Satisfiability of general intruder constraints with and without a set constructor (Q507349): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: Michaël Rusinowitch / rank
Normal rank
 
Property / author
 
Property / author: Michaël Rusinowitch / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1876319183 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536615 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounding Messages for Free in Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tools and algorithms for the construction and analysis of systems. 20th international conference, TACAS 2014, held as part of the European joint conferences on theory and practice of software, ETAPS 2014, Grenoble, France, April 5--13, 2014. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Satisfiability of general intruder constraints with and without a set constructor / rank
 
Normal rank
Property / cites work
 
Property / cites work: Term Rewriting and All That / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Intruder Deductions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A dexptime-Complete Dolev-Yao Theory with Distributive Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Associative-Commutative Deducibility Constraints / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures / rank
 
Normal rank
Property / cites work
 
Property / cites work: An NP decision procedure for protocol insecurity with XOR / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards an Automatic Analysis of Web Service Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Software Science and Computation Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decidability and combination results for two notions of knowledge in security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symbolic protocol analysis for monoidal equational theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2819403 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient General Unification for XOR with Homomorphism / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information and Communications Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2848039 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lazy Mobile Intruders / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / cites work
 
Property / cites work: The CL-Atse Protocol Analyser / rank
 
Normal rank

Latest revision as of 09:54, 13 July 2024

scientific article
Language Label Description Also known as
English
Satisfiability of general intruder constraints with and without a set constructor
scientific article

    Statements

    Satisfiability of general intruder constraints with and without a set constructor (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    6 February 2017
    0 references
    0 references
    0 references
    0 references
    0 references
    ACI
    0 references
    deducibility constraints
    0 references
    Dolev-Yao deduction system
    0 references
    multiple intruders
    0 references
    security
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references