Author:
Baskar A.,Ramanujam R.,Suresh S. P.
Publisher
Springer International Publishing
Reference14 articles.
1. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1–2), 2–32 (2006).
https://doi.org/10.1016/j.tcs.2006.08.032
2. Avanesov, T., Chevalier, Y., Rusinowitch, M., Turuani, M.: Satisfiability of general intruder constraints with and without a set constructor. J. Symbolic Comput. 80, 27–61 (2017).
https://doi.org/10.1016/j.jsc.2016.07.009
3. Baskar, A.: Decidability results for extended Dolev-Yao theories. Ph.D. thesis, Chennai Mathematical Institute (2011)
4. Baskar, A., Ramanujam, R., Suresh, S.: Dolev-Yao theory with associative blindpair operators, Technical report (2019).
http://www.cmi.ac.in/~spsuresh/pdfs/ciaa19-tr.pdf
5. Baskar, A., Ramanujam, R., Suresh, S.P.: Knowledge-based modelling of voting protocols. In: Samet, D. (ed.) TARK 2007, pp. 62–71 (2007).
https://doi.org/10.1145/1324249.1324261
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献