-
1
-
-
17644411480
-
-
M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in: 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001.
-
M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in: 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001.
-
-
-
-
2
-
-
0001285877
-
Basic paramodulation
-
Bachmair L., Ganzinger H., Lynch C., and Snyder W. Basic paramodulation. Inform. Comput. 121 2 (1995) 172-192
-
(1995)
Inform. Comput.
, vol.121
, Issue.2
, pp. 172-192
-
-
Bachmair, L.1
Ganzinger, H.2
Lynch, C.3
Snyder, W.4
-
3
-
-
85029633250
-
Equality and disequality constraints on direct subterms in tree automata
-
9th Symp. on Theoretical Aspects of Computer Science, STACS, Springer
-
Bogaert B., and Tison S. Equality and disequality constraints on direct subterms in tree automata. 9th Symp. on Theoretical Aspects of Computer Science, STACS. LNCS vol. 577 (1992), Springer
-
(1992)
LNCS
, vol.577
-
-
Bogaert, B.1
Tison, S.2
-
4
-
-
40849092114
-
-
J.A. Bull, D.J. Otway, The authentication protocol, Tech. Rep., Defence Research Agency, Malvern, UK, 1997.
-
J.A. Bull, D.J. Otway, The authentication protocol, Tech. Rep., Defence Research Agency, Malvern, UK, 1997.
-
-
-
-
5
-
-
85027401543
-
Pumping, cleaning and symbolic constraints solving
-
21st Int. Coll. on Automata, Languages and Programming, ICALP, Springer
-
Caron A.-C., Comon H., Coquidé J.-L., Dauchet M., and Jacquemard F. Pumping, cleaning and symbolic constraints solving. 21st Int. Coll. on Automata, Languages and Programming, ICALP. LNCS vol. 820 (1994), Springer
-
(1994)
LNCS
, vol.820
-
-
Caron, A.-C.1
Comon, H.2
Coquidé, J.-L.3
Dauchet, M.4
Jacquemard, F.5
-
6
-
-
40849090666
-
-
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, M. Tommasi, Tree Automata Techniques and Applications, 1997, .
-
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, M. Tommasi, Tree Automata Techniques and Applications, 1997, .
-
-
-
-
8
-
-
84976665942
-
Timestamps in key distribution protocols
-
Denning D.E., and Sacco G.M. Timestamps in key distribution protocols. Commun. ACM (1981)
-
(1981)
Commun. ACM
-
-
Denning, D.E.1
Sacco, G.M.2
-
10
-
-
0042902829
-
Set-based analysis for logic programming and tree automata
-
Static Analysis, 4th International Symposium, SAS. Hentenryck P.V. (Ed), Springer
-
Devienne P., Talbot J.-M., and Tison S. Set-based analysis for logic programming and tree automata. In: Hentenryck P.V. (Ed). Static Analysis, 4th International Symposium, SAS. Lecture Notes in Computer Science vol. 1302 (1997), Springer
-
(1997)
Lecture Notes in Computer Science
, vol.1302
-
-
Devienne, P.1
Talbot, J.-M.2
Tison, S.3
-
11
-
-
0026188229
-
-
T. Frühwirth, E. Shapiro, M. Vardi, E. Yardeni, Logic programs as types for logic programs, in: Proc. of the 6th IEEE Symposium on Logic in Computer Science, 1991.
-
T. Frühwirth, E. Shapiro, M. Vardi, E. Yardeni, Logic programs as types for logic programs, in: Proc. of the 6th IEEE Symposium on Logic in Computer Science, 1991.
-
-
-
-
12
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
Proc. of 17th Int. Conf. on Automated Deduction, CADE, Springer
-
Genet T., and Klay F. Rewriting for cryptographic protocol verification. Proc. of 17th Int. Conf. on Automated Deduction, CADE. LNCS vol. 1831 (2000), Springer
-
(2000)
LNCS
, vol.1831
-
-
Genet, T.1
Klay, F.2
-
14
-
-
84958779634
-
Unification in extensions of shallow equational theories
-
9th Int. Conf. on Rewriting Techniques and Applications, RTA, Springer
-
Jacquemard F., Meyer C., and Weidenbach C. Unification in extensions of shallow equational theories. 9th Int. Conf. on Rewriting Techniques and Applications, RTA. LNCS vol. 1379 (1998), Springer
-
(1998)
LNCS
, vol.1379
-
-
Jacquemard, F.1
Meyer, C.2
Weidenbach, C.3
-
15
-
-
33749583378
-
Tree automata with equality constraints modulo equational theories
-
Proceedings of 3rd International Joint Conference on Automated Reasoning, IJCAR. Furbach U., and Shankar N. (Eds), Springer, Seattle, WA
-
Jacquemard F., Rusinowitch M., and Vigneron L. Tree automata with equality constraints modulo equational theories. In: Furbach U., and Shankar N. (Eds). Proceedings of 3rd International Joint Conference on Automated Reasoning, IJCAR. Lecture Notes in Artificial Intelligence vol. 4130 (2006), Springer, Seattle, WA
-
(2006)
Lecture Notes in Artificial Intelligence
, vol.4130
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
16
-
-
35048832860
-
Automata-based analysis of recursive cryptographic protocols
-
21st Annual Symp. on Theoretical Aspects of Computer Science, STACS, Springer
-
Küsters R., and Wilke T. Automata-based analysis of recursive cryptographic protocols. 21st Annual Symp. on Theoretical Aspects of Computer Science, STACS. LNCS vol. 2996 (2004), Springer
-
(2004)
LNCS
, vol.2996
-
-
Küsters, R.1
Wilke, T.2
-
17
-
-
14044253469
-
On the relative soundness of the free algebra model for public key encryption
-
Lynch C., and Meadows C. On the relative soundness of the free algebra model for public key encryption. Electr. Notes Theor. Comput. Sci. 125 1 (2005) 43-54
-
(2005)
Electr. Notes Theor. Comput. Sci.
