Term rewriting and all that, 1998. ,
Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures, Journal of Symbolic Computation, vol.21, issue.2, pp.211-243, 1996. ,
DOI : 10.1006/jsco.1996.0009
Unification Theory, Handbook of Automated Reasoning, pp.445-532, 2001. ,
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., p.82, 2001. ,
DOI : 10.1109/CSFW.2001.930138
On Forward Closure and the Finite Variant Property, Frontiers of Combining Systems, pp.327-342, 2013. ,
DOI : 10.1007/978-3-642-40885-4_23
Combining Unification Algorithms, Journal of Symbolic Computation, vol.16, issue.6, pp.597-626, 1993. ,
DOI : 10.1006/jsco.1993.1066
The Finite Variant Property: How to Get Rid of Some Algebraic Properties, Rewriting Techniques and Applications, pp.294-307, 2005. ,
DOI : 10.1007/978-3-540-32033-3_22
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions, Computer Security, ESORICS 2012, pp.73-90, 2012. ,
DOI : 10.1007/978-3-642-33167-1_5
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Tutorial Lectures Lecture Notes in Computer Science, vol.20, issue.1-2, pp.1-50, 2007. ,
DOI : 10.1007/s10990-007-9000-6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3197
Variant Narrowing and Equational Unification, Electronic Notes in Theoretical Computer Science, vol.238, issue.3, pp.103-119, 2009. ,
DOI : 10.1016/j.entcs.2009.05.015
Folding variant narrowing and optimal variant termination, The Journal of Logic and Algebraic Programming, vol.81, issue.7-8, pp.898-928, 2012. ,
DOI : 10.1016/j.jlap.2012.01.002
Modular Church-Rosser Modulo: The Complete Picture, Int. J. Software and Informatics, vol.2, issue.1, pp.61-75, 2008. ,
Dealing Efficiently with Exclusive OR, Abelian Groups and Homomorphism in Cryptographic Protocol Analysis, 2012. ,
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Computer Aided Verification, pp.696-701, 2013. ,
DOI : 10.1007/978-3-642-39799-8_48
Models and Methods for the Automated Analysis of Security Protocols, 2007. ,
On termination of the direct sum of term-rewriting systems, Information Processing Letters, vol.26, issue.2, pp.65-70, 1987. ,
DOI : 10.1016/0020-0190(87)90039-1
URL : https://hal.archives-ouvertes.fr/inria-00075874