|
||
---|---|---|
inria-00000407v1
Other publications
Un outil d'aide à la conception de protocoles cryptographiques 2005 |
||
inria-00000408v1
Conference papers
The AVISPA Tool for the automated validation of internet security protocols and applications 17th International Conference on Computer Aided Verification - CAV 2005, Jul 2005, Edinburgh, Scotland/UK, France. pp.281-285 |
||
inria-00000409v1
Directions of work or proceedings
Proceedings of the 19th International Workshop on Unification A05-R-022 (A05-R-022), LORIA, pp.143, 2005 |
||
inria-00000426v1
Journal articles
Formal Design and Verification of Operational Transformation Algorithms for Copies Convergence Theoretical Computer Science, Elsevier, 2006, Algebraic Methodology and Software Technology, 351 (2), pp.167--183. ⟨10.1016/j.tcs.2005.09.066⟩ ![]() |
||
inria-00000427v1
Conference papers
Towards Synchronizing Linear Collaborative Objects with Operation Transformation International Conference on Formal Techniques for Networked and Distributed Systems - FORTE 2005, Oct 2005, Taipei/Taiwan, pp.411-427 |
||
inria-00000428v1
Conference papers
Edition collaborative sur réseau pair-à-pair à large échelle Journées Francophones sur la Cohérence des Données en Univers Réparti - CDUR 2005, Nov 2005, Paris/France, pp.42-47 |
||
inria-00000481v1
Conference papers
Combining Lists with Non-Stably Infinite Theories 11th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'04), Mar 2005, Montevideo/Uruguay, pp.51--66, ⟨10.1007/b106931⟩ |
||
inria-00000553v1
Journal articles
Tree automata with one memory, set constraints and cryptographic protocols Theoretical Computer Science, Elsevier, 2005, 331 (1), pp.143-214 |
||
inria-00000554v1
Conference papers
Deciding knowledge in security protocols under (many more) equational theories CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩ ![]() |
||
inria-00000555v1
Conference papers
Computationally Sound Implementations of Equational Theories against Passive Adversaries 32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, pp.652-663, ⟨10.1007/11523468⟩ |
||
inria-00000556v1
Conference papers
Computationally Sound, Automated Proofs for Security Protocols 14th European Symposium on Programming - ESOP 2005, Apr 2005, Edinburgh/United Kingdom, pp.157-171, ⟨10.1007/b107380⟩ ![]() |
||
inria-00000557v1
Conference papers
A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures 7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming - PPDP'05, Jul 2005, Lisbonne/Portugal, pp.12-22 |
||
inria-00000570v1
Conference papers
Combining data structures with nonstably infinite theories using many-sorted logic 5th International Workshop on Frontiers of Combining Systems - FroCoS'05, Sep 2005, Vienna/Austria, pp.48--64, ⟨10.1007/11559306⟩ |
||
inria-00000586v1
Conference papers
On Superposition-Based Satisfiability Procedures and their Combination 2nd International Colloquium on Theoretical Aspects of Computing - ICTAC'05, Oct 2005, Hanoi/Vietnam, pp.594--608, ⟨10.1007/11560647⟩ |
||
inria-00000606v1
Conference papers
Modélisation des propriétés de sécurité de protocoles de groupe 1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes, CRiSIS, Oct 2005, Bourges, France, pp.119-132 |
||
inria-00000607v1
Conference papers
Study for Automatically Analysing Non-repudiation 1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes- CRiSIS 2005, Oct 2005, Bourges/France, pp.157--171 |
||
inria-00070169v1
Reports
Handling Algebraic Properties in Automatic Analysis of Security Protocols [Research Report] RR-5857, INRIA. 2006, pp.18 |
||
inria-00070247v1
Reports
A note on maximally repeated sub-patterns of a point set [Research Report] RR-5773, INRIA. 2005, pp.5 |
||
inria-00070291v1
Reports
Automatic Verification of Security Protocols Using Approximations [Research Report] RR-5727, INRIA. 2005, pp.27 |
||
inria-00070335v1
Reports
Combining Data Structures with Nonstably Infinite Theories using Many-Sorted Logic [Research Report] RR-5678, INRIA. 2005, pp.39 |
||
|
||
inria-00070660v1
Reports
Computationally Sound, Automated Proofs for Security Protocols [Research Report] RR-5341, INRIA. 2004, pp.23 |
||
inria-00070731v1
Reports
A Decision Procedure for a Fragment of Set Theory Involving Monotone, Additive, and Multiplicative Functions [Research Report] RR-5267, INRIA. 2004, pp.22 |
||
inria-00070766v1
Reports
Network Traffic Classification for Intrusion Detection [Research Report] RR-5230, INRIA. 2004, pp.20 |
