Skip to Main content Skip to Navigation


...
inria-00000408v1  Conference papers
Alessandro ArmandoDavid Basinyohan Boichutyannick ChevalierLuca Compagna et al.  The AVISPA Tool for the automated validation of internet security protocols and applications
17th International Conference on Computer Aided Verification - CAV 2005, Jul 2005, Edinburgh, Scotland/UK, France. pp.281-285
...
inria-00000409v1  Directions of work or proceedings
Laurent Vigneron. Proceedings of the 19th International Workshop on Unification
A05-R-022 (A05-R-022), LORIA, pp.143, 2005
inria-00000426v1  Journal articles
Abdessamad ImineMichaël RusinowitchGérald OsterPascal Molli. Formal Design and Verification of Operational Transformation Algorithms for Copies Convergence
Theoretical Computer Science, Elsevier, 2006, Algebraic Methodology and Software Technology, 351 (2), pp.167--183. ⟨10.1016/j.tcs.2005.09.066⟩
...
inria-00000427v1  Conference papers
Abdessamad IminePascal MolliGérald OsterMichaël Rusinowitch. Towards Synchronizing Linear Collaborative Objects with Operation Transformation
International Conference on Formal Techniques for Networked and Distributed Systems - FORTE 2005, Oct 2005, Taipei/Taiwan, pp.411-427
...
inria-00000428v1  Conference papers
Gérald OsterPascal UrsoPascal MolliAbdessamad Imine. Edition collaborative sur réseau pair-à-pair à large échelle
Journées Francophones sur la Cohérence des Données en Univers Réparti - CDUR 2005, Nov 2005, Paris/France, pp.42-47
...
inria-00000481v1  Conference papers
Pascal FontaineSilvio RaniseCalogero G. Zarba. Combining Lists with Non-Stably Infinite Theories
11th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'04), Mar 2005, Montevideo/Uruguay, pp.51--66, ⟨10.1007/b106931⟩
inria-00000553v1  Journal articles
Hubert Comon-LundhVéronique Cortier. Tree automata with one memory, set constraints and cryptographic protocols
Theoretical Computer Science, Elsevier, 2005, 331 (1), pp.143-214
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
inria-00000555v1  Conference papers
Mathieu BaudetVéronique CortierSteve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries
32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, pp.652-663, ⟨10.1007/11523468⟩
inria-00000556v1  Conference papers
Véronique CortierBogdan Warinschi. Computationally Sound, Automated Proofs for Security Protocols
14th European Symposium on Programming - ESOP 2005, Apr 2005, Edinburgh/United Kingdom, pp.157-171, ⟨10.1007/b107380⟩
inria-00000557v1  Conference papers
Véronique CortierMichaël RusinowitchEugen Zalinescu. A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures
7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming - PPDP'05, Jul 2005, Lisbonne/Portugal, pp.12-22
inria-00000570v1  Conference papers
Silvio RaniseChristophe RingeissenCalogero G. Zarba. Combining data structures with nonstably infinite theories using many-sorted logic
5th International Workshop on Frontiers of Combining Systems - FroCoS'05, Sep 2005, Vienna/Austria, pp.48--64, ⟨10.1007/11559306⟩
inria-00000586v1  Conference papers
Hélène KirchnerSilvio RaniseChristophe RingeissenDuc-Khanh Tran. On Superposition-Based Satisfiability Procedures and their Combination
2nd International Colloquium on Theoretical Aspects of Computing - ICTAC'05, Oct 2005, Hanoi/Vietnam, pp.594--608, ⟨10.1007/11560647⟩
...
inria-00000606v1  Conference papers
Najah ChridiLaurent Vigneron. Modélisation des propriétés de sécurité de protocoles de groupe
1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes, CRiSIS, Oct 2005, Bourges, France, pp.119-132
...
inria-00000607v1  Conference papers
Judson Santos SantiagoLaurent Vigneron. Study for Automatically Analysing Non-repudiation
1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes- CRiSIS 2005, Oct 2005, Bourges/France, pp.157--171
...
inria-00070512v1  Reports
yannick ChevalierMichaël Rusinowitch. Combining Intruder Theories
[Research Report] RR-5495, INRIA. 2005, pp.37
...
inria-00070767v1  Reports
Calogero G. Zarba. C-tableaux
[Research Report] RR-5229, INRIA. 2004, pp.31
...
inria-00080593v1  Conference papers
Anupam DattaAnte DerekJohn C. MitchellArnab RoyVitaly Shmatikov et al.  Computationally Sound Compositional Logic for Security Protocols
Workshop on Formal and Computational Cryptography - FCC 2006, Véronique Cortier et Steve Kremer, Jul 2006, Venice/Italy
...
inria-00080673v1  Conference papers
yassine LakhnechLaurent MazareBogdan Warinschi. Soundness of Symbolic Equivalence for Modular Exponentiation
Workshop on Formal and Computational Cryptography - FCC 2006, Véronique Cortier et Steve Kremer, Jul 2006, Venice/Italy
...
