Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Eléments de l'association

France14883
Véronique Cortier138
France Sauf Véronique Cortier" 14755
Véronique Cortier Sauf France" 10
France Et Véronique Cortier 128
France Ou Véronique Cortier 14893
Corpus24195
\n\n\n\n \n

List of bibliographic references

Number of relevant bibliographic references: 128.
Ident.Authors (with country if any)Title
000020 Véronique Cortier [France] ; David Galindo [Royaume-Uni] ; Mueller Johannes [Allemagne] ; Ralf Kuesters [Allemagne] ; Truderung Tomasz [Allemagne]SoK: Verifiability Notions for E-Voting Protocols
000184 Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Eric Le Morvan [France]Secure refinements of communication channels
000255 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From Security Protocols to Pushdown Automata
000282 Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Eric Le Morvan [France]Secure refinements of communication channels
000317 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Checking Trace Equivalence: How to Get Rid of Nonces?
000462 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Decidability of trace equivalence for protocols with nonces
000558 David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; David Galindo [France] ; Olivier Pereira [Belgique] ; Bogdan Warinschi [Royaume-Uni]A comprehensive analysis of game-based ballot privacy definitions
000590 Véronique Cortier [France] ; Fabienne Eigner [Allemagne] ; Steve Kremer [France] ; Matteo Maffei [Allemagne] ; Cyrille Wiedling [Belgique]Type-Based Verification of Electronic Voting Protocols
000596 Vincent Cheval [France] ; Véronique Cortier [France]Timing attacks in security protocols: symbolic framework and proof techniques
000669 Véronique Cortier [France]Formal verification of e-voting: solutions and challenges
000951 Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols: A Tutorial
000980 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Typing messages for free in security protocols: the~case of equivalence properties
000981 Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]Election Verifiability for Helios under Weaker Trust Assumptions
000A67 Véronique Cortier [France]Electronic Voting: How Logic Can Help
000A69 Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France]A tool for automating the computationally complete symbolic attacker (Extended Abstract)
000B37 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Typing messages for free in security protocols: the case of equivalence properties
000B39 Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]Election Verifiability for Helios under Weaker Trust Assumptions
000D51 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Modeling and Verifying Ad Hoc Routing Protocols
000D90 Véronique Cortier [France] ; Graham Steel [France]A Generic Security API for Symmetric Key Management on Cryptographic Devices
000F47 Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]Distributed ElGamal à la Pedersen - Application to Helios
000F48 Florian Boehl [Allemagne] ; Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni]Deduction Soundness: Prove One, Get Five for Free
001102 Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Antoine Plet [France]Lengths may break privacy -- or how to check for equivalences with length
001108 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From security protocols to pushdown automata
001173 Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France]Tractable inference systems: an extension with a deducibility predicate
001241 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From security protocols to pushdown automata
001278 Myrto Arapinis [Royaume-Uni] ; Véronique Cortier [France] ; Steve Kremer [France] ; Mark D. Ryan [Royaume-Uni]Practical Everlasting Privacy
001344 Mathieu Baudet [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]YAPA: A generic tool for computing intruder knowledge
001376 Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding equivalence-based properties using constraint solving
001386 Véronique Cortier [France] ; Ben Smyth [France]Attacking and fixing Helios: An analysis of ballot secrecy
001638 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Cyrille Wiedling [France]Analysis of an Electronic Boardroom Voting System
001726 Véronique Cortier [France] ; Ben Smyth [France]Attacking and fixing Helios: An analysis of ballot secrecy
001786 Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]A generic construction for voting correctness at minimum cost - Application to Helios
001925 Véronique Cortier [France] ; Graham Steel [France] ; Cyrille Wiedling [France]Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices
001926 David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; Olivier Pereira [Belgique] ; Bogdan Warinschi [Royaume-Uni]Measuring Vote Privacy, Revisited.
001A07 Véronique Cortier [France] ; Graham Steel [France] ; Cyrille Wiedling [France]Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices
001B98 Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France]Security proof with dishonest keys
001C00 Véronique Cortier [France] ; Jan Degrieck [France] ; Stéphanie Delaune [France]Analysing routing protocols: four nodes topologies are sufficient
001C01 Véronique Cortier [France] ; Cyrille Wiedling [France]A formal analysis of the Norwegian E-voting protocol
001D92 Véronique Cortier [France]Secure Composition of Protocols
002026 Véronique Cortier [France] ; Cyrille Wiedling [France]A formal analysis of the Norwegian e-voting protocol
002046 Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni]A Composable Computational Soundness Notion
002132 David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; Olivier Pereira [Belgique] ; Ben Smyth [France] ; Bogdan Warinschi [Royaume-Uni]Adapting Helios for provable ballot secrecy
002192 Mathilde Arnaud ; Véronique Cortier [France] ; Stéphanie DelauneDeciding security for protocols with recursive tests
002259 Véronique Cortier [France] ; Bogdan WarinschiA composable computational soundness notion (Abstract)
002269 Véronique Cortier [France] ; Ben SmythAttacking and fixing Helios: An analysis of ballot secrecy
002316 Ben Smyth [France] ; Véronique Cortier [France]A note on replay attacks that violate privacy in electronic voting schemes
