Login / Signup

Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity.

Myrto ArapinisSergiu BursucMark Dermot Ryan
Published in: POST (2012)
Keyphrases
  • equational theories
  • high security
  • integrity verification
  • theorem proving
  • model checking
  • cryptographic protocols
  • encryption algorithms
  • key management
  • database
  • logic programs
  • formal methods