关注
dusko pavlovic
dusko pavlovic
在 hawaii.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A derivation system and compositional logic for security protocols
A Datta, A Derek, JC Mitchell, D Pavlovic
Journal of Computer Security 13 (3), 423-482, 2005
2072005
A new description of orthogonal bases
B Coecke, D Pavlovic, J Vicary
Mathematical structures in computer science 23 (3), 555-567, 2013
2002013
Quantum measurements without sums
B Coecke, D Pavlovic
Mathematics of Quantum Computation and Quantum Technology, 577-620, 2007
1702007
A compositional logic for proving security properties of protocols
N Durgin, J Mitchell, D Pavlovic
Journal of Computer Security 11 (4), 677-721, 2003
1682003
Distance bounding protocols: Authentication logic analysis and collusion attacks
C Meadows, R Poovendran, D Pavlovic, LW Chang, P Syverson
Secure localization and time synchronization for wireless sensor and ad hoc …, 2007
1152007
A derivation system for security protocols and its logical formalization
A Datta, A Derek, JC Mitchell, D Pavlovic
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 109-125, 2003
1102003
Secure protocol composition
A Datta, A Derek, JC Mitchell, D Pavlovic
Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003
1092003
Classical and quantum structuralism
B Coecke, EO Paquette, D Pavlovic
Semantic Techniques in Quantum Computation, 29-69, 2008
108*2008
A compositional logic for protocol correctness
N Durgin, J Mitchell, D Pavlovic
Proceedings 14th IEEE Computer Security Foundations Workshop, 2001., 241,242 …, 2001
992001
Calculus in coinductive form
D Pavlovic, MH Escardó
Proceedings. Thirteenth Annual IEEE Symposium on Logic in Computer Science …, 1998
951998
An encapsulated authentication logic for reasoning about key distribution protocols
I Cervesato, C Meadows, D Pavlovic
18th IEEE Computer Security Foundations Workshop (CSFW'05), 48-61, 2005
702005
Predicates and fibrations: From type theoretical to category theoretical presentation of constructive logic.
D Pavlovic
611992
Deriving, attacking and defending the GDOI protocol
C Meadows, D Pavlovic
Computer Security–ESORICS 2004: 9th European Symposium on Research in …, 2004
562004
Monoidal computer I: Basic computability by string diagrams
D Pavlovic
Information and computation 226, 94-116, 2013
552013
Abstraction and refinement in protocol derivation
A Datta, A Derek, JC Mitchell, D Pavlovic
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 30-45, 2004
542004
Composition and refinement of behavioral specifications
D Pavlovic, DR Smith
Proceedings 16th Annual International Conference on Automated Software …, 2001
542001
Testing semantics: Connecting processes and process logics
D Pavlovic, M Mislove, JB Worrell
Algebraic Methodology and Software Technology: 11th International Conference …, 2006
512006
Quantum and classical structures in nondeterminstic computation
D Pavlovic
International Symposium on Quantum Interaction, 143-157, 2009
502009
Software development by refinement
D Pavlovic, DR Smith
Formal Methods at the Crossroads. From Panacea to Foundational Support: 10th …, 2003
502003
Categorical logic of names and abstraction in action calculi
D Pavlović
Mathematical Structures in Computer Science 7 (6), 619-637, 1997
501997
系统目前无法执行此操作,请稍后再试。
文章 1–20