Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(28 citation statements)
references
References 14 publications
0
28
0
Order By: Relevance
“…We illustrate the technique on a small (NeedhamSchroeder like) 'toy' protocol, assuming the encryption mode to be ECB-based. This paper -which is an enhanced version of [2] -also contains an Appendix, whose aim is to show that the passive deduction problem and unification can have unrelated behaviors, in general-a fact which is in sharp contrast with the case of active deduction, as was already observed in the concluding section of [1], as well as in [12]. We prove this fact here, by showing that unification modulo general -strong rewrite systems is undecidable, by reduction from a suitable version of the Modified Post Correspondence Problem (MPCP).…”
Section: Introductionmentioning
confidence: 90%
See 2 more Smart Citations
“…We illustrate the technique on a small (NeedhamSchroeder like) 'toy' protocol, assuming the encryption mode to be ECB-based. This paper -which is an enhanced version of [2] -also contains an Appendix, whose aim is to show that the passive deduction problem and unification can have unrelated behaviors, in general-a fact which is in sharp contrast with the case of active deduction, as was already observed in the concluding section of [1], as well as in [12]. We prove this fact here, by showing that unification modulo general -strong rewrite systems is undecidable, by reduction from a suitable version of the Modified Post Correspondence Problem (MPCP).…”
Section: Introductionmentioning
confidence: 90%
“…A general procedure for protocol security analysis has been given in [5] for such systems, extensively using equational unification and narrowing. Rewrite systems with such a 'subterm property' have been called dwindling in [1], where a decision procedure was given for passive deduction-i.e., detecting secrecy attacks by an intruder not interacting actively with the protocol sessions. The technique used is one that combines unification and narrowing with the notion of cap closure modeling the evolution of the intruder knowledge.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, it can be used in the context of verification of crytographic protocols [23,24,47,27,25,1], where the equational theory models algebraic properties of crytographic functions. In this article, we consider two closely related, yet different application areas for unification: modal logics [19] and description logics [8].…”
Section: Introductionmentioning
confidence: 99%
“…There are actually some works [30,5], answering, at least partly, this question, when A is empty. Many examples however involve associative and commutative symbols.…”
Section: Related Workmentioning
confidence: 99%