||
|
||
inria-00070771v1
Reports
A Simple Constraint-solving Decision Procedure for Protocols with Exclusive or [Research Report] RR-5224, INRIA. 2004, pp.35 |
||
inria-00071213v1
Reports
Proving correctness of transformation functions in collaborative editing systems [Research Report] RR-5795, INRIA. 2005, pp.45 |
||
inria-00071215v1
Reports
Tree Automata with Equality Constraints Modulo Equational Theories [Research Report] RR-5754, INRIA. 2005, pp.27 |
||
inria-00071218v1
Reports
Optimistic Replication for Massive Collaborative Editing [Research Report] RR-5719, INRIA. 2005, pp.18 |
||
inria-00071240v1
Reports
Real time group editors without Operational transformation [Research Report] RR-5580, INRIA. 2005, pp.24 |
||
inria-00071253v1
Reports
Verification of Liveness Properties with JML [Research Report] RR-5331, INRIA. 2004, pp.24 |
||
inria-00071357v1
Reports
Relating two Standard Notions of Secrecy [Research Report] RR-5908, INRIA. 2006, pp.32 |
||
inria-00071398v1
Reports
Achieving Convergence with Operational Transformation in Distributed Groupware Systems [Research Report] RR-5188, INRIA. 2004, pp.19 |
||
inria-00071420v1
Reports
Deciding knowledge in security protocols under equational theories [Research Report] RR-5169, INRIA. 2004, pp.22 |
||
inria-00071714v1
Reports
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions [Research Report] RR-4869, INRIA. 2003, pp.22 |
||
inria-00071721v1
Reports
Refinement and Verification of Synchronized Component-based Systems [Research Report] RR-4862, INRIA. 2003, pp.29 |
||
inria-00071812v1
Reports
Computing Approximations of Linear Transition Systems [Research Report] RR-4774, INRIA. 2003, pp.20 |
||
inria-00071870v1
Reports
Using Acceleration to Compute Parameterized System Refinement [Research Report] RR-4716, INRIA. 2003, pp.18 |
||
inria-00071889v1
Reports
An NP Decision Procedure for Protocol Insecurity with XOR [Research Report] RR-4697, INRIA. 2003, pp.22 |
||
inria-00071955v1
Reports
BDD-Driven First-Order Satisfiability Procedures (Extended Version) [Research Report] RR-4630, INRIA. 2002, pp.24 |
||
inria-00071986v1
Reports
Automatic Approximation for the Verification of Cryptographic Protocols [Research Report] RR-4599, INRIA. 2002, pp.18 |
||
inria-00074842v1
Reports
A Calculus for the random generation of combinatorial structures [Research Report] RR-1830, INRIA. 1993 |
||
inria-00077039v1
Reports
Efficiency of Automata in Semi-Commutation Verification Techniques [Research Report] RR-5001, INRIA. 2003, pp.20 |
||
|
||
inria-00078825v2
Reports
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption [Research Report] RR-5928, INRIA. 2006, pp.12 |
||
inria-00080593v1
Conference papers
Computationally Sound Compositional Logic for Security Protocols Workshop on Formal and Computational Cryptography - FCC 2006, Véronique Cortier et Steve Kremer, Jul 2006, Venice/Italy |
||
|
||
hal-00080670v1
Conference papers
Unification modulo ACUI plus Homomorphisms/Distributivity 2003, pp.442--457 |
||
inria-00080673v1
Conference papers
Soundness of Symbolic Equivalence for Modular Exponentiation Workshop on Formal and Computational Cryptography - FCC 2006, Véronique Cortier et Steve Kremer, Jul 2006, Venice/Italy |
||
inria-00090165v1
Conference papers
Automatic Verification of Key Management Architecture for Hierarchical Group Protocols Sécurité et Architecture des Réseaux - SAR 2006, May 2006, Seignosse/France, pp.381-397 |
||
inria-00090630v2
Reports
Hypervolumetric Plasma-data Visualization [Research Report] RR-5971, INRIA. 2006, pp.16 |
||
hal-00091620v1
Journal articles
Data Structures with Dynamical Random Transitions Random Structures and Algorithms, Wiley, 2006, 28 (4), pp.403-426. ⟨10.1002/rsa.20091⟩ ![]() |
||
inria-00091656v1
Conference papers
Verification of cryptographic protocols: techniques and link to cryptanalysis Sixth International Workshop on Automatic Verification of Critical Systems - AVOCS'06, Sep 2006, Nancy/France |
||
inria-00091660v1
Conference papers
Adding Integrity to the Ephemerizer's Protocol Sixth International Workshop on Automatic Verification of Critical Systems - AVOCS'06, Sep 2006, Nancy/France, pp.146-151 |
||
hal-00097239v1
Journal articles
A note on maximally repeated sub-patterns of a point set Discrete Mathematics, Elsevier, 2006, 306 (16), pp.1965-1968. ⟨10.1016/j.disc.2006.03.045⟩ |
||
inria-00098694v1
Conference papers
