Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Term Rewriting and Applications - MaRDI portal

Term Rewriting and Applications

From MaRDI portal
Publication:5703857

DOI10.1007/b135673zbMath1078.68059OpenAlexW2504734884MaRDI QIDQ5703857

Stéphanie Delaune, Hubert Comon-Lundh

Publication date: 11 November 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b135673




Related Items (42)

Non-disjoint combined unification and closure by equational paramodulationModel Checking Security ProtocolsSymbolic Protocol Analysis with Disequality Constraints Modulo Equational TheoriesMaude-NPA: Cryptographic Protocol Analysis Modulo Equational PropertiesOptimization of rewrite theories by equational partial evaluationMetalevel algorithms for variant satisfiabilityAlice and Bob Meet Equational TheoriesTwo Decades of MaudeEmerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years LaterTwenty years of rewriting logicAn efficient canonical narrowing implementation with irreducibility and SMT constraints for generic symbolic protocol analysisUnnamed ItemVariants and satisfiability in the infinitary unification wonderlandVariant-based equational anti-unificationOptimizing Maude programs via program specializationEffectively Checking the Finite Variant PropertyUnnamed ItemUnnamed ItemChallenges in the Automated Verification of Security ProtocolsComputing knowledge in equational extensions of subterm convergent theoriesBeyond Subterm-Convergent Equational Theories in Automated Verification of Stateful ProtocolsA survey of symbolic methods for establishing equivalence-based properties in cryptographic protocolsSymbolic protocol analysis for monoidal equational theoriesHierarchical combination of intruder theoriesReducing protocol analysis with XOR to the XOR-free case in the Horn theory based approachTermination of narrowing via termination of rewritingVariant Narrowing and Equational UnificationA procedure for deciding symbolic equivalence between sets of constraint systemsVariant-Based Satisfiability in Initial AlgebrasGeneralized rewrite theories, coherence completion, and symbolic methodsProgramming and symbolic computation in MaudeA partial evaluation framework for order-sorted equational programs modulo axiomsGround confluence of order-sorted conditional specifications modulo axiomsAutomated Verification of Equivalence Properties of Cryptographic ProtocolsBuilt-in Variant Generation and Unification, and Their Applications in Maude 2.7Combining proverif and automated theorem provers for security protocol verificationProtocol Security and Algebraic Properties: Decision Results for a Bounded Number of SessionsMetalevel Algorithms for Variant SatisfiabilityTermination Modulo Combinations of Equational TheoriesEquational unification and matching, and symbolic reachability analysis in Maude 3.2 (system description)Symbolic computation in Maude: some tapasTerminating non-disjoint combined unification







This page was built for publication: Term Rewriting and Applications