Security Protocols, Constraint Systems, and Group Theories
From MaRDI portal
Publication:2908488
DOI10.1007/978-3-642-31365-3_15zbMath1358.68185OpenAlexW1494214213MaRDI QIDQ2908488
Daniel Pasaila, Stéphanie Delaune, Steve Kremer
Publication date: 5 September 2012
Published in: Automated Reasoning (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-31365-3_15
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Logic in computer science (03B70) Specification and verification (program logics, model checking, etc.) (68Q60)
Related Items (1)
This page was built for publication: Security Protocols, Constraint Systems, and Group Theories