De la nécessité de l'intégration d'un modèle d'hippocampe dans une approche corticale de la sélection de l'action Neurosciences et Sciences pour l'Ingénieur, 1998, Munster, France. 4 p |
||
inria-00099496v1
Conference papers
Filtrage Efficace Pour la Détection d'Intrusions Conférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p |
||
inria-00099514v1
Conference papers
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions Computer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, pp.128-141 |
||
inria-00099513v1
Directions of work or proceedings
4th International Workshop on First-Order Theorem Proving- FTP'2003 1 (1), Elsevier Science Publishers, 2003, Electronic Notes in Theoretical Computer Science |
||
inria-00099700v1
Conference papers
VOTE: Group Editors Analyzing Tool Fourth International Workshop on First-Order Theorem Proving - FTP'03, 2003, Valencia, Spain, pp.153-161, ⟨10.1016/S1571-0661(04)80660-1⟩ ![]() |
||
inria-00099805v1
Book sections
Generating Bridging Definite Descriptions Harry Bunt and Reinhard Muskens. Computing Meaning, 3, Kluwer Academic Publishers, pp.369--396, 2008, Studies in Linguistics and Philosophy - 83, 978-1-4020-5956-8 |
||
inria-00099815v1
Conference papers
Using the Transformational Approach to Build a Safe and Generic Data Synchronizer International Conference on Supporting Group Work - Group 2003, ACM SIGGROUP, Nov 2003, Sanibel Island, Florida, USA, pp.212-220, ⟨10.1145/958160.958194⟩ |
||
inria-00099882v1
Conference papers
A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols Workshop on Specification and Automated Processing of Security Requirements - SAPS'2004, 2004, Linz, Austria, 13 p |
||
inria-00099888v1
Conference papers
Rule-based Programs describing Internet Security Protocols 5th International Workshop on Rule-Based Programming - RULE'2004, Jun 2004, Aachen, Germany, pp.83-97 |
||
inria-00099889v1
Conference papers
A Simple Constraint-solving Decision Procedure for Protocols with Exclusive or 18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 15 p |
||
inria-00099945v1
Journal articles
Strategy for Verifying Security Protocols with Unbounded Message Size Automated Software Engineering, Springer Verlag, 2004, 11 (2), pp.141-166. ⟨10.1023/B:AUSE.0000017741.10347.9b⟩ ![]() |
||
inria-00099982v1
Conference papers
Deciding knowledge in security protocols under equational theories ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩ ![]() |
||
inria-00099981v1
Journal articles
Security properties: two agents are sufficient Science of Computer Programming, Elsevier, 2004, 50 (1-3), pp.51-71 |
||
inria-00099986v1
Conference papers
Deductive Verification of Distributed Groupware Systems Tenth International Conference on Algebraic Methodology and Software Technology - AMAST 2004, 2004, Stirling, Scotland, United Kingdom, pp.226-240 |
||
inria-00099985v1
Conference papers
Nelson-Oppen, Shostak and the Extended Canonizer: A Family Picture with a Newborn First International Colloquium on Theoretical Aspects of Computing - ICTAC 2004, Keijiro Araki, Zhiming Liu, 2004, Guiyang, Chine, 15 p |
||
inria-00099991v1
Conference papers
Automated Reasoning Second International Joint Conference on Automated Reasoning - IJCAR'2004, 2004, Cork, Irlande, France. XII-491 p |
||
inria-00099993v1
Conference papers
A Decidable Analysis of Security Protocols 18th IFIP World Computer Congress on Theoretical Computer Science - TCS'2004, 2004, Toulouse, France, 1 p |
||
inria-00099990v1
Journal articles
Unification Modulo ACUI Plus Distributivity Axioms Journal of Automated Reasoning, Springer Verlag, 2004, 33, pp.1-28. ⟨10.1007/s10817-004-2279-7⟩ ![]() |
||
inria-00100007v1
Conference papers
Fast Multipattern Matching for Intrusion Detection 13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p |
||
inria-00100005v1
Journal articles
On the Fly Pattern Matching For Intrusion Detection with Snort Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967. ⟨10.1007/BF03179710⟩ |
||
inria-00100006v1
Conference papers
Protocol Analysis in Intrusion Detection Using Decision Tree International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408 |
||
inria-00100008v1
Conference papers
High Performance Intrusion Detection using Traffic Classification International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg |
||
inria-00100013v1
Conference papers
