Author of the publication

Compiling symbolic attacks to protocol implementation tests.

, , and . SCSS, volume 122 of EPTCS, page 39-49. (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rewrite based Verification of XML Updates, and . CoRR, (2009)Any Gound Associative-Commutative Theory Has a Finite Canonical System., and . RTA, volume 488 of Lecture Notes in Computer Science, page 423-434. Springer, (1991)Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption., , , and . ACM Trans. Comput. Log., 9 (4): 24:1-24:52 (2008)A Proof System for Conditional Algebraic Specifications., and . CTRS, volume 516 of Lecture Notes in Computer Science, page 51-63. Springer, (1990)One-variable context-free hedge automata., and . J. Comput. Syst. Sci., (2019)On Word Problems in Horn Theories., and . CADE, volume 310 of Lecture Notes in Computer Science, page 527-537. Springer, (1988)Matching a Set of Strings with Variable Length Don't Cares., and . CPM, volume 937 of Lecture Notes in Computer Science, page 230-247. Springer, (1995)Preferring diagnoses by abduction., , and . IEEE Trans. Syst. Man Cybern., 23 (3): 792-808 (1993)Studies on the Ground Convergence Property of Conditional Theories., and . AMAST, page 363-376. Springer, (1991)Reasoning with Conditional Axioms., and . Ann. Math. Artif. Intell., 15 (2): 125-149 (1995)