STACS 2004
From MaRDI portal
Publication:5309716
DOI10.1007/b96012zbMath1122.94383OpenAlexW4236485840MaRDI QIDQ5309716
Publication date: 1 October 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b96012
Related Items (8)
Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later ⋮ Tree automata with equality constraints modulo equational theories ⋮ Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol ⋮ Transducer-based analysis of cryptographic protocols ⋮ Compositions of extended top-down tree transducers ⋮ Hierarchical combination of intruder theories ⋮ Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures ⋮ Deciding Security for Protocols with Recursive Tests
This page was built for publication: STACS 2004