Author:
Escobar Santiago,Meadows Catherine,Meseguer José,Santiago Sonia
Publisher
Springer International Publishing
Reference25 articles.
1. Baader, F., Schulz, K.U.: Combination techniques and decision problems for disunification. Theor. Comput. Sci. 142(2), 229–255 (1995)
2. Blanchet, B.: Using horn clauses for analyzing security protocols. In: Cortier, V., Kremer, S. (eds.) Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series, vol. 5, pp. 86–111. IOS Press, March 2011
3. Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. J. Log. Algebr. Program. 75(1), 3–51 (2008)
4. Comon, H., Lescanne, P.: Equational problems and disunification. J. Symb. Comput. 7, 371–425 (1989)
5. Lecture Notes in Computer Science;H Comon,1991
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Strand Spaces with Choice via a Process Algebra Semantics;Analysis, Verification and Transformation for Declarative Programming and Intelligent Systems;2023
2. Protocol Analysis with Time and Space;Protocols, Strands, and Logic;2021
3. Generalized rewrite theories, coherence completion, and symbolic methods;Journal of Logical and Algebraic Methods in Programming;2020-01
4. Protocol Analysis with Time;Progress in Cryptology – INDOCRYPT 2020;2020
5. Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method;Foundations of Security, Protocols, and Equational Reasoning;2019