-
3
-
-
84947772501
-
Semiring-based CSPs and Valued CSPs: Basic Properties and Comparison
-
Springer-Verlag
-
S. Bistarelli, H. Fargier, U. Montanari, F. Rossi, T. Schiex, and G. Verfaillie. Semiring-based CSPs and Valued CSPs: Basic Properties and Comparison. In Over-Constrained Systems. Springer-Verlag, 1996.
-
(1996)
Over-Constrained Systems
-
-
Bistarelli, S.1
Fargier, H.2
Montanari, U.3
Rossi, F.4
Schiex, T.5
Verfaillie, G.6
-
4
-
-
0003369786
-
Semiring-based csps and valued csps: Frameworks, properties, and comparison
-
Kluwer
-
S. Bistarelli, H. Fargier, U. Montanari, F. Rossi, T. Schiex, and G. Verfaillie. Semiring-based csps and valued csps: Frameworks, properties, and comparison. CONSTRAINTS: An international journal. Kluwer, 4(3), 1999.
-
(1999)
CONSTRAINTS: An International Journal
, vol.4
, Issue.3
-
-
Bistarelli, S.1
Fargier, H.2
Montanari, U.3
Rossi, F.4
Schiex, T.5
Verfaillie, G.6
-
6
-
-
85159675891
-
Formal Verification of Cardholder Registration in SET
-
Springer- Verlag, In press
-
G. Bella, F. Massacci, L. C. Paulson, and P. Tramontano. Formal Verification of Cardholder Registration in SET. In Proc. of European Symposium on Research in Computer Security (ESORICS 2000), LNCS. Springer- Verlag, 2000. In press.
-
(2000)
In Proc. Of European Symposium on Research in Computer Security (ESORICS 2000),
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
Tramontan, P.4
-
10
-
-
3042537645
-
Formal Analysis of the Kerberos Authentication System
-
G. Bella and E. Riccobene. Formal Analysis of the Kerberos Authentication System. Journal of Universal Computer Science, 3(12):1337–1381, 1997.
-
(1997)
Journal of Universal Computer Science
, vol.3
, Issue.12
, pp. 1337-1381
-
-
Bella, G.1
Riccobene, E.2
-
14
-
-
28144456308
-
An Attack on the Needham-Schroeder Public-Key Authentication Protocol
-
G. Lowe. An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters, 56(3):131–133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
18
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993–999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
19
-
-
0031643297
-
The Inductive Approach to Verifying Cryptographic Protocols
-
L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6:85–128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
20
-
-
84948394408
-
-
Federal Information Processing Standards Publications, FIPS Pub. 46
-
CHE AUTORE METTIAMO QUI? Data Encryption Standard. National Bureau of Standards, Jan 1977. Federal Information Processing Standards Publications, FIPS Pub. 46.
-
(1977)
National Bureau of Standards
, vol.Jan
-
-
-
21
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120–126, 1976.
-
(1976)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
24
-
-
0001553684
-
Possibilistic Constraint Satisfaction Problems, or “How to Handle Soft Constraints?”
-
T. Schiex. Possibilistic Constraint Satisfaction Problems, or “How to Handle Soft Constraints?”. In Proc. of 8th Conference on Uncertainty in AI, pages 269–275, 1992.
-
(1992)
Proc. Of 8Th Conference on Uncertainty in AI
, pp. 269-275
-
-
Schiex, T.1
-
25
-
-
0000961248
-
Domains for denotational semantics
-
Springer-Verlag
-
D. S. Scott. Domains for denotational semantics. In Proc. ICALP. Springer-Verlag, 1982.
-
(1982)
Proc. ICALP
-
-
Scott, D.S.1
|