, vol.125
, Issue.1
, pp. 43-54
-
-
Lynch, C.1
Meadows, C.2
-
18
-
-
84958766164
-
Normalizable Horn Clauses, strongly recognizable relations, and Spi
-
Static Analysis, 9th Int. Symp., SAS, Springer
-
Nielson F., Riis Nielson H., and Seidl H. Normalizable Horn Clauses, strongly recognizable relations, and Spi. Static Analysis, 9th Int. Symp., SAS. LNCS vol. 2477 (2002), Springer
-
(2002)
LNCS
, vol.2477
-
-
Nielson, F.1
Riis Nielson, H.2
Seidl, H.3
-
19
-
-
0000872752
-
Paramodulation-based theorem proving
-
Elsevier Science and MIT Press (Chapter 7)
-
Nieuwenhuis R., and Rubio A. Paramodulation-based theorem proving. Handbook of Automated Reasoning vol. I (2001), Elsevier Science and MIT Press 371-443 (Chapter 7)
-
(2001)
Handbook of Automated Reasoning
, vol.I
, pp. 371-443
-
-
Nieuwenhuis, R.1
Rubio, A.2
-
20
-
-
84947242793
-
Decidability and closure properties of equational tree languages
-
13th Int. Conf. on Rewriting Techniques and Applications, RTA, Springer
-
Ohsaki H., and Takai T. Decidability and closure properties of equational tree languages. 13th Int. Conf. on Rewriting Techniques and Applications, RTA. LNCS vol. 2378 (2002), Springer
-
(2002)
LNCS
, vol.2378
-
-
Ohsaki, H.1
Takai, T.2
-
22
-
-
0028523063
-
Haskell overloading is dexptime-complete
-
Seidl H. Haskell overloading is dexptime-complete. Inform. Process. Lett. 52 2 (1994) 57-60
-
(1994)
Inform. Process. Lett.
, vol.52
, Issue.2
, pp. 57-60
-
-
Seidl, H.1
-
23
-
-
84947263345
-
Layered transducing term rewriting system and its recognizability preserving property
-
Int. Conf. on Rewriting Techniques and Applications, RTA, Springer
-
Seki H., Takai T., Fujinaka Y., and Kaji Y. Layered transducing term rewriting system and its recognizability preserving property. Int. Conf. on Rewriting Techniques and Applications, RTA. LNCS vol. 2378 (2002), Springer
-
(2002)
LNCS
, vol.2378
-
-
Seki, H.1
Takai, T.2
Fujinaka, Y.3
Kaji, Y.4
-
24
-
-
40849143768
-
-
S. Tison, Tree automata and term rewrite systems, Invited Tutorial at the 11th Int. Conf. on Rewriting Techniques and Applications, RTA, 2000.
-
S. Tison, Tree automata and term rewrite systems, Invited Tutorial at the 11th Int. Conf. on Rewriting Techniques and Applications, RTA, 2000.
-
-
-
-
25
-
-
27344455431
-
Selecting theories and recursive protocols
-
CONCUR. Abadi M., and de Alfaro L. (Eds), Springer
-
Truderung T. Selecting theories and recursive protocols. In: Abadi M., and de Alfaro L. (Eds). CONCUR. Lecture Notes in Computer Science vol. 3653 (2005), Springer
-
(2005)
Lecture Notes in Computer Science
, vol.3653
-
-
Truderung, T.1
-
26
-
-
40849132462
-
-
K.N. Verma, Two-way equational tree automata, Ph.D. thesis, ENS Cachan, September 2003.
-
K.N. Verma, Two-way equational tree automata, Ph.D. thesis, ENS Cachan, September 2003.
-
-
-
|