Author:
Jacquemard Florent,Lozes Étienne,Treinen Ralf,Villard Jules
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Abadi, M., Cortier, V.: Deciding Knowledge in Security Protocols under Equational Theories. Theoretical Computer Science 367(1-2), 2–32 (2006)
2. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL 2001 (2001)
3. Baader, F., Snyder, W.: Unification theory. In: Handbook of Automated Reasoning, vol. I, ch. 8, pp. 445–532. Elsevier and MIT Press (2001)
4. Blumensath, A., Grädel, E.: Automatic structures. In: Logic in Computer Science, Santa Barbara, CA, pp. 51–62 (June 2000)
5. Lecture Notes in Computer Science;A.-C. Caron,1993