Hierarchical Combination of Intruder Theories
From MaRDI portal
Publication:3527287
DOI10.1007/11805618_9zbMath1151.68630OpenAlexW1489516665MaRDI QIDQ3527287
Michaël Rusinowitch, Yannick Chevalier
Publication date: 25 September 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11805618_9
Related Items (4)
Decidability and combination results for two notions of knowledge in security protocols ⋮ Challenges in the Automated Verification of Security Protocols ⋮ Symbolic protocol analysis for monoidal equational theories ⋮ Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
This page was built for publication: Hierarchical Combination of Intruder Theories