Graph-Based Algorithms for Boolean Function Manipulation
IEEE Transactions on Computers
ACM Transactions on Computer Systems (TOCS)
Reasoning about knowledge
Model checking
Introduction to Multiagent Systems
Introduction to Multiagent Systems
Alternating-time temporal logic
Journal of the ACM (JACM)
Analysing a Stream Authentication Protocol Using Model Checking
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Complete Axiomatizations for Reasoning about Knowledge and Time
SIAM Journal on Computing
A complete and decidable security-specialised logic and its application to the TESLA protocol
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
DALT'05 Proceedings of the Third international conference on Declarative Agent Languages and Technologies
The AVISPA tool for the automated validation of internet security protocols and applications
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
A complete and decidable axiomatisation for deontic interpreted systems
DEON'06 Proceedings of the 8th international conference on Deontic Logic and Artificial Normative Systems
MCMAS: a model checker for multi-agent systems
TACAS'06 Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Symbolic model checking for temporal-epistemic logics
ACM SIGACT News
Protocol analysis through alternating-time temporal logic and timed petri net models
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Automatic verification of epistemic specifications under convergent equational theories
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Hi-index | 0.00 |
We use MCMAS-X to verify authentication properties in the TESLA secure stream protocol. MCMAS-Xis an extension to explicit and deductive knowledge of the OBDD-based model checker MCMAS a verification tool for multi-agent systems.