inria-00090165v1  Conference papers
Mohamed Salah BouassidaNajah ChridiIsabelle ChrismentOlivier FestorLaurent Vigneron. Automatic Verification of Key Management Architecture for Hierarchical Group Protocols
Sécurité et Architecture des Réseaux - SAR 2006, May 2006, Seignosse/France, pp.381-397
...
inria-00091656v1  Conference papers
Véronique Cortier. Verification of cryptographic protocols: techniques and link to cryptanalysis
Sixth International Workshop on Automatic Verification of Critical Systems - AVOCS'06, Sep 2006, Nancy/France
...
inria-00091660v1  Conference papers
Charu AroraMathieu Turuani. Adding Integrity to the Ephemerizer's Protocol
Sixth International Workshop on Automatic Verification of Critical Systems - AVOCS'06, Sep 2006, Nancy/France, pp.146-151
...
inria-00099496v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Filtrage Efficace Pour la Détection d'Intrusions
Conférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p
inria-00099514v1  Conference papers
yannick ChevalierRalf KüstersMichaël RusinowitchMathieu TuruaniLaurent Vigneron. Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions
Computer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, pp.128-141
inria-00099513v1  Directions of work or proceedings
Ingo DahnLaurent Vigneron. 4th International Workshop on First-Order Theorem Proving- FTP'2003
1 (1), Elsevier Science Publishers, 2003, Electronic Notes in Theoretical Computer Science
inria-00099700v1  Conference papers
Abdessamad IminePascal MolliGérald OsterPascal Urso. VOTE: Group Editors Analyzing Tool
Fourth International Workshop on First-Order Theorem Proving - FTP'03, 2003, Valencia, Spain, pp.153-161, ⟨10.1016/S1571-0661(04)80660-1⟩
inria-00099805v1  Book sections
Claire GardentKristina Striegnitz. Generating Bridging Definite Descriptions
Harry Bunt and Reinhard Muskens. Computing Meaning, 3, Kluwer Academic Publishers, pp.369--396, 2008, Studies in Linguistics and Philosophy - 83, 978-1-4020-5956-8
inria-00099815v1  Conference papers
Pascal MolliGérald OsterHala Skaf-MolliAbdessamad Imine. Using the Transformational Approach to Build a Safe and Generic Data Synchronizer
International Conference on Supporting Group Work - Group 2003, ACM SIGGROUP, Nov 2003, Sanibel Island, Florida, USA, pp.212-220, ⟨10.1145/958160.958194⟩
...
inria-00099882v1  Conference papers
yannick ChevalierLuca CompagnaJorge CuellarPaul Hankes DrielsmaJacopo Mantovani et al.  A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols
Workshop on Specification and Automated Processing of Security Requirements - SAPS'2004, 2004, Linz, Austria, 13 p
inria-00099888v1  Conference papers
yannick ChevalierLaurent Vigneron. Rule-based Programs describing Internet Security Protocols
5th International Workshop on Rule-Based Programming - RULE'2004, Jun 2004, Aachen, Germany, pp.83-97
...
inria-00099889v1  Conference papers
yannick Chevalier. A Simple Constraint-solving Decision Procedure for Protocols with Exclusive or
18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 15 p
inria-00099982v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under equational theories
ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
inria-00099981v1  Journal articles
Hubert Comon-LundhVéronique Cortier. Security properties: two agents are sufficient
Science of Computer Programming, Elsevier, 2004, 50 (1-3), pp.51-71
inria-00099986v1  Conference papers
Abdessamad IminePascal MolliGérald OsterMichaël Rusinowitch. Deductive Verification of Distributed Groupware Systems
Tenth International Conference on Algebraic Methodology and Software Technology - AMAST 2004, 2004, Stirling, Scotland, United Kingdom, pp.226-240
inria-00099985v1  Conference papers
Silvio RaniseChristophe RingeissenDuc-Khanh Tran. Nelson-Oppen, Shostak and the Extended Canonizer: A Family Picture with a Newborn
First International Colloquium on Theoretical Aspects of Computing - ICTAC 2004, Keijiro Araki, Zhiming Liu, 2004, Guiyang, Chine, 15 p
inria-00099991v1  Conference papers
David BasinMichaël Rusinowitch. Automated Reasoning
Second International Joint Conference on Automated Reasoning - IJCAR'2004, 2004, Cork, Irlande, France. XII-491 p
inria-00099993v1  Conference papers
Michaël Rusinowitch. A Decidable Analysis of Security Protocols
18th IFIP World Computer Congress on Theoretical Computer Science - TCS'2004, 2004, Toulouse, France, 1 p
inria-00100007v1  Conference papers
Tarek AbbesMichaël Rusinowitch. Fast Multipattern Matching for Intrusion Detection
13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p
inria-00100005v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort
Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967. ⟨10.1007/BF03179710⟩
inria-00100006v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Protocol Analysis in Intrusion Detection Using Decision Tree
International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408
inria-00100008v1  Conference papers
Tarek AbbesAlakesh HaloiMichaël Rusinowitch. High Performance Intrusion Detection using Traffic Classification
International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg
inria-00100013v1  Conference papers
yannick ChevalierRalf KüstersMichaël RusinowitchMathieu Turuani. Deciding the Security of Protocols with Commuting Public Key Encryption.
