HOL98 Draft User's Manual - Athabasca Release - Version 2 (1999)

Cached

Download Links

by Konrad Slind
Citations:3 - 0 self

Documents Related by Co-Citation

43 Introduction to HOL: a theorem-proving environment for higher-order logic – M J C Gordon, T F Melham - 1993
20 Optimizing proof search in model elimination – John Harrison, Turku Centre For - 1996
7 First-order automation for higher-order-logic theorem proving – H Busch - 1994
1 of the documentation included with the hol98 theorem-prover – Part
1 The HOL Light manual (1.0) – John Harrison - 1998
2 Gandalf Version c−1.0c Reference Manual – T Tammet - 1997
13 Integrating a First-Order Automatic Prover in the HOL Environment – Ramayya Kumar, Thomas Kropf, Klaus Schneider - 1991
42 A Resolution Theorem Prover for Intuitionistic Logic – Tanel Tammet - 1996
11 Towards efficient subsumption – Tanel Tammet - 1998
31 Integrating Automated and Interactive Theorem Proving – Wolfgang Ahrendt, Bernhard Beckert, Reiner Hähnle, Wolfram Menzel, Wolfgang Reif, Gerhard Schellhorn, Peter H. Schmitt - 1998
3 Vitaly Shmatikov and Ulrich Stern. Finite-State Analysis – John C Mitchell - 1998
1 Wen and Fumio Mizoguchi. Incremental Analysis and Veri of Authentication – Takamichi Saito, Wu - 1999
150 Proving Properties of Security Protocols by Induction – Lawrence C. Paulson - 1997
29 Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys – Lawrence C. Paulson - 1997
274 Why Cryptosystems Fail – Ross Anderson - 2005
860 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
845 A Formulation of the Simple Theory of Types – A Church - 1940
611 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996