Serveur d'exploration sur la recherche en informatique en Lorraine - Exploration (Accueil)

Index « Keywords » - entrée « security protocols »
Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
security protocoles < security protocols < security protocols verification  Facettes :

List of bibliographic references indexed by security protocols

Number of relevant bibliographic references: 25.
[0-20] [0 - 20][0 - 25][20-24][20-40]
Ident.Authors (with country if any)Title
000780 (2015) Frédéric Dadeau [France] ; Pierre-Cyrille Héam [France] ; Rafik Kheddam [France] ; Ghazi Maatoug [France] ; Michael Rusinowitch [France]Model‐based mutation testing from security protocols in HLPSL
000A95 (2014-06-19) Myrto Arapinis [Royaume-Uni] ; Stéphanie Delaune [France] ; Steve Kremer [France]Dynamic Tags for Security Protocols
003D12 (2009) Véronique Cortier [France] ; Steve Kremer [France] ; Bogdan Warinschi [Royaume-Uni]A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
004601 (2008) Yohan Boichut [France] ; Pierre-Cyrille Heam [France] ; Olga Kouchnarenko [France]Approximation based tree regular model checking
004621 (2007-12-17) Eugen Zalinescu [France]Security of cryptographic protocols: decidability and transfer resultats
004E26 (2007) Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni] ; Eugen Zalinescu [France]Synthesizing secure protocols
004E39 (2007) Véronique Cortier [France] ; Jérémie Delaitre [France] ; Stéphanie Delaune [France]Safely composing security protocols
004E76 (2007) Zalinescu Eugen [France] ; Véronique Cortier [France] ; Bogdan Warinschi [Royaume-Uni]From passive to active security via a simple transformation
004E87 (2007) Mathilde Arnaud [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Combining algorithms for deciding knowledge in security protocols
004F03 (2007) Véronique Cortier [France] ; Stéphanie Delaune [France] ; Graham Steel [Royaume-Uni]A Formal Theory of Key Conjuring
005732 (2006) Eugen Zalinescu [France] ; Véronique Cortier [France] ; Michaël Rusinowitch [France]Relating two Standard Notions of Secrecy
005765 (2006) Yohan Boichut [France] ; Pierre-Cyrille Héam [France] ; Olga Kouchnarenko [France]Handling Algebraic Properties in Automatic Analysis of Security Protocols
005804 (2006) Yohan Boichut [France] ; Pierre-Cyrille Héam [France] ; Olga Kouchnarenko [France]Automatic Abstraction Generation : How to Make an Expert Verification Technique for Security Protocols available to Non-expert Users
006550 (2005) Yohan Boichut [France] ; Pierre-Cyrille Héam [France] ; Olga Kouchnarenko [France]Automatic Verification of Security Protocols Using Approximations
006897 (2004) Yannick ChevalierA Simple Constraint-solving Decision Procedure for Protocols with Exclusive or
006944 (2004) Laurent VigneronAutomatic Verification of Security Protocols
006964 (2004) Martin Abadi ; Véronique CortierDeciding knowledge in security protocols under equational theories
006A88 (2004) Ghassan Chaddoud ; Vijay Varadharajan ; Isabelle Chrisment ; André SchaffGestion efficace de la sécurité des communications de groupe pour le service SSM
006B26 (2004) Y. Chevalier [France] ; L. Vigneron [France]Strategy for Verifying Security Protocols with Unbounded Message Size
007058 (2004) Véronique Cortier [France] ; Bogdan WarinschiComputationally Sound, Automated Proofs for Security Protocols
007109 (2004) Yannick Chevalier [France]A Simple Constraint-solving Decision Procedure for Protocols with Exclusive or

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdIndexSelect -h $EXPLOR_AREA/Data/Main/Exploration/KwdEn.i -k "security protocols" 
HfdIndexSelect -h $EXPLOR_AREA/Data/Main/Exploration/KwdEn.i  \
                -Sk "security protocols" \
         | HfdSelect -Kh $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd 

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    indexItem
   |index=    KwdEn.i
   |clé=    security protocols
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022