Author of the publication

A General Approach to the Verification of Cryptographic Protocols Using Answer Set Programming.

, , and . LPNMR, volume 5753 of Lecture Notes in Computer Science, page 355-367. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Use of Causal Rules to Specify How Trust Impacts Change in Knowledge and Belief.. Canadian AI, Canadian Artificial Intelligence Association, (2021)Trust Graphs for Belief Revision: Framework and Implementation., and . NMR, volume 3197 of CEUR Workshop Proceedings, page 39-48. CEUR-WS.org, (2022)Structured Documents: Signatures and Deception.. EISIC, page 274-277. IEEE Computer Society, (2012)On the Replaceability of Computational Agents in an Ethical Theory.. ICAART (2), page 664-669. SciTePress, (2017)Increasing the Efficiency of HVAC Systems using Schedule-Based Control., , and . UEMCON, page 238-243. IEEE, (2022)Belief Manipulation: A Formal Model of Deceit in Message Passing Systems.. PAISI, volume 8039 of Lecture Notes in Computer Science, page 1-8. Springer, (2013)Learning to Model Another Agent's Beliefs: A Preliminary Approach., and . AGI, volume 12177 of Lecture Notes in Computer Science, page 216-220. Springer, (2020)Using Answer Sets to Solve Belief Change Problems., , and . LPNMR, volume 4483 of Lecture Notes in Computer Science, page 272-277. Springer, (2007)Security and trust for surveillance cameras., and . CNS, page 384-385. IEEE, (2017)Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary.. EuroISI, volume 5376 of Lecture Notes in Computer Science, page 61-72. Springer, (2008)