Search dblp for Publications

export results for "toc:db/journals/jlp/jlp64.bht:"

 download as .bib file

@article{DBLP:journals/jlp/Amadio05,
  author       = {Roberto M. Amadio},
  title        = {Guest editor's introduction: Special issue on Modelling and Verification
                  of Cryptographic Protocols},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {155},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.001},
  doi          = {10.1016/J.JLAP.2004.09.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Amadio05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/AzizHG05,
  author       = {Benjamin Aziz and
                  Geoff W. Hamilton and
                  David Gray},
  title        = {A static analysis of cryptographic processes: the denotational approach},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {285--320},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.006},
  doi          = {10.1016/J.JLAP.2004.09.006},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/AzizHG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Backes05,
  author       = {Michael Backes},
  title        = {Unifying simulatability definitions in cryptographic systems under
                  different timing assumptions},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {157--188},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.002},
  doi          = {10.1016/J.JLAP.2004.09.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Backes05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Blanck05,
  author       = {Jens Blanck},
  title        = {Efficient exact computation of iterated maps},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {1},
  pages        = {41--59},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.07.004},
  doi          = {10.1016/J.JLAP.2004.07.004},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Blanck05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Boehm05,
  author       = {Hans{-}Juergen Boehm},
  title        = {The constructive reals as a Java library},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {1},
  pages        = {3--11},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.07.002},
  doi          = {10.1016/J.JLAP.2004.07.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Boehm05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/ChadhaMSS05,
  author       = {Rohit Chadha and
                  John C. Mitchell and
                  Andre Scedrov and
                  Vitaly Shmatikov},
  title        = {Contract signing, optimism, and advantage},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {189--218},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.003},
  doi          = {10.1016/J.JLAP.2004.09.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jlp/ChadhaMSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/EvansS05,
  author       = {Neil Evans and
                  Steve A. Schneider},
  title        = {Verifying security protocols with {PVS:} widening the rank function
                  approach},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {253--284},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.005},
  doi          = {10.1016/J.JLAP.2004.09.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/EvansS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Goubault-LarrecqRV05,
  author       = {Jean Goubault{-}Larrecq and
                  Muriel Roger and
                  Kumar Neeraj Verma},
  title        = {Abstraction and resolution modulo {AC:} How to verify Diffie-Hellman-like
                  protocols automatically},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {219--251},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.004},
  doi          = {10.1016/J.JLAP.2004.09.004},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Goubault-LarrecqRV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/LiPY05,
  author       = {Chen Li and
                  Sylvain Pion and
                  Chee{-}Keng Yap},
  title        = {Recent progress in exact geometric computation},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {1},
  pages        = {85--111},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.07.006},
  doi          = {10.1016/J.JLAP.2004.07.006},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/LiPY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Menissier-Morain05,
  author       = {Val{\'{e}}rie M{\'{e}}nissier{-}Morain},
  title        = {Arbitrary precision real arithmetic: design and algorithms},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {1},
  pages        = {13--39},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.07.003},
  doi          = {10.1016/J.JLAP.2004.07.003},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Menissier-Morain05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/MullerEZ05,
  author       = {Norbert Th. M{\"{u}}ller and
                  Mart{\'{\i}}n H{\"{o}}tzel Escard{\'{o}} and
                  Paul Zimmermann},
  title        = {Guest editors' introduction: Special issue on practical development
                  of exact real number computation},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {1},
  pages        = {1--2},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.07.001},
  doi          = {10.1016/J.JLAP.2004.07.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/MullerEZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/RevolMB05,
  author       = {Nathalie Revol and
                  Kyoko Makino and
                  Martin Berz},
  title        = {Taylor models and floating-point arithmetic: proof that arithmetic
                  operations are validated in {COSY}},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {1},
  pages        = {135--154},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.07.008},
  doi          = {10.1016/J.JLAP.2004.07.008},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/RevolMB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/SofroniouS05,
  author       = {Mark Sofroniou and
                  Giulia Spaletta},
  title        = {Precise numerical computation},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {1},
  pages        = {113--134},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.07.007},
  doi          = {10.1016/J.JLAP.2004.07.007},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/SofroniouS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Tsuiki05,
  author       = {Hideki Tsuiki},
  title        = {Real number computation with committed choice logic programming languages},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {1},
  pages        = {61--84},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.07.005},
  doi          = {10.1016/J.JLAP.2004.07.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Tsuiki05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics