Eléments de l'association
|
List of bibliographic references
Number of relevant bibliographic references: 102.Ident. | Authors (with country if any) | Title |
---|---|---|
000184 | Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Eric Le Morvan [France] | Secure refinements of communication channels |
000255 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | From Security Protocols to Pushdown Automata |
000282 | Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Eric Le Morvan [France] | Secure refinements of communication channels |
000317 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Checking Trace Equivalence: How to Get Rid of Nonces? |
000462 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Decidability of trace equivalence for protocols with nonces |
000558 | David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; David Galindo [France] ; Olivier Pereira [Belgique] ; Bogdan Warinschi [Royaume-Uni] | A comprehensive analysis of game-based ballot privacy definitions |
000590 | Véronique Cortier [France] ; Fabienne Eigner [Allemagne] ; Steve Kremer [France] ; Matteo Maffei [Allemagne] ; Cyrille Wiedling [Belgique] | Type-Based Verification of Electronic Voting Protocols |
000596 | Vincent Cheval [France] ; Véronique Cortier [France] | Timing attacks in security protocols: symbolic framework and proof techniques |
000669 | Véronique Cortier [France] | Formal verification of e-voting: solutions and challenges |
000951 | Véronique Cortier [France] ; Steve Kremer [France] | Formal Models and Techniques for Analyzing Security Protocols: A Tutorial |
000980 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Typing messages for free in security protocols: the~case of equivalence properties |
000981 | Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France] | Election Verifiability for Helios under Weaker Trust Assumptions |
000A67 | Véronique Cortier [France] | Electronic Voting: How Logic Can Help |
000A69 | Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France] | A tool for automating the computationally complete symbolic attacker (Extended Abstract) |
000B37 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Typing messages for free in security protocols: the case of equivalence properties |
000B39 | Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France] | Election Verifiability for Helios under Weaker Trust Assumptions |
000D51 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Modeling and Verifying Ad Hoc Routing Protocols |
000D90 | Véronique Cortier [France] ; Graham Steel [France] | A Generic Security API for Symmetric Key Management on Cryptographic Devices |
000F47 | Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France] | Distributed ElGamal à la Pedersen - Application to Helios |
000F48 | Florian Boehl [Allemagne] ; Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] | Deduction Soundness: Prove One, Get Five for Free |
001102 | Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Antoine Plet [France] | Lengths may break privacy -- or how to check for equivalences with length |
001108 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | From security protocols to pushdown automata |
001173 | Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France] | Tractable inference systems: an extension with a deducibility predicate |
001241 | Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | From security protocols to pushdown automata |
001278 | Myrto Arapinis [Royaume-Uni] ; Véronique Cortier [France] ; Steve Kremer [France] ; Mark D. Ryan [Royaume-Uni] | Practical Everlasting Privacy |
001344 | Mathieu Baudet [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | YAPA: A generic tool for computing intruder knowledge |
001376 | Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Deciding equivalence-based properties using constraint solving |
001386 | Véronique Cortier [France] ; Ben Smyth [France] | Attacking and fixing Helios: An analysis of ballot secrecy |
001786 | Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France] | A generic construction for voting correctness at minimum cost - Application to Helios |
001925 | Véronique Cortier [France] ; Graham Steel [France] ; Cyrille Wiedling [France] | Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices |
001926 | David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; Olivier Pereira [Belgique] ; Bogdan Warinschi [Royaume-Uni] | Measuring Vote Privacy, Revisited. |
001A07 | Véronique Cortier [France] ; Graham Steel [France] ; Cyrille Wiedling [France] | Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices |
