ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0808.0634
  4. Cited By
Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn
  Theory Based Approach

Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach

5 August 2008
Ralf Küsters
Tomasz Truderung
ArXivPDFHTML

Papers citing "Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach"

4 / 4 papers shown
Title
Verifying Cryptographic Security Implementations in C Using Automated
  Model Extraction
Verifying Cryptographic Security Implementations in C Using Automated Model Extraction
Mihhail Aizatulin
13
2
0
03 Jan 2020
YAPA: A generic tool for computing intruder knowledge
YAPA: A generic tool for computing intruder knowledge
M. Baudet
V. Cortier
S. Delaune
64
47
0
05 May 2010
An Epistemic Approach to Coercion-Resistance for Electronic Voting
  Protocols
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols
Ralf Küsters
Tomasz Truderung
65
64
0
04 Mar 2009
Automatic Verification of Correspondences for Security Protocols
Automatic Verification of Correspondences for Security Protocols
B. Blanchet
89
241
0
23 Feb 2008
1