-
1
-
-
0027627587
-
Unification in Commutative Theories
-
F. Baader. Unification in Commutative Theories, Hilbert’s Basis Theorem, and Gröbner Bases. J. ACM, 40 (3), 1993, 477–503.
-
(1993)
Hilbert’s Basis Theorem, and Gröbner Bases. J. ACM
, vol.40
, Issue.3
, pp. 477-503
-
-
Baader, F.1
-
2
-
-
85029807890
-
Adding Homomorphisms to Commutative/Monoidal Theories, or: How Algebra Can Help in Equational Unification
-
F. Baader and W. Nutt: Adding Homomorphisms to Commutative/Monoidal Theories, or: How Algebra Can Help in Equational Unification. Proc. 4th Intl. Conf. on Rewriting Techniques and Applications (RTA 91), LNCS 488, 1991, 124–135.
-
(1991)
Proc. 4Th Intl. Conf. On Rewriting Techniques and Applications (RTA 91), LNCS
, vol.488
, pp. 124-135
-
-
Baader, F.1
Nutt, W.2
-
3
-
-
84968312063
-
Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures
-
Saratoga Springs, NY, Springer LNAI
-
F. Baader and K.U. Schultz: Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures. Proc. 11th Conference on Automated Deduction (CADE-11), Saratoga Springs, NY, Springer LNAI 607, 1992, 50–65.
-
(1992)
Proc. 11Th Conference on Automated Deduction (CADE-11)
, vol.607
, pp. 50-65
-
-
Baader, F.1
Schultz, K.U.2
-
4
-
-
0003568551
-
-
Unpublished Technical Report, Department of Computer Science, University of York, UK, Nov
-
J. Clark and J. Jacob: A Survey of Authentication Protocol Literature: Version 1.0. Unpublished Technical Report, Department of Computer Science, University of York, UK, Nov 1997. Available at the URL: www-users.cs.york.ac.uk/˜jac/papers/drareviewps.ps.
-
(1997)
A Survey of Authentication Protocol Literature: Version 1.0
-
-
Clark, J.1
Jacob, J.2
-
6
-
-
42449116060
-
Computing the Gröbner Basis of a Polynomial Ideal over Integers
-
Schenectady, NY, July
-
A. Kandri-Rody and D. Kapur. Computing the Gröbner Basis of a Polynomial Ideal over Integers. Proc. Third MACSYMA Users’ Conference, Schenectady, NY, July 1984, 436–451.
-
(1984)
Proc. Third MACSYMA Users’ Conference
, pp. 436-451
-
-
Kandri-Rody, A.1
Kapur, D.2
-
7
-
-
0346280713
-
An Algorithm for Computing the Gröbner Basis of a Polynomial Ideal over an Euclidean Ring
-
August
-
A. Kandri-Rody and D. Kapur. An Algorithm for Computing the Gröbner Basis of a Polynomial Ideal over an Euclidean Ring. Journal of Symbolic Computation, 6 (1), August 1988, 37-57.
-
(1988)
Journal of Symbolic Computation
, vol.6
, Issue.1
, pp. 37-57
-
-
Kandri-Rody, A.1
Kapur, D.2
-
8
-
-
84947713704
-
-
TR 02-5, Department of Computer Science, SUNY, Albany, NY. To appear in the Festschrift for Jörg Siekmann (Dieter Hutter, Werner Stephan, eds.), Lecture Notes in Artificial Intelligence, Springer
-
D. Kapur, P. Narendran, and L. Wang. A Unification Algorithm for Analysis of Protocols with Blinded Signatures. TR 02-5, Department of Computer Science, SUNY, Albany, NY. To appear in the Festschrift for Jörg Siekmann (Dieter Hutter, Werner Stephan, eds.), Lecture Notes in Artificial Intelligence 2605, Springer.
-
A Unification Algorithm for Analysis of Protocols with Blinded Signatures
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
9
-
-
84947763514
-
-
Technical Report, Department of Computer Science, SUNY, Albany, NY. An expanded version of this paper
-
D. Kapur, P. Narendran, and L. Wang. Analyzing Protocols that use Modular Exponentiation: Semantic Unification Techniques Technical Report, Department of Computer Science, SUNY, Albany, NY. An expanded version of this paper.
-
Analyzing Protocols that Use Modular Exponentiation: Semantic Unification Techniques
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
11
-
-
0030084918
-
The NRL Protocol Analyzer: An Overview
-
C. Meadows. The NRL Protocol Analyzer: An Overview. J. Logic Programming, 26(2), 1996, 113–131.
-
(1996)
J. Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
12
-
-
84940106630
-
Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer
-
IEEE
-
C. Meadows. Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer. In: Proc. the 1999 Symp. on Security and Privacy, IEEE.
-
Proc. The 1999 Symp. On Security and Privacy
-
-
Meadows, C.1
-
13
-
-
84947746973
-
Formal Specification and Analysis of the Group Domain of Interpretation Protocol using NPATROL and the NRL Protocol Analyzer
-
To appear in the
-
C. Meadows, P. Syverson and I. Cervesato. Formal Specification and Analysis of the Group Domain of Interpretation Protocol using NPATROL and the NRL Protocol Analyzer. To appear in the Journal of Computer Security.
-
Journal of Computer Security
-
-
Meadows, C.1
Syverson, P.2
Cervesato, I.3
-
16
-
-
0031505860
-
On the Unification Problem for Cartesian Closed Categories
-
June 97
-
P. Narendran, F. Pfenning, and R. Statman. On the Unification Problem for Cartesian Closed Categories. Journal of Symbolic Logic, 62 (2), June 97, 636–647.
-
Journal of Symbolic Logic
, vol.62
, Issue.2
, pp. 636-647
-
-
Narendran, P.1
Pfenning, F.2
Statman, R.3
-
18
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. CACM 21 (2), 1978, 120–126.
-
(1978)
CACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
19
-
-
84974759626
-
The Role of Trust in Information Integrity Protocols
-
G. Simmons and C. Meadows. The Role of Trust in Information Integrity Protocols. Journal of Computer Security 3(2), 1994.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.2
-
-
Simmons, G.1
Meadows, C.2
|