T.: Reducing protocol analysis with xor to the xor-free case in the horn theory based approach (0)

by R Küsters, Truderung
Venue:In: ACM Conference on Computer and Communications Security. (2008) 129–138 5 We