Hubert Comon-Lundh, Stéphanie Delaune, Jonathan K. Millen. Constraint solving techniques and enriching the model with equational theories. In Véronique Cortier, Steve Kremer, editors, Formal Models and Techniques for Analyzing Security Protocols. Volume 5 of Cryptology and Information Security Series, pages 35-61, IOS Press, 2011. [doi]
@incollection{Comon-LundhDM11, title = {Constraint solving techniques and enriching the model with equational theories}, author = {Hubert Comon-Lundh and Stéphanie Delaune and Jonathan K. Millen}, year = {2011}, doi = {10.3233/978-1-60750-714-7-35}, url = {https://doi.org/10.3233/978-1-60750-714-7-35}, researchr = {https://researchr.org/publication/Comon-LundhDM11}, cites = {0}, citedby = {0}, pages = {35-61}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, editor = {Véronique Cortier and Steve Kremer}, volume = {5}, series = {Cryptology and Information Security Series}, publisher = {IOS Press}, isbn = {978-1-60750-714-7}, }