002426 Hubert Comon-Lundh [France] ; Véronique Cortier [France]How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.
002505 Konstantinos Chatzikokolakis [France] ; Véronique Cortier [France]Proceedings of the 8th International Workshop on Security Issues in Concurrency
002530 Véronique Cortier [France] ; Jérémie Detrey [France] ; Pierrick Gaudry [France] ; Frédéric Sur [France] ; Emmanuel Thomé [France] ; Mathieu Turuani [France] ; Paul Zimmermann [France]Ballot stuffing in a postal voting system
002721 Mouhebeddine Berrima ; Narjes Ben Rajeb [Tunisie] ; Véronique Cortier [France]Deciding knowledge in security protocols under some e-voting theories
002848 Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols
002F03 Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Eugen Zalinescu [France]Deciding security properties for cryptographic protocols. Application to key cycles.
003095 Véronique Cortier [France] ; Stéphanie Delaune [France]Decidability and Combination Results for Two Notions of Knowledge in Security Protocols
003127 Véronique Cortier [France] ; Steve Kremer [France] ; Bogdan Warinschi [Royaume-Uni]A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
003226 Stefan Ciobaca [France] ; Véronique Cortier [France]Protocol composition for arbitrary primitives.
003240 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Modeling and Verifying Ad Hoc Routing Protocols.
003325 Véronique Cortier [France]Analysis of cryptographic protocols: from symbolic to computational models
003387 Véronique Cortier [France] ; Graham Steel [France]A Generic Security API for Symmetric Key Management on Cryptographic Devices
003486 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Modeling and Verifying Ad Hoc Routing Protocol
003488 Véronique Cortier [France] ; Stéphanie Delaune [France]A method for proving observational equivalence
003513 Mathieu Baudet ; Véronique Cortier [France] ; Stéphanie Delaune [France]YAPA: A generic tool for computing intruder knowledge
003687 Véronique Cortier [France] ; Claude Kirchner [France] ; Mitsuhiro Okada [Japon] ; Hideki Sakurada [Japon]Formal to practical Security
003B86 Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France]Computationally sound implementations of equational theories against passive adversaries
003C32 Véronique Cortier [France] ; Graham Steel [France]Synthesising Secure APIs
003C81 Mouhebeddine Berrima [Tunisie] ; Narjes Ben Rajeb [Tunisie] ; Véronique Cortier [France]Deciding knowledge in security protocols under some e-voting theories
003D12 Véronique Cortier [France] ; Steve Kremer [France] ; Bogdan Warinschi [Royaume-Uni]A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
003D83 Hubert Comon-Lundh [France] ; Véronique Cortier [France]Computational soundness of observational equivalence
003F40 Hubert Comon-Lundh [France] ; Véronique Cortier [France]Computational soundness of observational equivalence
004282 Véronique Cortier [France]Verification of Security Protocols
004313 Véronique Cortier [France] ; Stéphanie Delaune [France]Safely composing security protocols
004597 Hubert Comon-Lundh [France] ; Véronique Cortier [France]Computational soundness of observational equivalence
004632 Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France]Safely Composing Security Protocols
004717 Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding knowledge in security protocols for monoidal equational theories.
004753 Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Zalinescu [France]Synthetizing secure protocols
004761 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Combining algorithms for deciding knowledge in security protocols
004764 Véronique Cortier [France] ; Ralf Kuesters [Suisse] ; Bogdan Warinschi [Royaume-Uni]A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols.
004842 Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding knowledge in security protocols for monoidal equational theories.
004843 Véronique Cortier [France] ; Eugen Zalinescu [France]Deciding key cycles for security protocols.
004847 Véronique Cortier [France] ; Stéphanie Delaune [France] ; Graham Steel [Royaume-Uni]A Formal Theory of Key Conjuring.
004848 Véronique Cortier [France] ; Ralf Kuesters [Suisse] ; Bogdan Warinschi [Royaume-Uni]A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols.
004992 Véronique Cortier [France] ; Keighren Gavin [Royaume-Uni] ; Graham Steel [Royaume-Uni]Automatic Analysis of the Security of XOR-based Key Management Schemes.
