUENCE OF ACTIONS; SITUATION CALCULUS;

EID: 84888373699     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (13)
  • 1
    • 85006614284 scopus 로고    scopus 로고
    • Verifying security protocols as planning in logic programming.
    • Aiello, L., and Massacci, F. 2001. Verifying security protocols as planning in logic programming. ACM Transactions on Computational Logic 2(4):542-580.
    • (2001) ACM Transactions on Computational Logic , vol.2 , Issue.4 , pp. 542-580
    • Aiello, L.1    Massacci, F.2
  • 3
    • 85025425124 scopus 로고    scopus 로고
    • CAPSL interface for the NRL protocol analyzer
    • IEEE Computer Society Press.
    • Brackin, S.; Meadows, C.; and Millen, J. 1999. CAPSL interface for the NRL protocol analyzer. In Proceedings of ASSET 99. IEEE Computer Society Press.
    • (1999) Proceedings of ASSET , vol.99
    • Brackin, S.1    Meadows, C.2    Millen, J.3
  • 4
    • 0025386404 scopus 로고
    • A logic of authentication
    • Burrows, M.; Abadi, M.; and Needham, R. 1990. A logic of authentication. ACM TOCS 8(1):18-36.
    • (1990) ACM TOCS , vol.8 , Issue.1 , pp. 18-36
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 7
    • 77951505493 scopus 로고
    • Classical negation in logic programs and deductive databases
    • Gelfond, M., and Lifschitz, V. 1991. Classical negation in logic programs and deductive databases. New Generation Computing 9:365-385.
    • (1991) New Generation Computing , vol.9 , pp. 365-385
    • Gelfond, M.1    Lifschitz, V.2
  • 9
    • 70349871895 scopus 로고    scopus 로고
    • Formal modelling of cryptographic protocols in situation calculus
    • Published in Spanish as: Especificacíon formal de protocolos criptogr ́aficos en Ćalculo de Situaciones 2000).
    • Herńandez-Orallo, J., and Pinto, J. 1997. Formal modelling of cryptographic protocols in situation calculus. (Published in Spanish as: Especificacíon formal de protocolos criptogr ́aficos en Ćalculo de Situaciones, Novatica, 143, pp. 57-63, 2000).
    • (1997) Novatica , vol.143 , pp. 57-63
    • Herńandez-Orallo, J.1    Pinto, J.2
  • 11
    • 0003328437 scopus 로고    scopus 로고
    • Foundations for the situation calculus
    • Reiter, R. 2001. Knowledge in Action: Logical Foundations for Specifying and Implementing Dynamical Systems. Cambridge, MA: The MIT Press.
    • Levesque, H.; Pirri, F.; and Reiter, R. 1998. Foundations for the situation calculus. Link̈oping Electronic Articles in Computer and Information Science 3(18). Reiter, R. 2001. Knowledge in Action: Logical Foundations for Specifying and Implementing Dynamical Systems. Cambridge, MA: The MIT Press.
    • (1998) Link̈oping Electronic Articles in Computer and Information Science , vol.3 , Issue.18
    • Levesque, H.1    Pirri, F.2    Reiter, R.3
  • 12
    • 0037370247 scopus 로고    scopus 로고
    • Knowledge, action, and the frame problem
    • Scherl, R., and Levesque, H. 2003. Knowledge, action, and the frame problem. Artificial Intelligence 144(1-2):1-39.
    • (2003) Artificial Intelligence , vol.144 , Issue.1-2 , pp. 1-39
    • Scherl, R.1    Levesque, H.2
  • 13
    • 84888324139 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • JCS 7(1). Wang, S., and Zhang, Y. 2008. In Proc. ISMIS 2008 of LNAI Springer.
    • Thayer, F.; Herzog, J.; and Guttman, J. 1999. Strand spaces: Proving security protocols correct. JCS 7(1). Wang, S., and Zhang, Y. 2008. A logic programming based framework for security protocol verification. In Proc. ISMIS 2008, volume 4994 of LNAI, 638-643. Springer.
    • (1999) A Logic Programming Based Framework for Security Protocol Verification , vol.4994 , pp. 638-643
    • Thayer, F.1    Herzog, J.2    Guttman, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.