The following pages link to Verification: Theory and Practice (Q5305643):
Displaying 13 items.
- Unification modulo homomorphic encryption (Q437037) (← links)
- Decidability and combination results for two notions of knowledge in security protocols (Q437043) (← links)
- Deciding knowledge in security protocols under equational theories (Q860894) (← links)
- Intruder deduction for the equational theory of abelian groups with distributive encryption (Q876047) (← links)
- Easy intruder deduction problems with homomorphisms (Q1045939) (← links)
- Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures (Q2268100) (← links)
- Symbolic protocol analysis for monoidal equational theories (Q2482449) (← links)
- Hierarchical combination of intruder theories (Q2482450) (← links)
- Model Checking Security Protocols (Q3176380) (← links)
- Challenges in the Automated Verification of Security Protocols (Q3541719) (← links)
- Locality Results for Certain Extensions of Theories with Bridging Functions (Q5191097) (← links)
- The Complexity of Disjunction in Intuitionistic Logic (Q5283439) (← links)
- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR (Q5862666) (← links)