Soft Constraint Programming to Analysing Security Protocols. Bella, G. & Bistarelli, S. CoRR, 2003. Paper bibtex @article{DBLP:journals/corr/cs-CR-0312025,
author = {Giampaolo Bella and
Stefano Bistarelli},
title = {Soft Constraint Programming to Analysing Security Protocols},
journal = {CoRR},
volume = {cs.CR/0312025},
year = {2003},
url = {http://arxiv.org/abs/cs/0312025},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/cs-CR-0312025.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":{"_str":"53f475e53d9d602c1a001275"},"__v":0,"authorIDs":["5457089d8b01c8193000012f"],"author_short":["Bella, G.","Bistarelli, S."],"bibbaseid":"bella-bistarelli-softconstraintprogrammingtoanalysingsecurityprotocols-2003","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Giampaolo"],"propositions":[],"lastnames":["Bella"],"suffixes":[]},{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]}],"title":"Soft Constraint Programming to Analysing Security Protocols","journal":"CoRR","volume":"cs.CR/0312025","year":"2003","url":"http://arxiv.org/abs/cs/0312025","timestamp":"Tue, 07 May 2024 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/corr/cs-CR-0312025.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/cs-CR-0312025,\n author = {Giampaolo Bella and\n Stefano Bistarelli},\n title = {Soft Constraint Programming to Analysing Security Protocols},\n journal = {CoRR},\n volume = {cs.CR/0312025},\n year = {2003},\n url = {http://arxiv.org/abs/cs/0312025},\n timestamp = {Tue, 07 May 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/cs-CR-0312025.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bella, G.","Bistarelli, S."],"key":"DBLP:journals/corr/cs-CR-0312025","id":"DBLP:journals/corr/cs-CR-0312025","bibbaseid":"bella-bistarelli-softconstraintprogrammingtoanalysingsecurityprotocols-2003","role":"author","urls":{"Paper":"http://arxiv.org/abs/cs/0312025"},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"article","biburl":"https://dblp.org/pid/53/6380.bib","creationDate":"2014-08-20T10:18:13.504Z","downloads":0,"keywords":[],"search_terms":["soft","constraint","programming","analysing","security","protocols","bella","bistarelli"],"title":"Soft Constraint Programming to Analysing Security Protocols","year":2003,"dataSources":["BdSNx7DFqX9RjWbWF","T6HLi2LBH4teAezac","LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y"]}