Serveur d'exploration sur la recherche en informatique en Lorraine - Corpus (Hal)

Index « HalTutelle.i » - entrée « UMR8643 »
Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
UMR8628 < UMR8643 < UMR90  Facettes :

List of bibliographic references

Number of relevant bibliographic references: 67.
[0-20] [0 - 20][0 - 50][20-40]
Ident.Authors (with country if any)Title
000237 (2009-09-21) Véronique Cortier ; Graham SteelA Generic Security API for Symmetric Key Management on Cryptographic Devices
000504 (2006) Véronique Cortier ; Stéphanie Delaune ; Pascal LafourcadeA Survey of Algebraic Properties Used in Cryptographic Protocols
000510 (2011) Véronique Cortier ; Steve Kremer ; Bogdan WarinschiA Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems.
000511 (2009) Véronique Cortier ; Steve Kremer ; Bogdan WarinschiA Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
000727 (2009-07-08) Véronique Cortier ; Stéphanie DelauneA method for proving observational equivalence
000990 (2014-07) Hubert Comon-Lundh ; Véronique Cortier ; Guillaume ScerriA tool for automating the computationally complete symbolic attacker (Extended Abstract)
000E31 (2012-03-24) Véronique Cortier ; Jan Degrieck ; Stéphanie DelauneAnalysing routing protocols: four nodes topologies are sufficient
001069 (2014) Stéphane Demri ; Deepak Kapur ; Christoph WeidenbachAutomated Reasoning – Seventh International Joint Conference (IJCAR 2014)
001090 (2012-03-26) Rohit Chadha ; Stefan Ciobaca ; Steve KremerAutomated verification of equivalence properties of cryptographic protocols
001296 (2013-03-01) Serge Haddad ; Lynda Mokdad ; Samir YoucefBounding models families for performance evaluation in composite Web services
001463 (2015-09-21) Rémy Chrétien ; Véronique Cortier ; Stéphanie DelauneChecking Trace Equivalence: How to Get Rid of Nonces?
001491 (2008) Florent Jacquemard ; Michael RusinowitchClosure of Hedge-Automata Languages by Hedge Rewriting
001719 (2013) Céline Chevalier ; Stéphanie Delaune ; Steve Kremer ; Mark D. RyanComposition of Password-based Protocols
001743 (2008) Hubert Comon-Lundh ; Véronique CortierComputational soundness of observational equivalence
001744 (2008-10-28) Hubert Comon-Lundh ; Véronique CortierComputational soundness of observational equivalence
001745 (2008-06-26) Hubert Comon-Lundh ; Véronique CortierComputational soundness of observational equivalence
001747 (2009) Mathieu Baudet ; Véronique Cortier ; Steve KremerComputationally Sound Implementations of Equational Theories against Passive Adversaries
001748 (2005-07) Mathieu Baudet ; Véronique Cortier ; Steve KremerComputationally Sound Implementations of Equational Theories against Passive Adversaries
001749 (2006-12) Véronique Cortier ; Steve Kremer ; Ralf Kuesters ; Bogdan WarinschiComputationally Sound Symbolic Secrecy in the Presence of Hash Functions
001788 (2012) Stefan Ciobaca ; Stéphanie Delaune ; Steve KremerComputing knowledge in security protocols under convergent equational theories
001A84 (2012) Véronique Cortier ; Stéphanie DelauneDecidability and combination results for two notions of knowledge in security protocols.

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Hal/Corpus
HfdIndexSelect -h $EXPLOR_AREA/Data/Hal/Corpus/HalTutelle.i -k "UMR8643" 
HfdIndexSelect -h $EXPLOR_AREA/Data/Hal/Corpus/HalTutelle.i  \
                -Sk "UMR8643" \
         | HfdSelect -Kh $EXPLOR_AREA/Data/Hal/Corpus/biblio.hfd 

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Hal
   |étape=   Corpus
   |type=    indexItem
   |index=    HalTutelle.i
   |clé=    UMR8643
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022