Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Véronique Cortier And NotFranche-Comté

List of bibliographic references

Number of relevant bibliographic references: 36.
Ident.Authors (with country if any)Title
000020 Véronique Cortier [France] ; David Galindo [Royaume-Uni] ; Mueller Johannes [Allemagne] ; Ralf Kuesters [Allemagne] ; Truderung Tomasz [Allemagne]SoK: Verifiability Notions for E-Voting Protocols
001638 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Cyrille Wiedling [France]Analysis of an Electronic Boardroom Voting System
001726 Véronique Cortier [France] ; Ben Smyth [France]Attacking and fixing Helios: An analysis of ballot secrecy
001D92 Véronique Cortier [France]Secure Composition of Protocols
002721 Mouhebeddine Berrima ; Narjes Ben Rajeb [Tunisie] ; Véronique Cortier [France]Deciding knowledge in security protocols under some e-voting theories
003095 Véronique Cortier [France] ; Stéphanie Delaune [France]Decidability and Combination Results for Two Notions of Knowledge in Security Protocols
003127 Véronique Cortier [France] ; Steve Kremer [France] ; Bogdan Warinschi [Royaume-Uni]A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
003B86 Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France]Computationally sound implementations of equational theories against passive adversaries
004282 Véronique Cortier [France]Verification of Security Protocols
004313 Véronique Cortier [France] ; Stéphanie Delaune [France]Safely composing security protocols
004B74 Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Z Linescu [France]Synthesizing Secure Protocols
004B88 Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France]Safely Composing Security Protocols
004C80 Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding Knowledge in Security Protocols for Monoidal Equational Theories
004C90 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Combining Algorithms for Deciding Knowledge in Security Protocols
004D01 Véronique Cortier [France] ; Gavin Keighren [Royaume-Uni] ; Graham Steel [Royaume-Uni]Automatic Analysis of the Security of XOR-Based Key Management Schemes
005401 Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Z Linescu [France]Relating Two Standard Notions of Secrecy
005508 Véronique Cortier [France] ; Eugen Z Linescu [France]Deciding Key Cycles for Security Protocols
005573 Véronique Cortier [France]Protocoles cryptographiques: analyse par méthodes formelles
005612 Manin Abadi [États-Unis] ; Véronique Cortier [France]Deciding knowledge in security protocols under equational thoories
005616 Véronique Cortier [France] ; Steve Kremer [France] ; Ralf Kusters [Suisse] ; Bogdan Warinschi [France]Computationally sound symbolic secrecy in the presence of hash functions
005625 Véronique Cortier [France] ; Xavier Goaoc [France] ; Mira Lee [Corée du Sud] ; Hyeon-Suk Na [Corée du Sud]A note on maximally repeated sub-patterns of a point set
005C16 Véronique CortierVérifier les protocoles cryptographiques
005D26 Véronique Cortier ; Michael Rusinowitch ; Eugen ZalinescuA resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures
005E41 Hubert Comon-Lundh ; Véronique CortierTree automata with one memory, set constraints and cryptographic protocols
005E93 Martin Abadi ; Véronique CortierDeciding knowledge in security protocols under (many more) equational theories
005E94 Mathieu Baudet ; Véronique Cortier ; Steve KremerComputationally Sound Implementations of Equational Theories against Passive Adversaries
005E96 Véronique Cortier ; Bogdan WarinschiComputationally Sound, Automated Proofs for Security Protocols
005F72 Véronique Cortier ; Xavier Goaoc ; Mira Lee ; Hyeon-Suk NaA note on maximally repeated sub-patterns of a point set
006056 Véronique Cortier ; Stéphanie Delaune ; Pascal LafourcadeA Survey of Algebraic Properties Used in Cryptographic Protocols
006121 Véronique Cortier [France]Vérifier les protocoles cryptographiques
006279 Véronique Cortier [France] ; Bogdan Warinschi [États-Unis]Computationally Sound, Automated Proofs for Security Protocols
006280 Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France]Computationally Sound Implementations of Equational Theories Against Passive Adversaries
006964 Martin Abadi ; Véronique CortierDeciding knowledge in security protocols under equational theories
006A00 Hubert Comon-Lundh ; Véronique CortierSecurity properties : two agents are sufficient
006C20 Martín Abadi [États-Unis] ; Véronique Cortier [France]Deciding Knowledge in Security Protocols Under Equational Theories
00A351 Véronique Cortier ; Harald Ganzinger ; Florent Jacquemard [France] ; Margus VeanesDecidable fragments of simultaneous rigid reachability

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022