Author:
Hanna Erin,Lynch Christopher,Myers David Jaz,Richardson Corey
Publisher
Springer International Publishing
Reference11 articles.
1. Anantharaman, S., Lin, H., Lynch, C., Narendran, P., Rusinowitch M.: Cap unification: application to protocol security modulo homomorphic encryption. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, 13–16 April 2010, pp. 192–203 (2010)
2. Lecture Notes in Computer Science;S Anantharaman,2007
3. Baader, F., Snyder, W.: Unification theory. Handbook of Automated Reasoning, vol. 1, pp. 445–532. Elsevier, Amsterdam (2001)
4. Comon, H., et al. Tree automata techniques and applications (2007).
http://www.grappa.univ-lille3.fr/tata
. Accessed 12 Oct 2007
5. Comon-Lundh, H., Cortier, V., Zalinescu, E.: Deciding security properties for cryptographic protocols. Application to key cycles. ACM Trans. Comput. Log. 11(2), 9 (2010)