Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Eléments de l'association

Franche-Comté662
Véronique Cortier138
Franche-Comté Sauf Véronique Cortier" 560
Véronique Cortier Sauf Franche-Comté" 36
Franche-Comté Et Véronique Cortier 102
Franche-Comté Ou Véronique Cortier 698
Corpus24195
\n\n\n\n \n

List of bibliographic references

Number of relevant bibliographic references: 102.
Ident.Authors (with country if any)Title
000184 Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Eric Le Morvan [France]Secure refinements of communication channels
000255 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From Security Protocols to Pushdown Automata
000282 Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Eric Le Morvan [France]Secure refinements of communication channels
000317 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Checking Trace Equivalence: How to Get Rid of Nonces?
000462 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Decidability of trace equivalence for protocols with nonces
000558 David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; David Galindo [France] ; Olivier Pereira [Belgique] ; Bogdan Warinschi [Royaume-Uni]A comprehensive analysis of game-based ballot privacy definitions
000590 Véronique Cortier [France] ; Fabienne Eigner [Allemagne] ; Steve Kremer [France] ; Matteo Maffei [Allemagne] ; Cyrille Wiedling [Belgique]Type-Based Verification of Electronic Voting Protocols
000596 Vincent Cheval [France] ; Véronique Cortier [France]Timing attacks in security protocols: symbolic framework and proof techniques
000669 Véronique Cortier [France]Formal verification of e-voting: solutions and challenges
000951 Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols: A Tutorial
000980 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Typing messages for free in security protocols: the~case of equivalence properties
000981 Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]Election Verifiability for Helios under Weaker Trust Assumptions
000A67 Véronique Cortier [France]Electronic Voting: How Logic Can Help
000A69 Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France]A tool for automating the computationally complete symbolic attacker (Extended Abstract)
000B37 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Typing messages for free in security protocols: the case of equivalence properties
000B39 Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]Election Verifiability for Helios under Weaker Trust Assumptions
000D51 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Modeling and Verifying Ad Hoc Routing Protocols
000D90 Véronique Cortier [France] ; Graham Steel [France]A Generic Security API for Symmetric Key Management on Cryptographic Devices
000F47 Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]Distributed ElGamal à la Pedersen - Application to Helios
000F48 Florian Boehl [Allemagne] ; Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni]Deduction Soundness: Prove One, Get Five for Free
001102 Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Antoine Plet [France]Lengths may break privacy -- or how to check for equivalences with length
001108 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From security protocols to pushdown automata
001173 Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France]Tractable inference systems: an extension with a deducibility predicate
001241 Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From security protocols to pushdown automata
001278 Myrto Arapinis [Royaume-Uni] ; Véronique Cortier [France] ; Steve Kremer [France] ; Mark D. Ryan [Royaume-Uni]Practical Everlasting Privacy
001344 Mathieu Baudet [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]YAPA: A generic tool for computing intruder knowledge
001376 Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding equivalence-based properties using constraint solving
001386 Véronique Cortier [France] ; Ben Smyth [France]Attacking and fixing Helios: An analysis of ballot secrecy
001786 Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]A generic construction for voting correctness at minimum cost - Application to Helios
001925 Véronique Cortier [France] ; Graham Steel [France] ; Cyrille Wiedling [France]Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices
001926 David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; Olivier Pereira [Belgique] ; Bogdan Warinschi [Royaume-Uni]Measuring Vote Privacy, Revisited.
001A07 Véronique Cortier [France] ; Graham Steel [France] ; Cyrille Wiedling [France]Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices
001B98 Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France]Security proof with dishonest keys
001C00 Véronique Cortier [France] ; Jan Degrieck [France] ; Stéphanie Delaune [France]Analysing routing protocols: four nodes topologies are sufficient
001C01 Véronique Cortier [France] ; Cyrille Wiedling [France]A formal analysis of the Norwegian E-voting protocol
002026 Véronique Cortier [France] ; Cyrille Wiedling [France]A formal analysis of the Norwegian e-voting protocol
002046 Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni]A Composable Computational Soundness Notion
002132 David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; Olivier Pereira [Belgique] ; Ben Smyth [France] ; Bogdan Warinschi [Royaume-Uni]Adapting Helios for provable ballot secrecy
002192 Mathilde Arnaud ; Véronique Cortier [France] ; Stéphanie DelauneDeciding security for protocols with recursive tests
002259 Véronique Cortier [France] ; Bogdan WarinschiA composable computational soundness notion (Abstract)
002269 Véronique Cortier [France] ; Ben SmythAttacking and fixing Helios: An analysis of ballot secrecy
002316 Ben Smyth [France] ; Véronique Cortier [France]A note on replay attacks that violate privacy in electronic voting schemes
002426 Hubert Comon-Lundh [France] ; Véronique Cortier [France]How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.
002505 Konstantinos Chatzikokolakis [France] ; Véronique Cortier [France]Proceedings of the 8th International Workshop on Security Issues in Concurrency
002530 Véronique Cortier [France] ; Jérémie Detrey [France] ; Pierrick Gaudry [France] ; Frédéric Sur [France] ; Emmanuel Thomé [France] ; Mathieu Turuani [France] ; Paul Zimmermann [France]Ballot stuffing in a postal voting system
002848 Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols
002F03 Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Eugen Zalinescu [France]Deciding security properties for cryptographic protocols. Application to key cycles.
003226 Stefan Ciobaca [France] ; Véronique Cortier [France]Protocol composition for arbitrary primitives.