001B98 | Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France] | Security proof with dishonest keys |
001C00 | Véronique Cortier [France] ; Jan Degrieck [France] ; Stéphanie Delaune [France] | Analysing routing protocols: four nodes topologies are sufficient |
001C01 | Véronique Cortier [France] ; Cyrille Wiedling [France] | A formal analysis of the Norwegian E-voting protocol |
002026 | Véronique Cortier [France] ; Cyrille Wiedling [France] | A formal analysis of the Norwegian e-voting protocol |
002046 | Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] | A Composable Computational Soundness Notion |
002132 | David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; Olivier Pereira [Belgique] ; Ben Smyth [France] ; Bogdan Warinschi [Royaume-Uni] | Adapting Helios for provable ballot secrecy |
002192 | Mathilde Arnaud ; Véronique Cortier [France] ; Stéphanie Delaune | Deciding security for protocols with recursive tests |
002259 | Véronique Cortier [France] ; Bogdan Warinschi | A composable computational soundness notion (Abstract) |
002269 | Véronique Cortier [France] ; Ben Smyth | Attacking and fixing Helios: An analysis of ballot secrecy |
002316 | Ben Smyth [France] ; Véronique Cortier [France] | A note on replay attacks that violate privacy in electronic voting schemes |
002426 | Hubert Comon-Lundh [France] ; Véronique Cortier [France] | How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. |
002505 | Konstantinos Chatzikokolakis [France] ; Véronique Cortier [France] | Proceedings of the 8th International Workshop on Security Issues in Concurrency |
002530 | Véronique Cortier [France] ; Jérémie Detrey [France] ; Pierrick Gaudry [France] ; Frédéric Sur [France] ; Emmanuel Thomé [France] ; Mathieu Turuani [France] ; Paul Zimmermann [France] | Ballot stuffing in a postal voting system |
002848 | Véronique Cortier [France] ; Steve Kremer [France] | Formal Models and Techniques for Analyzing Security Protocols |
002F03 | Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Eugen Zalinescu [France] | Deciding security properties for cryptographic protocols. Application to key cycles. |
003226 | Stefan Ciobaca [France] ; Véronique Cortier [France] | Protocol composition for arbitrary primitives. |
003240 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Modeling and Verifying Ad Hoc Routing Protocols. |
003325 | Véronique Cortier [France] | Analysis of cryptographic protocols: from symbolic to computational models |
003387 | Véronique Cortier [France] ; Graham Steel [France] | A Generic Security API for Symmetric Key Management on Cryptographic Devices |
003486 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Modeling and Verifying Ad Hoc Routing Protocol |
003488 | Véronique Cortier [France] ; Stéphanie Delaune [France] | A method for proving observational equivalence |
003513 | Mathieu Baudet ; Véronique Cortier [France] ; Stéphanie Delaune [France] | YAPA: A generic tool for computing intruder knowledge |
003687 | Véronique Cortier [France] ; Claude Kirchner [France] ; Mitsuhiro Okada [Japon] ; Hideki Sakurada [Japon] | Formal to practical Security |
003C32 | Véronique Cortier [France] ; Graham Steel [France] | Synthesising Secure APIs |
003C81 | Mouhebeddine Berrima [Tunisie] ; Narjes Ben Rajeb [Tunisie] ; Véronique Cortier [France] | Deciding knowledge in security protocols under some e-voting theories |
003D12 | Véronique Cortier [France] ; Steve Kremer [France] ; Bogdan Warinschi [Royaume-Uni] | A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems |
003D83 | Hubert Comon-Lundh [France] ; Véronique Cortier [France] | Computational soundness of observational equivalence |
003F40 | Hubert Comon-Lundh [France] ; Véronique Cortier [France] | Computational soundness of observational equivalence |
004597 | Hubert Comon-Lundh [France] ; Véronique Cortier [France] | Computational soundness of observational equivalence |
004632 | Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France] | Safely Composing Security Protocols |
004717 | Véronique Cortier [France] ; Stéphanie Delaune [France] | Deciding knowledge in security protocols for monoidal equational theories. |
004753 | Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Zalinescu [France] | Synthetizing secure protocols |
004761 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Combining algorithms for deciding knowledge in security protocols |
004764 | Véronique Cortier [France] ; Ralf Kuesters [Suisse] ; Bogdan Warinschi [Royaume-Uni] | A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols. |
004842 | Véronique Cortier [France] ; Stéphanie Delaune [France] | Deciding knowledge in security protocols for monoidal equational theories. |
