- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal"
- exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics"
- boolean and: separate words by space
e.g., codd model
- boolean or: connect words by pipe symbol (|)
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
found 3 matches
- Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool. J. Commun. 8(11): 795-805 (2013)
- Shujing Wang, Yan Zhang:
A Logic Programming Based Framework for Security Protocol Verification. ISMIS 2008: 638-643
- Koji Hasebe, Mitsuhiro Okada:
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic. ISSS 2002: 417-440
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.