003240 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Modeling and Verifying Ad Hoc Routing Protocols.
003325 Véronique Cortier [France]Analysis of cryptographic protocols: from symbolic to computational models
003387 Véronique Cortier [France] ; Graham Steel [France]A Generic Security API for Symmetric Key Management on Cryptographic Devices
003486 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Modeling and Verifying Ad Hoc Routing Protocol
003488 Véronique Cortier [France] ; Stéphanie Delaune [France]A method for proving observational equivalence
003513 Mathieu Baudet ; Véronique Cortier [France] ; Stéphanie Delaune [France]YAPA: A generic tool for computing intruder knowledge
003687 Véronique Cortier [France] ; Claude Kirchner [France] ; Mitsuhiro Okada [Japon] ; Hideki Sakurada [Japon]Formal to practical Security
003C32 Véronique Cortier [France] ; Graham Steel [France]Synthesising Secure APIs
003C81 Mouhebeddine Berrima [Tunisie] ; Narjes Ben Rajeb [Tunisie] ; Véronique Cortier [France]Deciding knowledge in security protocols under some e-voting theories
003D12 Véronique Cortier [France] ; Steve Kremer [France] ; Bogdan Warinschi [Royaume-Uni]A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
003D83 Hubert Comon-Lundh [France] ; Véronique Cortier [France]Computational soundness of observational equivalence
003F40 Hubert Comon-Lundh [France] ; Véronique Cortier [France]Computational soundness of observational equivalence
004597 Hubert Comon-Lundh [France] ; Véronique Cortier [France]Computational soundness of observational equivalence
004632 Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France]Safely Composing Security Protocols
004717 Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding knowledge in security protocols for monoidal equational theories.
004753 Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Zalinescu [France]Synthetizing secure protocols
004761 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Combining algorithms for deciding knowledge in security protocols
004764 Véronique Cortier [France] ; Ralf Kuesters [Suisse] ; Bogdan Warinschi [Royaume-Uni]A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols.
004842 Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding knowledge in security protocols for monoidal equational theories.
004843 Véronique Cortier [France] ; Eugen Zalinescu [France]Deciding key cycles for security protocols.
004847 Véronique Cortier [France] ; Stéphanie Delaune [France] ; Graham Steel [Royaume-Uni]A Formal Theory of Key Conjuring.
004848 Véronique Cortier [France] ; Ralf Kuesters [Suisse] ; Bogdan Warinschi [Royaume-Uni]A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols.
004992 Véronique Cortier [France] ; Keighren Gavin [Royaume-Uni] ; Graham Steel [Royaume-Uni]Automatic Analysis of the Security of XOR-based Key Management Schemes.
004A41 Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Zalinescu [France]Relating two standard notions of secrecy
004E26 Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Zalinescu [France]Synthesizing secure protocols
004E39 Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France]Safely composing security protocols
004E76 Zalinescu Eugen [France] ; Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni]From passive to active security via a simple transformation
004E87 Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Combining algorithms for deciding knowledge in security protocols
004F03 Véronique Cortier [France] ; Stéphanie Delaune [France] ; Graham Steel [Royaume-Uni]A Formal Theory of Key Conjuring
004F30 Véronique Cortier [France] ; Steve Kremer [France] ; Ralf Kuesters [Suisse] ; Bogdan Warinschi [France]Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
004F55 Véronique Cortier [France] ; Eugen Zalinescu [France]Deciding key cycles for security protocols
005019 Véronique Cortier [France]Verification of cryptographic protocols: techniques and link to cryptanalysis
005021 Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Zalinescu [France]Relating two standard notions of secrecy
005023 Véronique Cortier [France] ; Heinrich Hoerdegen [France] ; Bogdan Warinschi [France]Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
005053 Véronique Cortier [France] ; Graham Steel [Royaume-Uni]On the Decidability of a Class of XOR-based Key-management APIs
005261 Véronique Cortier [France] ; Martin Abadi [États-Unis]Deciding knowledge in security protocols under equational theories.
005643 Véronique Cortier [France]Sécuriser les réseaux, les protocoles cryptographiques
005658 Véronique Cortier [France]Protocoles cryptographiques : analyse par méthodes formelles
005691 Véronique Cortier [France]Divers protocoles couramment utilisés en informatique
005698 Véronique Cortier [France]Ces protocoles qui nous protègent
005732 Eugen Zalinescu [France] ; Véronique Cortier [France] ; Michaël Rusinowitch [France]Relating two Standard Notions of Secrecy
005774 Véronique Cortier [France] ; Heinrich Hördegen [France] ; Bogdan Warinschi [France]Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
005821 Véronique Cortier [France] ; Stéphanie Delaune [France] ; Pascal Lafourcade [France]A Survey of Algebraic Properties Used in Cryptographic Protocols
005977 Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France]Computationally Sound Implementations of Equational Theories against Passive Adversaries
005983 Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Zalinescu [France]A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures
005A16 Martin Abadi ; Véronique Cortier [France]Deciding knowledge in security protocols under (many more) equational theories
005A58 Véronique Cortier [France] ; Bogdan WarinschiComputationally Sound, Automated Proofs for Security Protocols
005C23 Hubert Comon-Lundh [France] ; Véronique Cortier [France]Tree automata with one memory, set constraints and cryptographic protocols
006389 Véronique Cortier [France]Vérifier les protocoles cryptographiques
006557 Véronique Cortier [France] ; Xavier Goaoc [France] ; Mira Lee [Corée du Sud] ; Hyeon-Suk Na [Corée du Sud]A note on maximally repeated sub-patterns of a point set
006749 Hubert Comon-Lundh [France] ; Véronique Cortier [France]Security properties: two agents are sufficient
007039 Martin Abadi ; Véronique Cortier [France]Deciding knowledge in security protocols under equational theories
007040 Martin Abadi ; Véronique Cortier [France]Deciding knowledge in security protocols under equational theories
007058 Véronique Cortier [France] ; Bogdan WarinschiComputationally Sound, Automated Proofs for Security Protocols

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022