Mobile values, new names, and secure communication, 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.104-115, 2001. ,
DOI : 10.1145/373243.360213
URL : https://hal.archives-ouvertes.fr/hal-01423924
Basic Paramodulation, Information and Computation, vol.121, issue.2, pp.172-192, 1995. ,
DOI : 10.1006/inco.1995.1131
URL : http://doi.org/10.1006/inco.1995.1131
Equality and disequality constraints on direct subterms in tree automata, 9th Symp. on Theoretical Aspects of Computer Science, STACS, pp.161-171, 1992. ,
DOI : 10.1007/3-540-55210-3_181
The authentication protocol, Defence Research Agency, 1997. ,
Pumping, cleaning and symbolic constraints solving, 21st Int. Coll. on Automata, Languages and Programming, ICALP, pp.436-449, 1994. ,
DOI : 10.1007/3-540-58201-0_88
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.52.4958
Tree Automata Techniques and Applications, 1997. ,
Automata for Reduction Properties Solving, Journal of Symbolic Computation, vol.20, issue.2, pp.215-233, 1995. ,
DOI : 10.1006/jsco.1995.1048
Rewrite systems, chapter Handbook of Theoretical Computer Science, pp.243-320, 1990. ,
Set-based analysis for logic programming and tree automata, Static Analysis, 4th International Symposium, SAS, volume 1302 of Lecture Notes in Computer Science, pp.127-140, 1997. ,
Logic programs as types for logic programs, [1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science, pp.300-309, 1991. ,
DOI : 10.1109/LICS.1991.151654
Rewriting for Cryptographic Protocol Verification, Proc. of 17th Int. Conf. on Automated Deduction, 2000. ,
DOI : 10.1007/10721959_21
URL : https://hal.archives-ouvertes.fr/inria-00072731
Deciding by resolution, Information Processing Letters, vol.95, issue.3, pp.401-408, 2005. ,
DOI : 10.1016/j.ipl.2005.04.007
Unification in extensions of shallow equational theories, 9th Int. Conf. on Rewriting Techniques and Applications, RTA, pp.76-90, 1998. ,
DOI : 10.1007/BFb0052362
URL : https://hal.archives-ouvertes.fr/inria-00098740
Automata-Based Analysis of Recursive Cryptographic Protocols, 21st Annual Symp. on Theoretical Aspects of Computer Science, STACS, pp.382-393, 2004. ,
DOI : 10.1007/978-3-540-24749-4_34
Normalizable Horn Clauses, Strongly Recognizable Relations, and Spi, Static Analysis, 9th Int. Symp., SAS, pp.20-35, 2002. ,
DOI : 10.1007/3-540-45789-5_5
Paramodulation-Based Theorem Proving, chapter Handbook of Automated Reasoning, Volume I, Chapter 7, 2001. ,
Decidability and Closure Properties of Equational Tree Languages, 13th Int. Conf. on Rewriting Techniques and Applications, RTA, pp.114-128, 2002. ,
DOI : 10.1007/3-540-45610-4_9
Splitting Without Backtracking, Proc. of the 17th Int. Joint Conf. on Artificial Intelligence, IJCAI, pp.611-617, 2001. ,
Layered Transducing Term Rewriting System and Its Recognizability Preserving Property, Int. Conf. on Rewriting Techniques and Applications, RTA, pp.98-113, 2002. ,
DOI : 10.1007/3-540-45610-4_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.4888
Tree automata and term rewrite systems Invited tutorial at the 11th Int, Conf. on Rewriting Techniques and Applications, RTA, 2000. ,
Selecting Theories and Recursive Protocols, Lecture Notes in Computer Science, vol.3653, pp.217-232, 2005. ,
DOI : 10.1007/11539452_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.488.1561
Two-Way Equational Tree Automata, ENS Cachan, 2003. ,