共 50 条
- [31] Relating process algebras and multiset rewriting for immediate decryption protocols COMPUTER NETWORK SECURITY, 2003, 2776 : 86 - 99
- [32] On boundedness in depth in the π-calculus FIFTH IFIP INTERNATIONAL CONFERENCE ON THEORETICAL COMPUTER SCIENCE - TCS 2008, 2008, 273 : 477 - 489
- [35] A comparison between strand spaces and multiset rewriting for security protocol analysis SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 356 - 383
- [36] WRITING IS REWRITING + ECO THE 'NAME OF THE ROSE' AMERICAN JOURNAL OF SEMIOTICS, 1987, 5 (01): : 115 - 131
- [37] Fluid Computing - Interest-based Communication in Dataflow/Multiset Rewriting Computing PROCEEDINGS OF THE 10TH EURO-AMERICAN CONFERENCE ON TELEMATICS AND INFORMATION SYSTEMS (EATIS 2020), 2020,
- [38] Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting 2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022), 2022, : 1 - 16
- [39] Multiset constraints and P systems MULTISET PROCESSING: MATHEMATICAL, COMPUTER SCIENCE, AND MOLECULAR COMPUTING POINTS OF VIEW, 2001, 2235 : 103 - 121
- [40] Multiset constraints and P systems Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2001, 2235 : 103 - 121