scientific article; zbMATH DE number 2043528
From MaRDI portal
Publication:4447232
zbMATH Open1043.94537MaRDI QIDQ4447232FDOQ4447232
Lida Wang, Paliath Narendran, Deepak Kapur
Publication date: 16 February 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2706/27060165.htm
Title of this publication is not available (Why is that?)
Recommendations
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases) (13P10) Grammars and rewriting systems (68Q42)
Cited In (11)
- Programming Languages and Systems
- Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically
- Intruder deduction problem for locally stable theories with normal forms and inverses
- An NP decision procedure for protocol insecurity with XOR
- Simulation relations for alternating Büchi automata
- Hierarchical combination of intruder theories
- Mechanizing Mathematical Reasoning
- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
- Symbolic protocol analysis for monoidal equational theories
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
- Bounded ACh unification
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4447232)