A decision procedure for the verification of security protocols with explicit destructors release_ysjasfgv3jb7nb3uahd3quc2ui

by St�phanie Delaune, Florent Jacquemard

Published in Conference on Computer and Communications Security by ACM Press.

2004   p278-287

Archived Files and Locations

application/pdf   228.9 kB
file_ysidsuo4jben3go3mqfkivl2fa
application/pdf   1.0 MB
file_sda6njguendpdh6rw3kgbahlny
web.archive.org (webarchive)
www.lsv.ens-cachan.fr (web)
web.archive.org (webarchive)
web.archive.org (webarchive)
web.archive.org (webarchive)
application/pdf   706.2 kB
file_scu27otyzzd3lhjf2aa7zloitu
web.archive.org (webarchive)
hal.inria.fr (repository)
application/pdf   418.2 kB
file_luqy265wgrdvhmkmmzz57zw5gy
web.archive.org (webarchive)
hal.inria.fr (repository)
application/pdf   418.2 kB
file_ghn4hldaivdphn4dptrbidkzty
web.archive.org (webarchive)
hal.inria.fr (repository)
Read Archived PDF
Preserved and Accessible
Type  paper-conference
Stage   published
Year   2004
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 44741aa7-a3fa-4047-ba31-d6b58fa83aab
API URL: JSON