We have also shown that under natural hypotheses hierarchical intruder constraints can be decided. This result applies to an exponentiation theory that appears ...
This has motivated us to introduce a new notion of hierarchical combination for intruder theories and to show decidability results for the deduction problem in ...
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, ...
Oct 13, 2008 · This has motivated us to introduce a new notion of hierarchical combination for non disjoint intruder theories and to show decidability results ...
This has motivated us to introduce a new notion of hierarchical combination for intruder theories and to show decidability results for the deduction problem in ...
This approach allows us to decide interesting intruder theories presented as non-disjoint combination of theories, and that were not considered before, by.
This work introduces a new notion of hierarchical combination for intruder theories and shows decidability results for the deduction problem in these ...
This has motivated us to introduce a new notion of hierarchical combination for non-disjoint intruder theories and to show decidability results for the ...
We have also shown that under natural hypotheses hierarchical intruder constraints can be decided. This result applies to an exponentiation theory that appears ...
Hierarchical combination of intruder theories. Chevalier, Y.; Rusinowitch, M. Information and Computation 206(2-4): 352-377. ISSN: 0890-5401; 1090-2651. 2008 ...