Sécurité And NotO. Kouchnarenko
List of bibliographic references
Number of relevant bibliographic references: 22.Ident. | Authors (with country if any) | Title |
---|---|---|
000032 | SAMEH HBAIEB TURKI [Tunisie] ; Anis Charfi [Allemagne] ; Farah Bellaaj [Tunisie] ; Rafik Bouaziz [Tunisie] | La modélisation des propriétés non fonctionnelles dans les processus métiers: Une approche basée sur les services |
000134 | S. Chevillard [France] ; J. Harrison [États-Unis] ; M. Joldes [France] ; Ch. Lauter [France] | Efficient and accurate computation of upper bounds of approximation errors |
000171 | Joris Rehm [France] | Proved development of the real-time properties of the IEEE 1394 Root Contention Protocol with the event-B method |
000324 | Vincent Cridlig [France] ; Radu State [France] ; Olivier Festor [France] | Ensuite, une plate-forme libre de configuration de réseau |
000343 | Mathieu Turuani [France] | The CL-atse protocol analyser |
000371 | Mohamed Salah Bouassida [France] ; Isabelle Chrisment [France] ; Olivier Festor [France] | Mobility-awareness in group key management protocols within MANETs |
000379 | Martin Abadi [États-Unis] ; Mathieu Baudet [France] ; Bogdan Warinschi [France] | Guessing attacks and the computational soundness of static equivalence |
000395 | TING ZHANG [États-Unis] ; Henny B. Sipma [États-Unis] ; Zohar Manna [États-Unis] | Decision procedures for term algebras with integer constraints |
000401 | Véronique Cortier [France] ; Steve Kremer [France] ; Ralf Kusters [Suisse] ; Bogdan Warinschi [France] | Computationally sound symbolic secrecy in the presence of hash functions |
000458 | Tomasz Truderung [France, Pologne] | Regular protocols and attacks with regular knowledge |
000464 | Anupam Datta [États-Unis] ; Ante Derek [États-Unis] ; John C. Mitchell [États-Unis] ; Vitaly Shmatikov [États-Unis] ; Mathieu Turuani [France] | Probabilistic polynomial-time semantics for a protocol security logic |
000507 | Véronique Cortier [France] ; Bogdan Warinschi [États-Unis] | Computationally sound, automated proofs for security protocols |
000508 | Mathieu Baudet [France] ; Véronique Cortier [France] ; Steve Kremer [France] | Computationally sound implementations of equational theories against passive adversaries |
000511 | Yannick Chevalier [France] ; Michaël Rusinowitch [France] | Combining intruder theories |
000550 | Ghassan Chaddoud [France] ; Vijay Varadharajan [Australie] ; Isabelle Chrisment [France] ; Andre Schaff [France] | Gestion efficace de la sécurité des communications de groupe pour le service SSM |
000617 | Martin Abadi [États-Unis] ; Veronique Cortier [France] | Deciding knowledge in security protocols under equational theories |
000649 | Guy De Fontguyon [France] ; Eric Giraud-Heraud [France] ; Larnia Rouached [France] ; Louis-Georges Soler [France] | Qualité des produits alimentaires et marques de filières |
000714 | Yannick Chevalier [France] ; Ralf Küsters [États-Unis] ; Michaël Rusinowitch [France] ; Mathieu Turuani [États-Unis] | Deciding the security of protocols with Diffie-Hellman Exponentiation and products in exponents |
000743 | Olivier Festor [France] ; Guillaume Doyen [France] ; Emmanuel Nataf [France] | Supervision et réseaux P2P |
000768 | Alessandro Armando [Italie] ; David Basin [Allemagne] ; Mehdi Bouallagui [France] ; Yannick Chevalier [Allemagne] ; Luca Compagna [Italie] ; Sebastian Mödersheim [France] ; Michael Rusinowitch [France] ; Mathieu Turuani [France] ; Luca Vigano [Allemagne] ; Laurent Vigneron [France] | The AVISS security protocol analysis tool |
000829 | Yannick Chevalier [France] ; Laurent Vigneron [France] | Automated unbounded verification of security protocols |
000907 | Ghassan Chaddoud [France] ; Isabelle Chrisment [France] ; André Schaff [France] | Dynamic group key management protocol |
![]() | This area was generated with Dilib version V0.6.33. | ![]() |