Deciding the Security of Protocols with Commuting Public Key Encryption. Workshop on Automated Reasoning for Security Protocol Analysis - ARSPA'2004, Jul 2004, Cork, Ireland. 11 p |
||
inria-00100031v1
Directions of work or proceedings
Special issue on First-Order Theorem Proving of the Journal of Automated Reasoning Deepak Kapur and Laurent Vigneron. 33 / n°3-4, Kluwer, pp.219-383, 2004 |
||
inria-00100032v1
Conference papers
Automatic Verification of Security Protocols 18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 2 p |
||
inria-00100219v1
Reports
A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols [Intern report] A04-R-067 || chevalier04b, 2004, 17 p |
||
inria-00100796v1
Conference papers
Kernel-based extraction of Slow Features: Complex cells learn disparity and translation invariance from natural images Neural Information Processing Systems - NIPS'02, 2002, Vancouver, Canada, 8 p |
||
inria-00100915v1
Conference papers
The AVISS Security Protocol Analysis Tool 14th International Conference on Computer Aided Verification - CAV'2002, Jul 2002, Copenhaguen, Denmark, pp.349-353 |
||
inria-00100916v1
Conference papers
Automated Unbounded Verification of Security Protocols 14th International Conference on Computer Aided Verification - CAV'2002, 2002, Copenhaguen, Denmark, pp.324-337 |
||
inria-00103573v1
Conference papers
The CL-Atse Protocol Analyser 17th International Conference on Term Rewriting and Applications - RTA 2006, Aug 2006, Seattle, WA/USA, pp.277--286 |
||
inria-00103602v1
Conference papers
Implementing a Unification Algorithm for Protocol Analysis with XOR 20th International Workshop on Unification - UNIF'06, Aug 2006, Seattle, WA/USA, pp.1-5 |
||
inria-00103647v1
Conference papers
Compositional Analysis of Contract Signing Protocols 18th IEEE Computer Security Foundations Workshop - CSFW 2005, Jun 2005, Aix-en-Provence/France, pp.94-110 |
||
inria-00103654v1
Conference papers
Probabilistic Polynomial-time Semantics for a Protocol Security Logic 32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbon/Portugal, pp.16--29 |
||
inria-00103656v1
Conference papers
Validation of the ASW Contract Signing Protocol 3rd APPSEM II Workshop, Sep 2005, Frauenchiemsee, Germany |
||
inria-00103935v1
Conference papers
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Dec 2003, Mumbai, India, pp.124-135 |
||
inria-00103954v1
Conference papers
An NP Decision Procedure for Protocol Insecurity with XOR 18th IEEE Symposium on Logic in Computer Science (LICS 2003), Jun 2003, Ottawa, Canada, pp.261-270 |
||
inria-00103879v1
Conference papers
Analyse Automatique de Protocoles de Sécurité avec CASRUL Sécurité et Architecture Réseaux - SAR'2002, Jul 2002, Marrackech, Maroc, Morocco |
||
inria-00103985v1
Journal articles
Protocol insecurity with a finite number of sessions, composed keys is NP-complete. Theoretical Computer Science, Elsevier, 2003, Theoretical Computer Science, 1-3 (299), pp.451-475. ⟨10.1016/S0304-3975(02)00490-5⟩ ![]() |
||
inria-00104005v1
Journal articles
Compositional Analysis of Contract Signing Protocols Theoretical Computer Science, Elsevier, 2006, Theoretical Computer Science |
||
inria-00103807v1
Journal articles
An NP Decision Procedure for Protocol Insecurity with XOR Theoretical Computer Science, Elsevier, 2005, Theoretical Computer Science, 338 (1-3), pp.247-274 |
||
inria-00104132v1
Conference papers
Analysis of Contract Signing Protocols CriSis, Oct 2005, LIFO, ENSI-Bourges, France |
||
inria-00104145v1
Journal articles
On the expressivity and complexity of quantitative branching-time temporal logics. Theoretical Computer Science, Elsevier, 2003, Theoretical Computer Science, 1-3 (297), pp.297-315. ⟨10.1016/S0304-3975(02)00644-8⟩ ![]() |
||
inria-00105519v1
Conference papers
Strategy for Flaws Detection based on a Services-driven Model for Group Protocols Workshop on Constraints in Software Testing, Verification and Analysis - CSTVA 06, Sep 2006, Nantes/France, pp.88-99 |
||
inria-00105523v1
Journal articles
Sécurité des communications de groupe La Revue de l'électricité et de l'électronique, Société de l'Électricité, de l'Électronique et des Technologies de l'Information et de la Communication, 2006, Risques et sécurité des réseaux et des systèmes à composante logicielle, pp.51-60 |
||
inria-00105533v1
Conference papers
Validation of Prouve Protocols using the Automatic Tool TA4SP 3rd Taiwanese-French Conference on Information Technology, Mar 2006, Nancy/France, pp.467-480 |
||
|