Sciweavers

2432 search results - page 49 / 487
» Cryptographic logical relations
Sort
View
KI
2006
Springer
14 years 10 months ago
Agent Logics as Program Logics: Grounding KARO
Abstract. Several options are available to relate agent logics to computational agent systems. Among others, one can try to find useful executable fragments of an agent logic or us...
Koen V. Hindriks, John-Jules Ch. Meyer
ATAL
2007
Springer
15 years 4 months ago
A temporal epistemic logic with a reset operation
We present an axiomatisation for an extension of a temporal epistemic logic with an epistemic “reset” operator defined on the intersection between epistemic and temporal rela...
Alessio Lomuscio, Bozena Wozna
LPNMR
1999
Springer
15 years 2 months ago
A Comparison of Sceptical NAF-Free Logic Programming Approaches
Recently there has been increased interest in logic programming-based default reasoning approaches which are not using negation-as-failure in their object language. Instead, defau...
Grigoris Antoniou, Michael J. Maher, David Billing...
LPAR
2010
Springer
14 years 8 months ago
Human and Unhuman Commonsense Reasoning
Ford has introduced a non-monotonic logic, System LS, inspired by an empirical study of human non-monotonic reasoning. We define here a defeasible logic FDL based on Ford’s logi...
Michael J. Maher
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
15 years 3 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani