Intruder deduction problem for locally stable theories with normal forms and inverses
From MaRDI portal
(Redirected from Publication:683746)
Recommendations
Cites work
- scientific article; zbMATH DE number 3572260 (Why is no real title available?)
- scientific article; zbMATH DE number 3639144 (Why is no real title available?)
- scientific article; zbMATH DE number 1234104 (Why is no real title available?)
- scientific article; zbMATH DE number 610968 (Why is no real title available?)
- scientific article; zbMATH DE number 2043528 (Why is no real title available?)
- A Trace Based Bisimulation for the Spi Calculus: An Extended Abstract
- A proof theoretic analysis of intruder theories
- An NP decision procedure for protocol insecurity with XOR
- An algorithm to generate the basis of solutions to homogeneous linear Diophantine equations
- Automatic recognition of tractability in inference relations
- Computer Aided Verification
- Deciding knowledge in security protocols under equational theories
- Deducibility Constraints, Equational Theory and Electronic Money
- Easy intruder deduction problems with homomorphisms
- Efficient solution of linear diophantine equations
- Elementary deduction problem for locally stable theories with normal forms
- FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- Mobile values, new names, and secure communication
- On the security of public key protocols
- Programming Languages and Systems
- Reduction of the intruder deduction problem into equational elementary deduction for electronic purse protocols with blind signatures
- Term Rewriting and Applications
- Unification theory
- YAPA: a generic tool for computing intruder knowledge
Cited in
(7)- Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity
- A Proof Theoretic Analysis of Intruder Theories
- When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus
- Elementary deduction problem for locally stable theories with normal forms
- Term Rewriting and Applications
- A proof theoretic analysis of intruder theories
- Computing knowledge in equational extensions of subterm convergent theories
This page was built for publication: Intruder deduction problem for locally stable theories with normal forms and inverses
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q683746)