Sciweavers

709 search results - page 7 / 142
» An Equational Theory for Transactions
Sort
View
ICALP
2005
Springer
14 years 28 days ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...
CSL
2001
Springer
13 years 12 months ago
Beyond Regularity: Equational Tree Automata for Associative and Commutative Theories
Abstract. A new tree automata framework, called equational tree automata, is presented. In the newly introduced setting, congruence closures of recognizable tree languages are reco...
Hitoshi Ohsaki
FROCOS
2000
Springer
13 years 11 months ago
Combining Equational Theories Sharing Non-Collapse-Free Constructors
In this paper we extend the applicability of our combination method for decision procedures for the word problem to theories sharing non-collapse-free constructors. This extension ...
Franz Baader, Cesare Tinelli
CSFW
2005
IEEE
14 years 1 months ago
Deciding Knowledge in Security Protocols under (Many More) Equational Theories
In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue ...
Martín Abadi, Véronique Cortier
MLQ
2000
99views more  MLQ 2000»
13 years 7 months ago
The Essentially Equational Theory of Horn Classes
It is well known that the model categories of universal Horn theories are locally presentable, hence essentially algebraic [2]. In the special case of quasivarieties a direct tran...
Hans-E. Porst