Soft Constraint Programming to Analysing Security Protocols. Bella, G. & Bistarelli, S. Theory Pract. Log. Program., 4(5-6):545–572, 2004. Paper doi bibtex @article{DBLP:journals/tplp/BellaB04,
author = {Giampaolo Bella and
Stefano Bistarelli},
title = {Soft Constraint Programming to Analysing Security Protocols},
journal = {Theory Pract. Log. Program.},
volume = {4},
number = {5-6},
pages = {545--572},
year = {2004},
url = {https://doi.org/10.1017/S1471068404002121},
doi = {10.1017/S1471068404002121},
timestamp = {Thu, 13 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tplp/BellaB04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":{"_str":"53f475e53d9d602c1a001298"},"__v":0,"authorIDs":["5457089d8b01c8193000012f"],"author_short":["Bella, G.","Bistarelli, S."],"bibbaseid":"bella-bistarelli-softconstraintprogrammingtoanalysingsecurityprotocols-2004","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Giampaolo"],"propositions":[],"lastnames":["Bella"],"suffixes":[]},{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]}],"title":"Soft Constraint Programming to Analysing Security Protocols","journal":"Theory Pract. Log. Program.","volume":"4","number":"5-6","pages":"545–572","year":"2004","url":"https://doi.org/10.1017/S1471068404002121","doi":"10.1017/S1471068404002121","timestamp":"Thu, 13 Feb 2020 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/tplp/BellaB04.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/tplp/BellaB04,\n author = {Giampaolo Bella and\n Stefano Bistarelli},\n title = {Soft Constraint Programming to Analysing Security Protocols},\n journal = {Theory Pract. Log. Program.},\n volume = {4},\n number = {5-6},\n pages = {545--572},\n year = {2004},\n url = {https://doi.org/10.1017/S1471068404002121},\n doi = {10.1017/S1471068404002121},\n timestamp = {Thu, 13 Feb 2020 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/tplp/BellaB04.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bella, G.","Bistarelli, S."],"key":"DBLP:journals/tplp/BellaB04","id":"DBLP:journals/tplp/BellaB04","bibbaseid":"bella-bistarelli-softconstraintprogrammingtoanalysingsecurityprotocols-2004","role":"author","urls":{"Paper":"https://doi.org/10.1017/S1471068404002121"},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"article","biburl":"https://dblp.org/pid/53/6380.bib","creationDate":"2014-08-20T10:18:13.698Z","downloads":0,"keywords":[],"search_terms":["soft","constraint","programming","analysing","security","protocols","bella","bistarelli"],"title":"Soft Constraint Programming to Analysing Security Protocols","year":2004,"dataSources":["BdSNx7DFqX9RjWbWF","T6HLi2LBH4teAezac","LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y"]}