Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Stéphanie Delaune And NotRoyaume-Uni

List of bibliographic references

Number of relevant bibliographic references: 32.
Ident.Authors (with country if any)Title
000255 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From Security Protocols to Pushdown Automata
000317 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Checking Trace Equivalence: How to Get Rid of Nonces?
000462 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Decidability of trace equivalence for protocols with nonces
000980 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Typing messages for free in security protocols: the~case of equivalence properties
000B37 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Typing messages for free in security protocols: the case of equivalence properties
000D51 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Modeling and Verifying Ad Hoc Routing Protocols
001108 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From security protocols to pushdown automata
001241 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From security protocols to pushdown automata
001344 Mathieu Baudet [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]YAPA: A generic tool for computing intruder knowledge
001A52 Stéphanie Delaune [France] ; Steve Kremer [France] ; Daniel Pasaila [Canada]Security protocols, constraint systems, and group theories
001C00 Véronique Cortier [France] ; Jan Degrieck [France] ; Stéphanie Delaune [France]Analysing routing protocols: four nodes topologies are sufficient
001C92 Stefan Ciobaca [France] ; Stéphanie Delaune [France] ; Steve Kremer [France]Computing knowledge in security protocols under convergent equational theories
001F62 Céline Chevalier [France] ; Stéphanie Delaune [France] ; Steve Kremer [France]Transforming Password Protocols to Compose
002192 Mathilde Arnaud ; Véronique Cortier [France] ; Stéphanie DelauneDeciding security for protocols with recursive tests
003095 Véronique Cortier [France] ; Stéphanie Delaune [France]Decidability and Combination Results for Two Notions of Knowledge in Security Protocols
003240 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Modeling and Verifying Ad Hoc Routing Protocols.
003486 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Modeling and Verifying Ad Hoc Routing Protocol
003488 Véronique Cortier [France] ; Stéphanie Delaune [France]A method for proving observational equivalence
003513 Mathieu Baudet ; Véronique Cortier [France] ; Stéphanie Delaune [France]YAPA: A generic tool for computing intruder knowledge
004313 Véronique Cortier [France] ; Stéphanie Delaune [France]Safely composing security protocols
004632 Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France]Safely Composing Security Protocols
004717 Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding knowledge in security protocols for monoidal equational theories.
004761 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Combining algorithms for deciding knowledge in security protocols
004842 Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding knowledge in security protocols for monoidal equational theories.
004B88 Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France]Safely Composing Security Protocols
004C78 Sergiu Bursuc [France] ; Hubert Comon-Lundh [France] ; Stéphanie Delaune [France]Deducibility Constraints, Equational Theory and Electronic Money
004C80 Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding Knowledge in Security Protocols for Monoidal Equational Theories
004C90 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Combining Algorithms for Deciding Knowledge in Security Protocols
004E39 Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France]Safely composing security protocols
004E87 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Combining algorithms for deciding knowledge in security protocols
005821 Véronique Cortier [France] ; Stéphanie Delaune [France] ; Pascal Lafourcade [France]A Survey of Algebraic Properties Used in Cryptographic Protocols
006056 Véronique Cortier ; Stéphanie Delaune ; Pascal LafourcadeA Survey of Algebraic Properties Used in Cryptographic Protocols

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022