Amanote Research

Amanote Research

    RegisterSign In

Verifying Security Protocols as Planning in Logic Programming

ACM Transactions on Computational Logic - United States
doi 10.1145/383779.383785
Full Text
Open PDF
Abstract

Available in full text

Categories
Computational MathematicsTheoretical Computer ScienceComputer ScienceLogic
Date

October 1, 2001

Authors
Luigia Carlucci AielloFabio Massacci
Publisher

Association for Computing Machinery (ACM)


Related search

Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks

2009English

Logic Programming as Hypergraph Rewriting

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1991English

A Compositional Logic for Proving Security Properties of Protocols*

Journal of Computer Security
RiskComputer NetworksHardwareCommunicationsReliabilitySafetyArchitectureQualitySoftware
2003English

Automated Logic-Based Technique for Formal Verification of Security Protocols

Journal of Advances in Computer Networks
2018English

Disjunctive Logic Programming as Constrained Inferences

1997English

Knowledge-Based Security Testing of Web Applications by Logic Programming

International Journal on Software Tools for Technology Transfer
Information SystemsSoftware
2017English

Abstract Categorial Parsing as Linear Logic Programming

2015English

Abduction in Logic Programming as Second-Order Quantifier Elimination

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Logic Programming

1995English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy