Author:
Eeralla Ajay K.,Erbatur Serdar,Marshall Andrew M.,Ringeissen Christophe
Publisher
Springer International Publishing
Reference21 articles.
1. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1–2), 2–32 (2006)
2. Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press, New York (1998)
3. Baader, F., Schulz, K.U.: Unification in the union of disjoint equational theories: combining decision procedures. J. Symb. Comput. 21(2), 211–243 (1996)
4. Lecture Notes in Computer Science;D Basin,2003
5. Blanchet, B.: Modeling and verifying security protocols with the applied Pi calculus and ProVerif. Found. Trends Priv. Secur. 1(1–2), 1–135 (2016)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Terminating Non-disjoint Combined Unification;Logic-Based Program Synthesis and Transformation;2021
2. Non-disjoint Combined Unification and Closure by Equational Paramodulation;Frontiers of Combining Systems;2021
3. Variant-based Equational Unification under Constructor Symbols;Electronic Proceedings in Theoretical Computer Science;2020-09-19
4. Most General Variant Unifiers;Electronic Proceedings in Theoretical Computer Science;2019-09-19
5. Building and Combining Matching Algorithms;Lecture Notes in Computer Science;2019