共 50 条
- [32] Proving Authentication Property of Modified Needham-Schroeder Protocol with Logic of Events PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 379 - 383
- [34] On proving in epistemic logic PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2012, 2012, 8454
- [36] Planning attacks to security protocols: Case studies in logic programming COMPUTATIONAL LOGIC: LOGIC PROGRAMMING AND BEYOND, PT I: ESSAYS IN HONOUR OF ROBERT A KOWALSKI, 2002, 2407 : 533 - 560
- [37] Security protocols verification in abductive logic programming: A case study ENGINEERING SOCIETIES IN THE AGENTS WORLD VI, 2006, 3963 : 106 - 124
- [38] A Spatial-Epistemic Logic for Reasoning about Security Protocols ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2011, (51): : 1 - 15
- [39] Proof theory, transformations, and logic programming for debugging security protocols LOGIC BASED PROGRAM SYNTHESIS AND TRANSFORMATION, 2002, 2372 : 76 - 90