nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Decision Procedure for a Sublanguage of Set Theory Involving Monotone, Additive, and Multiplicative Functions, I: The Two-Level Case
|
Zarba, Calogero G. |
|
2005 |
|
3-4 |
p. 251-269 |
artikel |
2 |
An Extensible Encoding of Object-oriented Data Models in hol
|
Brucker, Achim D. |
|
2008 |
|
3-4 |
p. 219-249 |
artikel |
3 |
Assumption–Commitment Support for CSP Model Checking
|
Moffat, Nick |
|
2008 |
|
3-4 |
p. 365-398 |
artikel |
4 |
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
|
Cortier, Véronique |
|
2010 |
|
3-4 |
p. 225-259 |
artikel |
5 |
Automated Proofs for Asymmetric Encryption
|
Courant, J. |
|
2010 |
|
3-4 |
p. 261-291 |
artikel |
6 |
Automatic Symmetry Detection for Promela
|
Donaldson, Alastair F. |
|
2008 |
|
3-4 |
p. 251-293 |
artikel |
7 |
Collaborative Planning with Confidentiality
|
Kanovich, Max |
|
2010 |
|
3-4 |
p. 389-421 |
artikel |
8 |
Data Compression for Proof Replay
|
Amjad, Hasan |
|
2008 |
|
3-4 |
p. 193-218 |
artikel |
9 |
Encoding Cryptographic Primitives in a Calculus with Polyadic Synchronisation
|
Martinho, Joana |
|
2010 |
|
3-4 |
p. 293-323 |
artikel |
10 |
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
|
Gorrieri, Roberto |
|
2008 |
|
3-4 |
p. 325-364 |
artikel |
11 |
Model-Theoretic Methods in Combined Constraint Satisfiability
|
Ghilardi, Silvio |
|
2005 |
|
3-4 |
p. 221-249 |
artikel |
12 |
MPTP – Motivation, Implementation, First Experiments
|
Urban, Josef |
|
2005 |
|
3-4 |
p. 319-339 |
artikel |
13 |
Multi-Attacker Protocol Validation
|
Arsac, Wihem |
|
2010 |
|
3-4 |
p. 353-388 |
artikel |
14 |
On the Complexity of Deduction Modulo Leaf Permutative Equations
|
Boy de la Tour, Thierry |
|
2005 |
|
3-4 |
p. 271-317 |
artikel |
15 |
Preface
|
Autexier, Serge |
|
2008 |
|
3-4 |
p. 191-192 |
artikel |
16 |
Preface
|
Kapur, Deepak |
|
2005 |
|
3-4 |
p. 219-220 |
artikel |
17 |
Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”
|
Bauer, Lujo |
|
2010 |
|
3-4 |
p. 223-224 |
artikel |
18 |
Reachability Analysis over Term Rewriting Systems
|
Feuillade, Guillaume |
|
2005 |
|
3-4 |
p. 341-383 |
artikel |
19 |
Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach
|
Küsters, Ralf |
|
2010 |
|
3-4 |
p. 325-352 |
artikel |
20 |
Using Theorem Proving to Verify Expectation and Variance for Discrete Random Variables
|
Hasan, Osman |
|
2008 |
|
3-4 |
p. 295-323 |
artikel |