Verification: Theory and Practice
From MaRDI portal
Publication:5305643
DOI10.1007/b12001zbMath1201.68049MaRDI QIDQ5305643
Ralf Treinen, Hubert Comon-Lundh
Publication date: 23 March 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b12001
68Q25: Analysis of algorithms and problem complexity
68P25: Data encryption (aspects in computer science)
Related Items
Locality Results for Certain Extensions of Theories with Bridging Functions, Unification modulo homomorphic encryption, Decidability and combination results for two notions of knowledge in security protocols, Deciding knowledge in security protocols under equational theories, Intruder deduction for the equational theory of abelian groups with distributive encryption, Easy intruder deduction problems with homomorphisms, Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures, Symbolic protocol analysis for monoidal equational theories, Hierarchical combination of intruder theories, Challenges in the Automated Verification of Security Protocols