Verifying security protocols as planning in logic programming
From MaRDI portal
Publication:5738918
DOI10.1145/383779.383785zbMath1365.68386MaRDI QIDQ5738918
Luigia Carlucci Aiello, Fabio Massacci
Publication date: 13 June 2017
Published in: ACM Transactions on Computational Logic (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/383779.383785
68T20: Problem solving in the context of artificial intelligence (heuristics, search strategies, etc.)
68N17: Logic programming
Related Items
Reasoning with infinite stable models, Cryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptography, Extending and implementing the stable model semantics, A rule based knowledge transaction model for mobile environments