004A41 Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Zalinescu [France]Relating two standard notions of secrecy
004B74 Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Z Linescu [France]Synthesizing Secure Protocols
004B88 Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France]Safely Composing Security Protocols
004C80 Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding Knowledge in Security Protocols for Monoidal Equational Theories
004C90 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Combining Algorithms for Deciding Knowledge in Security Protocols
004D01 Véronique Cortier [France] ; Gavin Keighren [Royaume-Uni] ; Graham Steel [Royaume-Uni]Automatic Analysis of the Security of XOR-Based Key Management Schemes
004E26 Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Zalinescu [France]Synthesizing secure protocols
004E39 Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France]Safely composing security protocols
004E76 Zalinescu Eugen [France] ; Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni]From passive to active security via a simple transformation
004E87 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Combining algorithms for deciding knowledge in security protocols
004F03 Véronique Cortier [France] ; Stéphanie Delaune [France] ; Graham Steel [Royaume-Uni]A Formal Theory of Key Conjuring
004F30 Véronique Cortier [France] ; Steve Kremer [France] ; Ralf Kuesters [Suisse] ; Bogdan Warinschi [France]Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
004F55 Véronique Cortier [France] ; Eugen Zalinescu [France]Deciding key cycles for security protocols
005019 Véronique Cortier [France]Verification of cryptographic protocols: techniques and link to cryptanalysis
005021 Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Zalinescu [France]Relating two standard notions of secrecy
005023 Véronique Cortier [France] ; Heinrich Hoerdegen [France] ; Bogdan Warinschi [France]Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
005053 Véronique Cortier [France] ; Graham Steel [Royaume-Uni]On the Decidability of a Class of XOR-based Key-management APIs
005261 Véronique Cortier [France] ; Martin Abadi [États-Unis]Deciding knowledge in security protocols under equational theories.
005401 Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Z Linescu [France]Relating Two Standard Notions of Secrecy
005508 Véronique Cortier [France] ; Eugen Z Linescu [France]Deciding Key Cycles for Security Protocols
005573 Véronique Cortier [France]Protocoles cryptographiques: analyse par méthodes formelles
005612 Manin Abadi [États-Unis] ; Véronique Cortier [France]Deciding knowledge in security protocols under equational thoories
005616 Véronique Cortier [France] ; Steve Kremer [France] ; Ralf Kusters [Suisse] ; Bogdan Warinschi [France]Computationally sound symbolic secrecy in the presence of hash functions
005625 Véronique Cortier [France] ; Xavier Goaoc [France] ; Mira Lee [Corée du Sud] ; Hyeon-Suk Na [Corée du Sud]A note on maximally repeated sub-patterns of a point set
005643 Véronique Cortier [France]Sécuriser les réseaux, les protocoles cryptographiques
005658 Véronique Cortier [France]Protocoles cryptographiques : analyse par méthodes formelles
005691 Véronique Cortier [France]Divers protocoles couramment utilisés en informatique
005698 Véronique Cortier [France]Ces protocoles qui nous protègent
005732 Eugen Zalinescu [France] ; Véronique Cortier [France] ; Michaël Rusinowitch [France]Relating two Standard Notions of Secrecy
005774 Véronique Cortier [France] ; Heinrich Hördegen [France] ; Bogdan Warinschi [France]Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
005821 Véronique Cortier [France] ; Stéphanie Delaune [France] ; Pascal Lafourcade [France]A Survey of Algebraic Properties Used in Cryptographic Protocols
005977 Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France]Computationally Sound Implementations of Equational Theories against Passive Adversaries
005983 Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Zalinescu [France]A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures
005A16 Martin Abadi ; Véronique Cortier [France]Deciding knowledge in security protocols under (many more) equational theories
005A58 Véronique Cortier [France] ; Bogdan WarinschiComputationally Sound, Automated Proofs for Security Protocols
005C23 Hubert Comon-Lundh [France] ; Véronique Cortier [France]Tree automata with one memory, set constraints and cryptographic protocols
006121 Véronique Cortier [France]Vérifier les protocoles cryptographiques
006279 Véronique Cortier [France] ; Bogdan Warinschi [États-Unis]Computationally Sound, Automated Proofs for Security Protocols
006280 Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France]Computationally Sound Implementations of Equational Theories Against Passive Adversaries
006389 Véronique Cortier [France]Vérifier les protocoles cryptographiques
006557 Véronique Cortier [France] ; Xavier Goaoc [France] ; Mira Lee [Corée du Sud] ; Hyeon-Suk Na [Corée du Sud]A note on maximally repeated sub-patterns of a point set
006749 Hubert Comon-Lundh [France] ; Véronique Cortier [France]Security properties: two agents are sufficient
006C20 Martín Abadi [États-Unis] ; Véronique Cortier [France]Deciding Knowledge in Security Protocols Under Equational Theories
007039 Martin Abadi ; Véronique Cortier [France]Deciding knowledge in security protocols under equational theories
007040 Martin Abadi ; Véronique Cortier [France]Deciding knowledge in security protocols under equational theories
007058 Véronique Cortier [France] ; Bogdan WarinschiComputationally Sound, Automated Proofs for Security Protocols
00A351 Véronique Cortier ; Harald Ganzinger ; Florent Jacquemard [France] ; Margus VeanesDecidable fragments of simultaneous rigid reachability

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022