scientific article

From MaRDI portal
Publication:2723425

zbMath0963.94016MaRDI QIDQ2723425

Francis Klay, Thomas Genet

Publication date: 5 July 2001


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (33)

Alternating two-way AC-tree automataDescendants of a recognizable tree language for prefix constrained linear monadic term rewriting with position cutting strategyDescendants of a recognizable tree language for sets of linear monadic term rewrite rulesThe Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security ProtocolsAutomatic verification of secrecy properties for linear logic specifications of cryptographic protocolsComplete symbolic reachability analysis using back-and-forth narrowingInjective synchronisation: An extension of the authentication hierarchyA rewriting-based inference system for the NRL protocol analyzer and its meta-logical propertiesTree pattern matching from regular tree expressionsSymbolic reachability analysis using narrowing and its application to verification of cryptographic protocolsTowards more precise rewriting approximationsTree automata with equality constraints modulo equational theoriesOn Proving Soundness of the Computationally Equivalent Transformation for Normal Conditional Term Rewriting Systems by Using UnravelingsTree automata for rewrite strategiesSymbol different term rewrite systemsTransducer-based analysis of cryptographic protocolsReachability in Conditional Term Rewriting SystemsA theoretical limit for safety verification techniques with regular fix-point computationsOn the relationships between models in protocol verificationMatch-bounded string rewriting systemsAbstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automaticallyEquational approximations for tree automata completionTree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic PrimitivesRigid tree automata and applicationsReachability analysis over term rewriting systemsRigid Tree AutomataTAGED Approximations for Temporal Properties Model-CheckingSynchronized Tree Languages for Reachability in Non-right-linear Term Rewrite SystemsHandling Left-Quadratic Rules When Completing Tree AutomataHow to Tackle Integer Weighted Automata PositivityInformation based reasoning about security protocolsClosure properties and decision problems of dag automataTowards an Efficient Implementation of Tree Automata Completion


Uses Software






This page was built for publication: