Games, norms and reasons: logic at the crossroads
暂无分享,去创建一个
[1] Nancy A. Lynch,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[2] Mads Dam,et al. A Complete Axiomatization of Knowledge and Cryptography , 2007, 22nd Annual IEEE Symposium on Logic in Computer Science (LICS 2007).
[3] Yoram Moses,et al. Knowledge and Common Knowledge in a Byzantine Environment I: Crash Failures , 1986, TARK.
[4] Ramaswamy Ramanujam,et al. Decidability of context-explicit security protocols , 2005, J. Comput. Secur..
[5] Michaël Rusinowitch,et al. Protocol insecurity with a finite number of sessions, composed keys is NP-complete , 2003, Theor. Comput. Sci..
[6] Ramaswamy Ramanujam,et al. Knowledge-based modelling of voting protocols , 2007, TARK '07.
[7] Oded Goldreich,et al. On the security of multi-party ping-pong protocols , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[8] S. P. Suresh. Foundations of Security Protocol Analysis , 2003 .
[9] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[10] Rohit Parikh. Logical omniscience and common knowledge: WHAT do we know and what do WE know? , 2005, TARK.
[11] Ross J. Anderson,et al. Programming Satan's Computer , 1995, Computer Science Today.
[12] Dan M. Nessett,et al. A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.
[13] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[14] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[15] Joseph Y. Halpern,et al. Modeling Adversaries in a Logic for Security Protocol Analysis , 2006, FASec.
[16] Thomas Wilke,et al. Preservation of epistemic properties in security protocol implementations , 2007, TARK '07.
[17] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.