메뉴 건너뛰기




Volumn 3467, Issue , 2005, Pages 294-307

The finite variant property: How to get rid of some algebraic properties

Author keywords

[No Author keywords available]

Indexed keywords

CONVERGENCE OF NUMERICAL METHODS; FINITE ELEMENT METHOD; INFORMATION THEORY; NETWORK PROTOCOLS; SET THEORY;

EID: 24944569389     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-32033-3_22     Document Type: Conference Paper
Times cited : (125)

References (19)
  • 1
    • 0027666854 scopus 로고
    • Complete axiomatizations of some quotient term algebras
    • H. Comon. Complete axiomatizations of some quotient term algebras. Theoretical Computer Science, 118(2): 167-191, 1993.
    • (1993) Theoretical Computer Science , vol.118 , Issue.2 , pp. 167-191
    • Comon, H.1
  • 3
    • 84947780217 scopus 로고    scopus 로고
    • New decidability results for fragments of firstorder logic and application to cryptographic protocols
    • Proc. 14th International Conference on Rewriting Techniques and Applications (RTA'03) Valencia, Spain. Springer-Verlag
    • H. Comon-Lundh and V. Cortier. New decidability results for fragments of firstorder logic and application to cryptographic protocols. In Proc. 14th International Conference on Rewriting Techniques and Applications (RTA'03), volume 2706 of LNCS, pages 148-164, Valencia, Spain, 2003. Springer-Verlag.
    • (2003) LNCS , vol.2706 , pp. 148-164
    • Comon-Lundh, H.1    Cortier, V.2
  • 4
    • 24944564007 scopus 로고    scopus 로고
    • The finite variant property: How to get rid of some algebraic properties
    • Laboratoire Spécification et Vérification, ENS Cachan, France 2004. 21 pages
    • H. Comon-Lundh and S. Delaune. The finite variant property: How to get rid of some algebraic properties. Research Report LSV-04-17, Laboratoire Spécification et Vérification, ENS Cachan, France, 2004. 21 pages.
    • Research Report , vol.LSV-04-17
    • Comon-Lundh, H.1    Delaune, S.2
  • 5
    • 0042467908 scopus 로고    scopus 로고
    • Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
    • Ottawa, Canada. IEEE Comp. Soc. Press
    • H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), pages 271-280, Ottawa, Canada, 2003. IEEE Comp. Soc. Press.
    • (2003) Proc. of 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03) , pp. 271-280
    • Comon-Lundh, H.1    Shmatikov, V.2
  • 8
    • 85035020357 scopus 로고
    • Canonical forms and unification
    • Proc. 5th Conference on Automated Deduction, (CADE'80), Les Arcs, France. Springer
    • J.-M. Hullot. Canonical forms and unification. In Proc. 5th Conference on Automated Deduction, (CADE'80), volume 87 of LNCS, pages 318-324, Les Arcs, France, 1980. Springer.
    • (1980) LNCS , vol.87 , pp. 318-324
    • Hullot, J.-M.1
  • 9
    • 24944563200 scopus 로고
    • A catalogue of canonical term rewriting systems
    • Computer Science Laboratory, SRI, CA, USA
    • J.-M. Hullot. A catalogue of canonical term rewriting systems. Technical Report CSL-114, Computer Science Laboratory, SRI, CA, USA, 1980.
    • (1980) Technical Report , vol.CSL-114
    • Hullot, J.-M.1
  • 10
    • 51149098006 scopus 로고    scopus 로고
    • An E-unification algorithm for analyzing protocols that use modular exponentiation
    • Proc. 14th International Conference on Rewriting Techniques and Applications (RTA'03), Valencia, Spain. Springer-Verlag
    • D. Kapur, P. Narendran, and L. Wang. An E-unification algorithm for analyzing protocols that use modular exponentiation. In Proc. 14th International Conference on Rewriting Techniques and Applications (RTA'03), volume 2706 of LNCS, pages 165-179, Valencia, Spain, 2003. Springer-Verlag.
    • (2003) LNCS , vol.2706 , pp. 165-179
    • Kapur, D.1    Narendran, P.2    Wang, L.3
  • 13
    • 84957679912 scopus 로고    scopus 로고
    • Unification and matching modulo nilpotence
    • Proc. of the 13th International Conference on Automated Deduction, (CADE'96), New Brunswick, USA. Springer-Verlag
    • P. Narendran, Q. Guo, and D. Wolfram. Unification and matching modulo nilpotence. In Proc. of the 13th International Conference on Automated Deduction, (CADE'96), volume 1104 of LNCS, pages 261-274, New Brunswick, USA, 1996. Springer-Verlag.
    • (1996) LNCS , vol.1104 , pp. 261-274
    • Narendran, P.1    Guo, Q.2    Wolfram, D.3
  • 14
    • 0031505860 scopus 로고    scopus 로고
    • On the unification problem for cartesian closed categories
    • P. Narendran, F. Pfenning, and R. Statman. On the unification problem for cartesian closed categories. Journal of Symbolic Logic, 62(2):636-647, 1997.
    • (1997) Journal of Symbolic Logic , vol.62 , Issue.2 , pp. 636-647
    • Narendran, P.1    Pfenning, F.2    Statman, R.3
  • 15
    • 0030696539 scopus 로고    scopus 로고
    • Mechanized proofs for a recursive authentication protocol
    • Rockport, USA. IEEE Comp. Soc. Press
    • L. Paulson. Mechanized proofs for a recursive authentication protocol. In Proc. 10th Computer Security Foundations Workshop (CSFW'97), pages 84-95, Rockport, USA), 1997. IEEE Comp. Soc. Press.
    • (1997) Proc. 10th Computer Security Foundations Workshop (CSFW'97) , pp. 84-95
    • Paulson, L.1
  • 16
    • 84914878699 scopus 로고
    • On the complexity of the theories of weak direct products (preliminary report)
    • ACM Press
    • C. Rackoff. On the complexity of the theories of weak direct products (preliminary report). In Proc. of the 6th Annual ACM Symposium on Theory of Computing, pages 149-160. ACM Press, 1974.
    • (1974) Proc. of the 6th Annual ACM Symposium on Theory of Computing , pp. 149-160
    • Rackoff, C.1
  • 17
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol: A cautionary tale
    • P. Y. A. Ryan and S. A. Schneider. An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters, 65(1):7-10, 1998.
    • (1998) Information Processing Letters , vol.65 , Issue.1 , pp. 7-10
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 18
    • 38249010885 scopus 로고
    • A new method for undecidability proofs of first order theories
    • R. Treinen. A new method for undecidability proofs of first order theories. Journal of Symbolic Computation, 14(5):437-457, 1992.
    • (1992) Journal of Symbolic Computation , vol.14 , Issue.5 , pp. 437-457
    • Treinen, R.1
  • 19
    • 84962800270 scopus 로고    scopus 로고
    • E-unifiability via narrowing
    • Proc. of the 7th Italian Conference on Theoretical Computer Science, (ICTCS'01), Torino, Italy. Springer
    • E. Viola. E-unifiability via narrowing. In Proc. of the 7th Italian Conference on Theoretical Computer Science, (ICTCS'01), volume 2202 of LNCS, pages 426-438, Torino, Italy, 2001. Springer.
    • (2001) LNCS , vol.2202 , pp. 426-438
    • Viola, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.