Véronique Cortier And NotFranche-Comté
List of bibliographic references
Number of relevant bibliographic references: 36.Ident. | Authors (with country if any) | Title |
---|---|---|
000020 | Véronique Cortier [France] ; David Galindo [Royaume-Uni] ; Mueller Johannes [Allemagne] ; Ralf Kuesters [Allemagne] ; Truderung Tomasz [Allemagne] | SoK: Verifiability Notions for E-Voting Protocols |
001638 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Cyrille Wiedling [France] | Analysis of an Electronic Boardroom Voting System |
001726 | Véronique Cortier [France] ; Ben Smyth [France] | Attacking and fixing Helios: An analysis of ballot secrecy |
001D92 | Véronique Cortier [France] | Secure Composition of Protocols |
002721 | Mouhebeddine Berrima ; Narjes Ben Rajeb [Tunisie] ; Véronique Cortier [France] | Deciding knowledge in security protocols under some e-voting theories |
003095 | Véronique Cortier [France] ; Stéphanie Delaune [France] | Decidability and Combination Results for Two Notions of Knowledge in Security Protocols |
003127 | Véronique Cortier [France] ; Steve Kremer [France] ; Bogdan Warinschi [Royaume-Uni] | A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems |
003B86 | Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France] | Computationally sound implementations of equational theories against passive adversaries |
004282 | Véronique Cortier [France] | Verification of Security Protocols |
004313 | Véronique Cortier [France] ; Stéphanie Delaune [France] | Safely composing security protocols |
004B74 | Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Z Linescu [France] | Synthesizing Secure Protocols |
004B88 | Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France] | Safely Composing Security Protocols |
004C80 | Véronique Cortier [France] ; Stéphanie Delaune [France] | Deciding Knowledge in Security Protocols for Monoidal Equational Theories |
004C90 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Combining Algorithms for Deciding Knowledge in Security Protocols |
004D01 | Véronique Cortier [France] ; Gavin Keighren [Royaume-Uni] ; Graham Steel [Royaume-Uni] | Automatic Analysis of the Security of XOR-Based Key Management Schemes |
005401 | Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Z Linescu [France] | Relating Two Standard Notions of Secrecy |
005508 | Véronique Cortier [France] ; Eugen Z Linescu [France] | Deciding Key Cycles for Security Protocols |
005573 | Véronique Cortier [France] | Protocoles cryptographiques: analyse par méthodes formelles |
005612 | Manin Abadi [États-Unis] ; Véronique Cortier [France] | Deciding knowledge in security protocols under equational thoories |
005616 | Véronique Cortier [France] ; Steve Kremer [France] ; Ralf Kusters [Suisse] ; Bogdan Warinschi [France] | Computationally sound symbolic secrecy in the presence of hash functions |
005625 | Véronique Cortier [France] ; Xavier Goaoc [France] ; Mira Lee [Corée du Sud] ; Hyeon-Suk Na [Corée du Sud] | A note on maximally repeated sub-patterns of a point set |
005C16 | Véronique Cortier | Vérifier les protocoles cryptographiques |
005D26 | Véronique Cortier ; Michael Rusinowitch ; Eugen Zalinescu | A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures |
005E41 | Hubert Comon-Lundh ; Véronique Cortier | Tree automata with one memory, set constraints and cryptographic protocols |
005E93 | Martin Abadi ; Véronique Cortier | Deciding knowledge in security protocols under (many more) equational theories |
005E94 | Mathieu Baudet ; Véronique Cortier ; Steve Kremer | Computationally Sound Implementations of Equational Theories against Passive Adversaries |
005E96 | Véronique Cortier ; Bogdan Warinschi | Computationally Sound, Automated Proofs for Security Protocols |
005F72 | Véronique Cortier ; Xavier Goaoc ; Mira Lee ; Hyeon-Suk Na | A note on maximally repeated sub-patterns of a point set |
006056 | Véronique Cortier ; Stéphanie Delaune ; Pascal Lafourcade | A Survey of Algebraic Properties Used in Cryptographic Protocols |
006121 | Véronique Cortier [France] | Vérifier les protocoles cryptographiques |
006279 | Véronique Cortier [France] ; Bogdan Warinschi [États-Unis] | Computationally Sound, Automated Proofs for Security Protocols |
006280 | Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France] | Computationally Sound Implementations of Equational Theories Against Passive Adversaries |
006964 | Martin Abadi ; Véronique Cortier | Deciding knowledge in security protocols under equational theories |
006A00 | Hubert Comon-Lundh ; Véronique Cortier | Security properties : two agents are sufficient |
006C20 | Martín Abadi [États-Unis] ; Véronique Cortier [France] | Deciding Knowledge in Security Protocols Under Equational Theories |
00A351 | Véronique Cortier ; Harald Ganzinger ; Florent Jacquemard [France] ; Margus Veanes | Decidable fragments of simultaneous rigid reachability |
This area was generated with Dilib version V0.6.33. |