Cited By
View all- Avanesov TChevalier YRusinowitch MTuruani M(2017)Satisfiability of general intruder constraints with and without a set constructorJournal of Symbolic Computation10.1016/j.jsc.2016.07.00980:P1(27-61)Online publication date: 1-May-2017
- Delaune SLafourcade PLugiez DTreinen R(2008)Symbolic protocol analysis for monoidal equational theoriesInformation and Computation10.1016/j.ic.2007.07.005206:2-4(312-351)Online publication date: 1-Feb-2008
- Chevalier YRusinowitch M(2008)Hierarchical combination of intruder theoriesInformation and Computation10.1016/j.ic.2007.07.004206:2-4(352-377)Online publication date: 1-Feb-2008
- Show More Cited By