Pages that link to "Item:Q683746"
From MaRDI portal
The following pages link to Intruder deduction problem for locally stable theories with normal forms and inverses (Q683746):
Displaying 6 items.
- Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity (Q2119978) (← links)
- Computing knowledge in equational extensions of subterm convergent theories (Q5139279) (← links)
- Term Rewriting and Applications (Q5703858) (← links)
- A proof theoretic analysis of intruder theories (Q5890483) (← links)
- A Proof Theoretic Analysis of Intruder Theories (Q5902125) (← links)
- When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus (Q6041667) (← links)