Serveur d'exploration sur la recherche en informatique en Lorraine - Exploration (Accueil)

Index « Auteurs » - entrée « Véronique Cortier »
Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
Véronique Boutin < Véronique Cortier < Véronique Dujardin  Facettes :

List of bibliographic references indexed by Véronique Cortier

Number of relevant bibliographic references: 138.
[0-50] [0 - 20][0 - 50][50-70]
Ident.Authors (with country if any)Title
000020 (2016-05-23) Véronique Cortier [France] ; David Galindo [Royaume-Uni] ; Mueller Johannes [Allemagne] ; Ralf Kuesters [Allemagne] ; Truderung Tomasz [Allemagne]SoK: Verifiability Notions for E-Voting Protocols
000184 (2015-12-16) Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Eric Le Morvan [France]Secure refinements of communication channels
000255 (2015-11) Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From Security Protocols to Pushdown Automata
000282 (2015-10-13) Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Eric Le Morvan [France]Secure refinements of communication channels
000317 (2015-09-21) Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Checking Trace Equivalence: How to Get Rid of Nonces?
000462 (2015-07) Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Decidability of trace equivalence for protocols with nonces
000558 (2015-05) David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; David Galindo [France] ; Olivier Pereira [Belgique] ; Bogdan Warinschi [Royaume-Uni]A comprehensive analysis of game-based ballot privacy definitions
000590 (2015-04-11) Véronique Cortier [France] ; Fabienne Eigner [Allemagne] ; Steve Kremer [France] ; Matteo Maffei [Allemagne] ; Cyrille Wiedling [Belgique]Type-Based Verification of Electronic Voting Protocols
000596 (2015-04) Vincent Cheval [France] ; Véronique Cortier [France]Timing attacks in security protocols: symbolic framework and proof techniques
000669 (2015-01) Véronique Cortier [France]Formal verification of e-voting: solutions and challenges
000951 (2014-09-13) Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols: A Tutorial
000980 (2014-09) Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Typing messages for free in security protocols: the~case of equivalence properties
000981 (2014-09) Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]Election Verifiability for Helios under Weaker Trust Assumptions
000A67 (2014-07) Véronique Cortier [France]Electronic Voting: How Logic Can Help
000A69 (2014-07) Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France]A tool for automating the computationally complete symbolic attacker (Extended Abstract)
000B37 (2014-06) Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Typing messages for free in security protocols: the case of equivalence properties
000B39 (2014-06) Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]Election Verifiability for Helios under Weaker Trust Assumptions
000D51 (2014) Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Modeling and Verifying Ad Hoc Routing Protocols
000D90 (2014) Véronique Cortier [France] ; Graham Steel [France]A Generic Security API for Symmetric Key Management on Cryptographic Devices
000F47 (2013-11-04) Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]Distributed ElGamal à la Pedersen - Application to Helios
000F48 (2013-11-04) Florian Boehl [Allemagne] ; Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni]Deduction Soundness: Prove One, Get Five for Free
001102 (2013-07-13) Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Antoine Plet [France]Lengths may break privacy -- or how to check for equivalences with length
001108 (2013-07-08) Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From security protocols to pushdown automata
001173 (2013-06-09) Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France]Tractable inference systems: an extension with a deducibility predicate
001241 (2013-04-24) Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From security protocols to pushdown automata
001278 (2013-03-16) Myrto Arapinis [Royaume-Uni] ; Véronique Cortier [France] ; Steve Kremer [France] ; Mark D. Ryan [Royaume-Uni]Practical Everlasting Privacy
001344 (2013) Mathieu Baudet [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]YAPA: A generic tool for computing intruder knowledge
001376 (2013) Vincent Cheval [Royaume-Uni] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Deciding equivalence-based properties using constraint solving
001386 (2013) Véronique Cortier [France] ; Ben Smyth [France]Attacking and fixing Helios: An analysis of ballot secrecy
001638 (2013) Mathilde Arnaud [France] ; Véronique Cortier [France] ; Cyrille Wiedling [France]Analysis of an Electronic Boardroom Voting System
001726 (2013) Véronique Cortier [France] ; Ben Smyth [France]Attacking and fixing Helios: An analysis of ballot secrecy
001786 (2013) Véronique Cortier [France] ; David Galindo [France] ; Stephane Glondu [France] ; Malika Izabachène [France]A generic construction for voting correctness at minimum cost - Application to Helios
001925 (2012-10) Véronique Cortier [France] ; Graham Steel [France] ; Cyrille Wiedling [France]Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices
001926 (2012-10) David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; Olivier Pereira [Belgique] ; Bogdan Warinschi [Royaume-Uni]Measuring Vote Privacy, Revisited.
001A07 (2012-07-31) Véronique Cortier [France] ; Graham Steel [France] ; Cyrille Wiedling [France]Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices
001B98 (2012-03-24) Hubert Comon-Lundh [France] ; Véronique Cortier [France] ; Guillaume Scerri [France]Security proof with dishonest keys
001C00 (2012-03-24) Véronique Cortier [France] ; Jan Degrieck [France] ; Stéphanie Delaune [France]Analysing routing protocols: four nodes topologies are sufficient
001C01 (2012-03-24) Véronique Cortier [France] ; Cyrille Wiedling [France]A formal analysis of the Norwegian E-voting protocol
001D92 (2012) Véronique Cortier [France]Secure Composition of Protocols
002026 (2011-11-01) Véronique Cortier [France] ; Cyrille Wiedling [France]A formal analysis of the Norwegian e-voting protocol
002046 (2011-10-17) Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni]A Composable Computational Soundness Notion
002132 (2011-09-12) David Bernhard [Royaume-Uni] ; Véronique Cortier [France] ; Olivier Pereira [Belgique] ; Ben Smyth [France] ; Bogdan Warinschi [Royaume-Uni]Adapting Helios for provable ballot secrecy
002192 (2011-08-02) Mathilde Arnaud ; Véronique Cortier [France] ; Stéphanie DelauneDeciding security for protocols with recursive tests
002259 (2011-06-30) Véronique Cortier [France] ; Bogdan WarinschiA composable computational soundness notion (Abstract)
002269 (2011-06-27) Véronique Cortier [France] ; Ben SmythAttacking and fixing Helios: An analysis of ballot secrecy
002316 (2011-06-08) Ben Smyth [France] ; Véronique Cortier [France]A note on replay attacks that violate privacy in electronic voting schemes
002426 (2011-03-10) Hubert Comon-Lundh [France] ; Véronique Cortier [France]How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.
002505 (2011) Konstantinos Chatzikokolakis [France] ; Véronique Cortier [France]Proceedings of the 8th International Workshop on Security Issues in Concurrency
002530 (2011) Véronique Cortier [France] ; Jérémie Detrey [France] ; Pierrick Gaudry [France] ; Frédéric Sur [France] ; Emmanuel Thomé [France] ; Mathieu Turuani [France] ; Paul Zimmermann [France]Ballot stuffing in a postal voting system
002721 (2011) Mouhebeddine Berrima ; Narjes Ben Rajeb [Tunisie] ; Véronique Cortier [France]Deciding knowledge in security protocols under some e-voting theories
002848 (2011) Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdIndexSelect -h $EXPLOR_AREA/Data/Main/Exploration/Author.i -k "Véronique Cortier" 
HfdIndexSelect -h $EXPLOR_AREA/Data/Main/Exploration/Author.i  \
                -Sk "Véronique Cortier" \
         | HfdSelect -Kh $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd 

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    indexItem
   |index=    Author.i
   |clé=    Véronique Cortier
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022