Search the dblp DataBase
Iliano Cervesato :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Iliano Cervesato Petri Nets and Linear Logic: a Case Study for Logic Programming. [Citation Graph (0, 0)][DBLP ] GULP-PRODE, 1995, pp:313-320 [Conf ] Iliano Cervesato , Luca Chittaro , Angelo Montanari What the Event Calculus actually does, and how to do it efficiently. [Citation Graph (0, 0)][DBLP ] GULP-PRODE (2), 1994, pp:336-350 [Conf ] Iliano Cervesato , Gianfranco Rossi A WAM Implementation for the Logic Meta Programming Language 'Log. [Citation Graph (0, 0)][DBLP ] GULP, 1993, pp:203-214 [Conf ] Iliano Cervesato , Nancy A. Durgin , Patrick Lincoln , John C. Mitchell , Andre Scedrov A Meta-Notation for Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:55-69 [Conf ] Iliano Cervesato , Nancy A. Durgin , John C. Mitchell , Patrick Lincoln , Andre Scedrov Relating Strands and Multiset Rewriting for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:35-51 [Conf ] Iliano Cervesato , Catherine Meadows , Dusko Pavlovic An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:48-61 [Conf ] Frederick Butler , Iliano Cervesato , Aaron D. Jaggard , Andre Scedrov A Formal Analysis of Some Properties of Kerberos 5 Using MSR. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:175-0 [Conf ] Angelo Montanari , Luca Chittaro , Iliano Cervesato A General Modal Framework for the Event Calculus and its Skeptical and Credulous Variants. [Citation Graph (0, 0)][DBLP ] ECAI, 1996, pp:33-37 [Conf ] Iliano Cervesato , Joshua S. Hodas , Frank Pfenning Efficient Resource Management for Linear Logic Proof Search. [Citation Graph (0, 0)][DBLP ] ELP, 1996, pp:67-81 [Conf ] Michael Backes , Iliano Cervesato , Aaron D. Jaggard , Andre Scedrov , Joe-Kai Tsay Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:362-383 [Conf ] Stefano Bistarelli , Iliano Cervesato , Gabriele Lenzini , Roberto Marangoni , Fabio Martinelli On Representing Biological Systems through Multiset Rewriting. [Citation Graph (0, 0)][DBLP ] EUROCAST, 2003, pp:415-426 [Conf ] Paul F. Syverson , Iliano Cervesato The Logic of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] FOSAD, 2000, pp:63-136 [Conf ] Iliano Cervesato Proof-Theoretic Foundation of Compilation in Logic Programming. [Citation Graph (0, 0)][DBLP ] IJCSLP, 1998, pp:115-129 [Conf ] Iliano Cervesato , Luca Chittaro , Angelo Montanari A Modal Calculus of Partially Ordered Events in a Logic Programming Framework. [Citation Graph (0, 0)][DBLP ] ICLP, 1995, pp:299-313 [Conf ] Iliano Cervesato , Massimo Franceschet , Angelo Montanari The Complexity of Model Checking in Modal Event Calculi. [Citation Graph (0, 0)][DBLP ] ICLP, 1997, pp:419- [Conf ] Frederick Butler , Iliano Cervesato , Aaron D. Jaggard , Andre Scedrov Verifying Confidentiality and Authentication in Kerberos 5. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:1-24 [Conf ] Iliano Cervesato Data Access Specification and the Most Powerful Symbolic Attacker in MSR. [Citation Graph (0, 0)][DBLP ] ISSS, 2002, pp:384-416 [Conf ] Iliano Cervesato , Nancy A. Durgin , Patrick Lincoln , John C. Mitchell , Andre Scedrov A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ISSS, 2002, pp:356-383 [Conf ] Iliano Cervesato , Massimo Franceschet , Angelo Montanari The Complexity of Model Checking in Modal Event Calculi with Quantifiers. [Citation Graph (0, 0)][DBLP ] KR, 1998, pp:368-379 [Conf ] Iliano Cervesato , Frank Pfenning A Linear Logical Framework. [Citation Graph (0, 0)][DBLP ] LICS, 1996, pp:264-275 [Conf ] Iliano Cervesato , Frank Pfenning Linear Higher-Order Pre-Unification. [Citation Graph (0, 0)][DBLP ] LICS, 1997, pp:422-433 [Conf ] Iliano Cervesato , Gianfranco Rossi Logic Meta-Programming Facilities in 'LOG. [Citation Graph (0, 0)][DBLP ] META, 1992, pp:148-161 [Conf ] Stefano Bistarelli , Iliano Cervesato , Gabriele Lenzini , Fabio Martinelli Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:86-99 [Conf ] Iliano Cervesato Typed MSR: Syntax and Examples. