메뉴 건너뛰기




Volumn 3328, Issue , 2004, Pages 518-530

Alternation in equational tree automata modulo XOR

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATA THEORY; GROUP THEORY; NETWORK SECURITY; FORESTRY; SOFTWARE ENGINEERING; VECTORS;

EID: 35048885180     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30538-5_43     Document Type: Article
Times cited : (3)

References (23)
  • 1
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    • FSTTCS'03, Springer-Verlag
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. In FSTTCS'03, pages 124-135. Springer-Verlag LNCS 2914, 2003.
    • (2003) LNCS , vol.2914 , pp. 124-135
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 2
    • 0041967380 scopus 로고    scopus 로고
    • An NP decision procedure for protocol insecurity with XOR
    • Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP decision procedure for protocol insecurity with XOR. In LICS'03, pages 261-270, 2003.
    • (2003) LICS'03 , pp. 261-270
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 3
    • 1442292323 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints and cryptographic protocols
    • To appear
    • H. Comon and V. Cortier. Tree automata with one memory, set constraints and cryptographic protocols. Theoretical Computer Science, 2004. To appear.
    • (2004) Theoretical Computer Science
    • Comon, H.1    Cortier, V.2
  • 5
    • 84947780217 scopus 로고    scopus 로고
    • New decidability results for fragments of first-order logic and application to cryptographic protocols
    • RTA'03, Springer-Verlag
    • H. Comon-Lundh and V. Cortier. New decidability results for fragments of first-order logic and application to cryptographic protocols. In RTA'03, pages 148-164. Springer-Verlag LNCS 2706, 2003.
    • (2003) LNCS , vol.2706 , pp. 148-164
    • Comon-Lundh, H.1    Cortier, V.2
  • 7
    • 0003002778 scopus 로고    scopus 로고
    • Tree languages
    • G. Rozenberg and A. Salomaa, editors, chapter 1, Springer-Verlag
    • F. Gécseg and M. Steinby. Tree languages. In G. Rozenberg and A. Salomaa, editors, Handbook of Formal Languages, volume 3, chapter 1, pages 1-68. Springer-Verlag, 1997.
    • (1997) Handbook of Formal Languages , vol.3 , pp. 1-68
    • Gécseg, F.1    Steinby, M.2
  • 8
    • 84876354671 scopus 로고    scopus 로고
    • A method for automatic cryptographic protocol verification
    • FMPPTA'00, Springer-Verlag
    • J. Goubault-Larrecq. A method for automatic cryptographic protocol verification. In FMPPTA'00, pages 977-984. Springer-Verlag LNCS 1800, 2000.
    • (2000) LNCS , vol.1800 , pp. 977-984
    • Goubault-Larrecq, J.1
  • 9
    • 20144382303 scopus 로고    scopus 로고
    • Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve?
    • V. Ménissier-Morain, editor, INRIA, collection didactique
    • J. Goubault-Larrecq. Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve? In V. Ménissier-Morain, editor, Actes des 12èmes Journées Francophones des Langages Applicatifs (JFLA'04). INRIA, collection didactique, 2004.
    • (2004) Actes des 12èmes Journées Francophones des Langages Applicatifs (JFLA'04)
    • Goubault-Larrecq, J.1
  • 10
    • 20444464381 scopus 로고    scopus 로고
    • Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically
    • To Appear. Available as Research Report LS V-04-7, LSV, ENS Cachan
    • J. Goubault-Larrecq, M. Roger, and K. N. Verma. Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically. Journal of Logic and Algebraic Programming, 2004. To Appear. Available as Research Report LS V-04-7, LSV, ENS Cachan.
    • (2004) Journal of Logic and Algebraic Programming
    • Goubault-Larrecq, J.1    Roger, M.2    Verma, K.N.3
  • 11
    • 0000769632 scopus 로고
    • On the reachability problem for 5-dimensional vector addition systems
    • J. Hopcroft and J. J. Pansiot. On the reachability problem for 5-dimensional vector addition systems. Theoretical Computer Science, 8:135-159, 1979.
    • (1979) Theoretical Computer Science , vol.8 , pp. 135-159
    • Hopcroft, J.1    Pansiot, J.J.2
  • 13
    • 35248882451 scopus 로고    scopus 로고
    • Counting and equality constraints for multitree automata
    • FOSSACS'03, Springer-Verlag
    • D. Lugiez. Counting and equality constraints for multitree automata. In FOSSACS'03, pages 328-342. Springer-Verlag LNCS 2620, 2003.
    • (2003) LNCS , vol.2620 , pp. 328-342
    • Lugiez, D.1
  • 14
    • 84957716708 scopus 로고    scopus 로고
    • Abstracting cryptographic protocols with tree automata
    • SAS'99, Springer-Verlag
    • D. Monniaux. Abstracting cryptographic protocols with tree automata. In SAS'99, pages 149-163. Springer-Verlag LNCS 1694, 1999.
    • (1999) LNCS , vol.1694 , pp. 149-163
    • Monniaux, D.1
  • 15
    • 84944240660 scopus 로고    scopus 로고
    • Beyond regularity: Equational tree automata for associative and commutative theories
    • CSL'01, Springer-Verlag
    • H. Ohsaki. Beyond regularity: Equational tree automata for associative and commutative theories. In CSL'01, pages 539-553. Springer-Verlag LNCS 2142, 2001.
    • (2001) LNCS , vol.2142 , pp. 539-553
    • Ohsaki, H.1
  • 16
    • 0030696539 scopus 로고    scopus 로고
    • Mechanized proofs for a recursive authentication protocol
    • IEEE Computer Society Press
    • L. C. Paulson. Mechanized proofs for a recursive authentication protocol. In CSFW'97, pages 84-95. IEEE Computer Society Press, 1997.
    • (1997) CSFW'97 , pp. 84-95
    • Paulson, L.C.1
  • 17
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol: A cautionary tale
    • P. Ryan and S. Schneider. An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters, 65(1):7-10, 1998.
    • (1998) Information Processing Letters , vol.65 , Issue.1 , pp. 7-10
    • Ryan, P.1    Schneider, S.2
  • 21
    • 9444253566 scopus 로고    scopus 로고
    • On closure under complementation of equational tree automata for theories extending AC
    • LPAR'03, Springer-Verlag
    • K. N. Verma. On closure under complementation of equational tree automata for theories extending AC. In LPAR'03, pages 183-197. Springer-Verlag LNCS 2850, 2003.
    • (2003) LNCS , vol.2850 , pp. 183-197
    • Verma, K.N.1
  • 22
    • 84947774804 scopus 로고    scopus 로고
    • Two-way equational tree automata for AC-like theories: Decidability and closure properties
    • RTA'03, Springer-Verlag
    • K. N. Verma. Two-way equational tree automata for AC-like theories: Decidability and closure properties. In RTA'03, pages 180-196. Springer-Verlag LNCS 2706, 2003.
    • (2003) LNCS , vol.2706 , pp. 180-196
    • Verma, K.N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.