International Workshop on Unification (UNIF’04)

  title={International Workshop on Unification (UNIF’04)},
  author={Michael Kohlhase Chair},
  • Michael Kohlhase Chair
  • Published 2004
We presenta procedurefor decidingsecurityof protocolsemploying the Exclusive or operator . This procedurerelieson a directcombinationof a constraintsolver for securityprotocol with a unificationalgorithmfor theexclusive-or theory. Hencecomparedto thepreviousonesit is muchsimplerandeasilyamenableto automation.Theprincipleof theapproachcanbeappliedto othertheoriestoo. Securityprotocolanalysishasbeenintensi velystudied[22,24,28,16,19,18] motivatedby thethreats… CONTINUE READING


Publications citing this paper.


Publications referenced by this paper.
Showing 1-10 of 20 references

Equational Problems and Disunification

J. Symb. Comput. • 1989
View 4 Excerpts
Highly Influenced

Axiomatizable classes of locally free algebras

A. I. Malcev
In B. F. Wells, editor, The Metamathematics of Algebraic Systems (Collected Papers: 1936-1967), volume 66, chapter 23, pages 262–281. North-Holland, • 1971
View 5 Excerpts
Highly Influenced

Solving Equations in Abstract Algebras: A Rule-Based Survey of Unification

Computational Logic - Essays in Honor of Alan Robinson • 1991
View 4 Excerpts
Highly Influenced

Complete axiomatizations of the algebras of finite, rational and infinite trees

[1988] Proceedings. Third Annual Information Symposium on Logic in Computer Science • 1988
View 5 Excerpts
Highly Influenced

A Unification Algorithm for Typed lambda-Calculus

Theor. Comput. Sci. • 1975
View 4 Excerpts
Highly Influenced

Rsolution de contraintes du premier ordre dans la thorie des arbres finis ou infinis

Dao Thi-Bich-Hanh
In Neuvieme Journes Francophones de Programmation Logique et Programmation par Contraintes JFPLC’2000, • 2000
View 3 Excerpts

Similar Papers

Loading similar papers…