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:159-177 [Conf ] Iliano Cervesato , Christoph F. Eick Expression and Enforcement of Dynamic Integrity Constraints. [Citation Graph (0, 0)][DBLP ] SEBD, 1993, pp:283-298 [Conf ] Iliano Cervesato , Luca Chittaro , Angelo Montanari Modal Event Calculus. [Citation Graph (0, 0)][DBLP ] SLP, 1994, pp:675- [Conf ] Iliano Cervesato , Massimo Franceschet , Angelo Montanari Modal Event Calculi with Preconditions. [Citation Graph (0, 0)][DBLP ] TIME, 1997, pp:38-45 [Conf ] Iliano Cervesato , Massimo Franceschet , Angelo Montanari Event Calculus with Explicit Quantifiers. [Citation Graph (0, 0)][DBLP ] TIME, 1998, pp:81-88 [Conf ] Iliano Cervesato , Angelo Montanari A Calculus of Macro-Events: Progress Report. [Citation Graph (0, 0)][DBLP ] TIME, 2000, pp:47-58 [Conf ] Kevin Watkins , Iliano Cervesato , Frank Pfenning , David Walker A Concurrent Logical Framework: The Propositional Fragment. [Citation Graph (0, 0)][DBLP ] TYPES, 2003, pp:355-377 [Conf ] Iliano Cervesato , Massimo Franceschet , Angelo Montanari A Guided Tour through Some Extensions of the Event Calculus. [Citation Graph (0, 0)][DBLP ] Computational Intelligence, 2000, v:16, n:2, pp:307-347 [Journal ] Iliano Cervesato Typed Multiset Rewriting Specifications of Security Protocols. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal ] Iliano Cervesato , Mark-Oliver Stehr Representing the MSR Cryptoprotocol Specification Language in an Extension of Rewriting Logic with Dependent Types. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:117, n:, pp:183-207 [Journal ] Iliano Cervesato , Andre Scedrov Relating State-Based and Process-Based Concurrency through Linear Logic. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:165, n:, pp:145-176 [Journal ] Iliano Cervesato , Massimo Franceschet , Angelo Montanari The Complexity of Model Checking in Modal Event Calculi with Quantifiers. [Citation Graph (0, 0)][DBLP ] Electron. Trans. Artif. Intell., 1998, v:2, n:, pp:1-23 [Journal ] Iliano Cervesato , Frank Pfenning A Linear Logical Framework. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2002, v:179, n:1, pp:19-75 [Journal ] Serge Autexier , Iliano Cervesato , Heiko Mantel Preface to the special issue of selected papers from FCS/VERIFY 2002. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:1- [Journal ] Stefano Bistarelli , Iliano Cervesato , Gabriele Lenzini , Fabio Martinelli Relating multiset rewriting and process algebras for security protocol analysis. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:1, pp:3-47 [Journal ] Iliano Cervesato , Nancy A. Durgin , Patrick Lincoln A comparison between strand spaces and multiset rewriting for security protocol analysis. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:2, pp:265-316 [Journal ] Catherine Meadows , Paul F. Syverson , Iliano Cervesato Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:6, pp:893-931 [Journal ] Iliano Cervesato , Angelo Montanari A General Modal Framework for the Event Calculus and Its Skeptical and Credulous Variants. [Citation Graph (0, 0)][DBLP ] J. Log. Program., 1999, v:38, n:2, pp:111-164 [Journal ] Iliano Cervesato , Frank Pfenning A Linear Spine Calculus. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 2003, v:13, n:5, pp:639-688 [Journal ] Frederick Butler , Iliano Cervesato , Aaron D. Jaggard , Andre Scedrov , Christopher Walstad Formal analysis of Kerberos 5. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:57-87 [Journal ] Iliano Cervesato , Joshua S. Hodas , Frank Pfenning Efficient resource management for linear logic proof search. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2000, v:232, n:1-2, pp:133-163 [Journal ] Iliano Cervesato , Mark-Oliver Stehr Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types. [Citation Graph (0, 0)][DBLP ] Higher-Order and Symbolic Computation, 2007, v:20, n:1-2, pp:3-35 [Journal ] Iliano Cervesato , Catherine Meadows One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:216-227 [Journal ] Breaking and Fixing Public-Key Kerberos. [Citation Graph (, )][DBLP ] Specifying Kerberos 5 cross-realm authentication. [Citation Graph (, )][DBLP ] Specifying Properties of Concurrent Computations in CLF. [Citation Graph (, )][DBLP ] Search in 0.037secs, Finished in 0.039secs