Pages that link to "Item:Q540685"
From MaRDI portal
The following pages link to Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach (Q540685):
Displaying 4 items.
- Satisfiability of general intruder constraints with and without a set constructor (Q507349) (← links)
- Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach (Q540685) (← links)
- Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case (Q3636822) (← links)
- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif (Q5253587) (← links)