Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach

Ralf Küsters, Tomasz Truderung. Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. In Peng Ning, Paul F. Syverson, Somesh Jha, editors, Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008. pages 129-138, ACM, 2008. [doi]

Abstract

Abstract is missing.