Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures
From MaRDI portal
Publication:2268100
Recommendations
Cites work
- scientific article; zbMATH DE number 4016226 (Why is no real title available?)
- scientific article; zbMATH DE number 1142316 (Why is no real title available?)
- scientific article; zbMATH DE number 1948405 (Why is no real title available?)
- scientific article; zbMATH DE number 1754628 (Why is no real title available?)
- Complexity of nilpotent unification and matching problems.
- Computer Aided Verification
- Easy intruder deductions
- Foundations of Software Science and Computation Structures
- Mathematical Foundations of Computer Science 2003
- Mobile values, new names, and secure communication
- On the freedom of decryption
- On the security of public key protocols
- On the symbolic reduction of processes with cryptographic functions.
- Programming Languages and Systems
- Programming Languages and Systems
- STACS 2004
- The NRL Protocol Analyzer: An Overview
- Unification in a combination of arbitrary disjoint equational theories
- Unification in the union of disjoint equational theories: Combining decision procedures
Cited in
(5)
This page was built for publication: Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2268100)