Stéphanie Delaune And NotRoyaume-Uni
List of bibliographic references
Number of relevant bibliographic references: 32.Ident. | Authors (with country if any) | Title |
---|---|---|
000255 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | From Security Protocols to Pushdown Automata |
000317 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Checking Trace Equivalence: How to Get Rid of Nonces? |
000462 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Decidability of trace equivalence for protocols with nonces |
000980 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Typing messages for free in security protocols: the~case of equivalence properties |
000B37 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Typing messages for free in security protocols: the case of equivalence properties |
000D51 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Modeling and Verifying Ad Hoc Routing Protocols |
001108 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | From security protocols to pushdown automata |
001241 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | From security protocols to pushdown automata |
001344 | Mathieu Baudet [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | YAPA: A generic tool for computing intruder knowledge |
001A52 | Stéphanie Delaune [France] ; Steve Kremer [France] ; Daniel Pasaila [Canada] | Security protocols, constraint systems, and group theories |
001C00 | Véronique Cortier [France] ; Jan Degrieck [France] ; Stéphanie Delaune [France] | Analysing routing protocols: four nodes topologies are sufficient |
001C92 | Stefan Ciobaca [France] ; Stéphanie Delaune [France] ; Steve Kremer [France] | Computing knowledge in security protocols under convergent equational theories |
001F62 | Céline Chevalier [France] ; Stéphanie Delaune [France] ; Steve Kremer [France] | Transforming Password Protocols to Compose |
002192 | Mathilde Arnaud ; Véronique Cortier [France] ; Stéphanie Delaune | Deciding security for protocols with recursive tests |
003095 | Véronique Cortier [France] ; Stéphanie Delaune [France] | Decidability and Combination Results for Two Notions of Knowledge in Security Protocols |
003240 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Modeling and Verifying Ad Hoc Routing Protocols. |
003486 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Modeling and Verifying Ad Hoc Routing Protocol |
003488 | Véronique Cortier [France] ; Stéphanie Delaune [France] | A method for proving observational equivalence |
003513 | Mathieu Baudet ; Véronique Cortier [France] ; Stéphanie Delaune [France] | YAPA: A generic tool for computing intruder knowledge |
004313 | Véronique Cortier [France] ; Stéphanie Delaune [France] | Safely composing security protocols |
004632 | Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France] | Safely Composing Security Protocols |
004717 | Véronique Cortier [France] ; Stéphanie Delaune [France] | Deciding knowledge in security protocols for monoidal equational theories. |
004761 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Combining algorithms for deciding knowledge in security protocols |
004842 | Véronique Cortier [France] ; Stéphanie Delaune [France] | Deciding knowledge in security protocols for monoidal equational theories. |
004B88 | Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France] | Safely Composing Security Protocols |
004C78 | Sergiu Bursuc [France] ; Hubert Comon-Lundh [France] ; Stéphanie Delaune [France] | Deducibility Constraints, Equational Theory and Electronic Money |
004C80 | Véronique Cortier [France] ; Stéphanie Delaune [France] | Deciding Knowledge in Security Protocols for Monoidal Equational Theories |
004C90 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Combining Algorithms for Deciding Knowledge in Security Protocols |
004E39 | Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France] | Safely composing security protocols |
004E87 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Combining algorithms for deciding knowledge in security protocols |
005821 | Véronique Cortier [France] ; Stéphanie Delaune [France] ; Pascal Lafourcade [France] | A Survey of Algebraic Properties Used in Cryptographic Protocols |
006056 | Véronique Cortier ; Stéphanie Delaune ; Pascal Lafourcade | A Survey of Algebraic Properties Used in Cryptographic Protocols |
This area was generated with Dilib version V0.6.33. |