|
Volumn , Issue , 2003, Pages 271-280
|
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ALGEBRA;
COMPUTABILITY AND DECIDABILITY;
CRYPTOGRAPHY;
PROBLEM SOLVING;
THEOREM PROVING;
AUTHENTICATION;
COMPUTER SCIENCE;
CONSTRAINT THEORY;
POLYNOMIALS;
CONSTRAINT SYSTEMS;
NETWORK PROTOCOLS;
GROUP THEORY;
ALGEBRAIC PROPERTIES;
CONTEXT MODELING;
CRYPTOGRAPHIC PRIMITIVES;
CRYPTOGRAPHIC PROTOCOLS;
EQUATIONS;
LOGIC;
REACHABILITY PROBLEM;
SYMBOLIC VERIFICATION;
|
EID: 0042467908
PISSN: 10436871
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (119)
|
References (19)
|