SAT-based model-checking of security protocols using planning graph analysis. Armando, A., Compagna, L., & Ganty, P. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2805:875-893, 2003.
Paper bibtex @ARTICLE{Armando2003875,
author={Armando, A., Compagna, L., Ganty, P.},
title={SAT-based model-checking of security protocols using planning graph analysis},
journal={Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},
year={2003},
volume={2805},
pages={875-893},
url={https://www.scopus.com/inward/record.uri?eid=2-s2.0-35248876774&partnerID=40&md5=42087154a499458e91f9c4dad8f4419c},
document_type={Article},
source={Scopus},
}
Downloads: 0
{"_id":"DKm6EXbcwvYi5whDW","bibbaseid":"armando-compagna-ganty-satbasedmodelcheckingofsecurityprotocolsusingplanninggraphanalysis-2003","downloads":0,"creationDate":"2016-08-26T09:24:47.085Z","title":"SAT-based model-checking of security protocols using planning graph analysis","author_short":["Armando, A.","Compagna, L.","Ganty, P."],"year":2003,"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/1703583/BiblioLab.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Armando"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Compagna"],"firstnames":["L."],"suffixes":[]},{"propositions":[],"lastnames":["Ganty"],"firstnames":["P."],"suffixes":[]}],"title":"SAT-based model-checking of security protocols using planning graph analysis","journal":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","year":"2003","volume":"2805","pages":"875-893","url":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-35248876774&partnerID=40&md5=42087154a499458e91f9c4dad8f4419c","document_type":"Article","source":"Scopus","bibtex":"@ARTICLE{Armando2003875,\nauthor={Armando, A., Compagna, L., Ganty, P.},\ntitle={SAT-based model-checking of security protocols using planning graph analysis},\njournal={Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},\nyear={2003},\nvolume={2805},\npages={875-893},\nurl={https://www.scopus.com/inward/record.uri?eid=2-s2.0-35248876774&partnerID=40&md5=42087154a499458e91f9c4dad8f4419c},\ndocument_type={Article},\nsource={Scopus},\n}\n\n","author_short":["Armando, A.","Compagna, L.","Ganty, P."],"key":"Armando2003875","id":"Armando2003875","bibbaseid":"armando-compagna-ganty-satbasedmodelcheckingofsecurityprotocolsusingplanninggraphanalysis-2003","role":"author","urls":{"Paper":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-35248876774&partnerID=40&md5=42087154a499458e91f9c4dad8f4419c"},"downloads":0},"search_terms":["sat","based","model","checking","security","protocols","using","planning","graph","analysis","armando","compagna","ganty"],"keywords":["dblp","bounded model-checking; security protocols; sat-solvers; sat encodings"],"authorIDs":[],"dataSources":["EQov9rEvkmMf5P4ah"]}