The following pages link to (Q2848034):
Displayed 4 items.
- Intruder deducibility constraints with negation. Decidability and application to secured service compositions (Q507348) (← links)
- Tree automata with equality constraints modulo equational theories (Q2426520) (← links)
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties (Q3184784) (← links)
- Verifying Cryptographic Protocols with Subterms Constraints (Q3498465) (← links)