004843 | Véronique Cortier [France] ; Eugen Zalinescu [France] | Deciding key cycles for security protocols. |
004847 | Véronique Cortier [France] ; Stéphanie Delaune [France] ; Graham Steel [Royaume-Uni] | A Formal Theory of Key Conjuring. |
004848 | Véronique Cortier [France] ; Ralf Kuesters [Suisse] ; Bogdan Warinschi [Royaume-Uni] | A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols. |
004992 | Véronique Cortier [France] ; Keighren Gavin [Royaume-Uni] ; Graham Steel [Royaume-Uni] | Automatic Analysis of the Security of XOR-based Key Management Schemes. |
004A41 | Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Zalinescu [France] | Relating two standard notions of secrecy |
004E26 | Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Zalinescu [France] | Synthesizing secure protocols |
004E39 | Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France] | Safely composing security protocols |
004E76 | Zalinescu Eugen [France] ; Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] | From passive to active security via a simple transformation |
004E87 | Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France] | Combining algorithms for deciding knowledge in security protocols |
004F03 | Véronique Cortier [France] ; Stéphanie Delaune [France] ; Graham Steel [Royaume-Uni] | A Formal Theory of Key Conjuring |
004F30 | Véronique Cortier [France] ; Steve Kremer [France] ; Ralf Kuesters [Suisse] ; Bogdan Warinschi [France] | Computationally Sound Symbolic Secrecy in the Presence of Hash Functions |
004F55 | Véronique Cortier [France] ; Eugen Zalinescu [France] | Deciding key cycles for security protocols |
005019 | Véronique Cortier [France] | Verification of cryptographic protocols: techniques and link to cryptanalysis |
005021 | Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Zalinescu [France] | Relating two standard notions of secrecy |
005023 | Véronique Cortier [France] ; Heinrich Hoerdegen [France] ; Bogdan Warinschi [France] | Explicit Randomness is not Necessary when Modeling Probabilistic Encryption |
005053 | Véronique Cortier [France] ; Graham Steel [Royaume-Uni] | On the Decidability of a Class of XOR-based Key-management APIs |
005261 | Véronique Cortier [France] ; Martin Abadi [États-Unis] | Deciding knowledge in security protocols under equational theories. |
005643 | Véronique Cortier [France] | Sécuriser les réseaux, les protocoles cryptographiques |
005658 | Véronique Cortier [France] | Protocoles cryptographiques : analyse par méthodes formelles |
005691 | Véronique Cortier [France] | Divers protocoles couramment utilisés en informatique |
005698 | Véronique Cortier [France] | Ces protocoles qui nous protègent |
005732 | Eugen Zalinescu [France] ; Véronique Cortier [France] ; Michaël Rusinowitch [France] | Relating two Standard Notions of Secrecy |
005774 | Véronique Cortier [France] ; Heinrich Hördegen [France] ; Bogdan Warinschi [France] | Explicit Randomness is not Necessary when Modeling Probabilistic Encryption |
005821 | Véronique Cortier [France] ; Stéphanie Delaune [France] ; Pascal Lafourcade [France] | A Survey of Algebraic Properties Used in Cryptographic Protocols |
005977 | Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France] | Computationally Sound Implementations of Equational Theories against Passive Adversaries |
005983 | Véronique Cortier [France] ; Michaël Rusinowitch [France] ; Eugen Zalinescu [France] | A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures |
005A16 | Martin Abadi ; Véronique Cortier [France] | Deciding knowledge in security protocols under (many more) equational theories |
005A58 | Véronique Cortier [France] ; Bogdan Warinschi | Computationally Sound, Automated Proofs for Security Protocols |
005C23 | Hubert Comon-Lundh [France] ; Véronique Cortier [France] | Tree automata with one memory, set constraints and cryptographic protocols |
006389 | Véronique Cortier [France] | Vérifier les protocoles cryptographiques |
006557 | Véronique Cortier [France] ; Xavier Goaoc [France] ; Mira Lee [Corée du Sud] ; Hyeon-Suk Na [Corée du Sud] | A note on maximally repeated sub-patterns of a point set |
006749 | Hubert Comon-Lundh [France] ; Véronique Cortier [France] | Security properties: two agents are sufficient |
007039 | Martin Abadi ; Véronique Cortier [France] | Deciding knowledge in security protocols under equational theories |
007040 | Martin Abadi ; Véronique Cortier [France] | Deciding knowledge in security protocols under equational theories |
007058 | Véronique Cortier [France] ; Bogdan Warinschi | Computationally Sound, Automated Proofs for Security Protocols |
This area was generated with Dilib version V0.6.33. |