scientific article; zbMATH DE number 2043528
From MaRDI portal
Publication:4447232
zbMath1043.94537MaRDI QIDQ4447232
Lida Wang, Paliath Narendran, Deepak Kapur
Publication date: 16 February 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2706/27060165.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Gröbner bases; other bases for ideals and modules (e.g., Janet and border bases) (13P10) Grammars and rewriting systems (68Q42)
Related Items (9)
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols ⋮ Bounded ACh unification ⋮ Intruder deduction problem for locally stable theories with normal forms and inverses ⋮ Symbolic protocol analysis for monoidal equational theories ⋮ Hierarchical combination of intruder theories ⋮ Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically ⋮ An NP decision procedure for protocol insecurity with XOR ⋮ Simulation relations for alternating Büchi automata ⋮ Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
This page was built for publication: