Keyphrases
- security analysis
- theorem proving
- consequence finding
- logical inference
- smart card
- security requirements
- public key
- first order logic
- theorem prover
- term rewriting
- proof planning
- high security
- parallel search
- encryption scheme
- inference rules
- user authentication
- proof procedure
- mutual authentication
- geometry theorem proving
- abductive reasoning
- authentication protocol
- proof search
- truth maintenance systems
- authentication scheme
- bayesian networks