Login / Signup
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity.
Myrto Arapinis
Sergiu Bursuc
Mark Dermot Ryan
Published in:
POST (2012)
Keyphrases
</>
equational theories
high security
integrity verification
theorem proving
model checking
cryptographic protocols
encryption algorithms
key management
database
logic programs
formal methods