Constraint solving techniques and enriching the model with equational theories

Hubert Comon-Lundh, Stéphanie Delaune, Jonathan K. Millen. Constraint solving techniques and enriching the model with equational theories. In Véronique Cortier, Steve Kremer, editors, Formal Models and Techniques for Analyzing Security Protocols. Volume 5 of Cryptology and Information Security Series, pages 35-61, IOS Press, 2011. [doi]

@incollection{Comon-LundhDM11,
  title = {Constraint solving techniques and enriching the model with equational theories},
  author = {Hubert Comon-Lundh and Stéphanie Delaune and Jonathan K. Millen},
  year = {2011},
  doi = {10.3233/978-1-60750-714-7-35},
  url = {https://doi.org/10.3233/978-1-60750-714-7-35},
  researchr = {https://researchr.org/publication/Comon-LundhDM11},
  cites = {0},
  citedby = {0},
  pages = {35-61},
  booktitle = {Formal Models and Techniques for Analyzing Security Protocols},
  editor = {Véronique Cortier and Steve Kremer},
  volume = {5},
  series = {Cryptology and Information Security Series},
  publisher = {IOS Press},
  isbn = {978-1-60750-714-7},
}