Workshop on Automated Reasoning for Security Protocol Analysis - ARSPA'2004, Jul 2004, Cork, Ireland. 11 p
inria-00100031v1  Directions of work or proceedings
Deepak KapurLaurent Vigneron. Special issue on First-Order Theorem Proving of the Journal of Automated Reasoning
Deepak Kapur and Laurent Vigneron. 33 / n°3-4, Kluwer, pp.219-383, 2004
inria-00100032v1  Conference papers
Laurent Vigneron. Automatic Verification of Security Protocols
18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 2 p
inria-00100915v1  Conference papers
Alessandro ArmandoDavid BasinMehdi Bouallaguiyannick ChevalierLuca Compagna et al.  The AVISS Security Protocol Analysis Tool
14th International Conference on Computer Aided Verification - CAV'2002, Jul 2002, Copenhaguen, Denmark, pp.349-353
inria-00100916v1  Conference papers
yannick ChevalierLaurent Vigneron. Automated Unbounded Verification of Security Protocols
14th International Conference on Computer Aided Verification - CAV'2002, 2002, Copenhaguen, Denmark, pp.324-337
...
inria-00103573v1  Conference papers
Mathieu Turuani. The CL-Atse Protocol Analyser
17th International Conference on Term Rewriting and Applications - RTA 2006, Aug 2006, Seattle, WA/USA, pp.277--286
...
inria-00103602v1  Conference papers
Max TuengerthalRalf KüstersMathieu Turuani. Implementing a Unification Algorithm for Protocol Analysis with XOR
20th International Workshop on Unification - UNIF'06, Aug 2006, Seattle, WA/USA, pp.1-5
inria-00103647v1  Conference papers
Michael BackesAnupam DattaAnte DerekJohn C. MitchellMathieu Turuani. Compositional Analysis of Contract Signing Protocols
18th IEEE Computer Security Foundations Workshop - CSFW 2005, Jun 2005, Aix-en-Provence/France, pp.94-110
inria-00103654v1  Conference papers
Anupam DattaAnte DerekJohn C. MitchellVitaly ShmatikovMathieu Turuani. Probabilistic Polynomial-time Semantics for a Protocol Security Logic
32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbon/Portugal, pp.16--29
inria-00103656v1  Conference papers
Mathieu TuruaniHoan Vu-Van. Validation of the ASW Contract Signing Protocol
3rd APPSEM II Workshop, Sep 2005, Frauenchiemsee, Germany
inria-00103935v1  Conference papers
yannick ChevalierRalf KüstersMichaël RusinowitchMathieu Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Dec 2003, Mumbai, India, pp.124-135
inria-00103954v1  Conference papers
yannick ChevalierRalf KüstersMichaël RusinowitchMathieu Turuani. An NP Decision Procedure for Protocol Insecurity with XOR
18th IEEE Symposium on Logic in Computer Science (LICS 2003), Jun 2003, Ottawa, Canada, pp.261-270
inria-00103879v1  Conference papers
Mehdi Bouallaguiyannick ChevalierMichaël RusinowitchMathieu TuruaniLaurent Vigneron. Analyse Automatique de Protocoles de Sécurité avec CASRUL
Sécurité et Architecture Réseaux - SAR'2002, Jul 2002, Marrackech, Maroc, Morocco
inria-00103985v1  Journal articles
Michaël RusinowitchMathieu Turuani. Protocol insecurity with a finite number of sessions, composed keys is NP-complete.
Theoretical Computer Science, Elsevier, 2003, Theoretical Computer Science, 1-3 (299), pp.451-475. ⟨10.1016/S0304-3975(02)00490-5⟩
inria-00104005v1  Journal articles
Michael BackesAnupam DattaAnte DerekJohn C. MitchellMathieu Turuani. Compositional Analysis of Contract Signing Protocols
Theoretical Computer Science, Elsevier, 2006, Theoretical Computer Science
inria-00103807v1  Journal articles
yannick ChevalierRalf KüstersMichaël RusinowitchMathieu Turuani. An NP Decision Procedure for Protocol Insecurity with XOR
Theoretical Computer Science, Elsevier, 2005, Theoretical Computer Science, 338 (1-3), pp.247-274
inria-00104132v1  Conference papers
Mathieu Turuani. Analysis of Contract Signing Protocols
CriSis, Oct 2005, LIFO, ENSI-Bourges, France
inria-00104145v1  Journal articles
François LaroussiniePhilippe SchnoebelenMathieu Turuani. On the expressivity and complexity of quantitative branching-time temporal logics.
Theoretical Computer Science, Elsevier, 2003, Theoretical Computer Science, 1-3 (297), pp.297-315. ⟨10.1016/S0304-3975(02)00644-8⟩
...
inria-00105519v1  Conference papers
Najah ChridiLaurent Vigneron. Strategy for Flaws Detection based on a Services-driven Model for Group Protocols
Workshop on Constraints in Software Testing, Verification and Analysis - CSTVA 06, Sep 2006, Nantes/France, pp.88-99
inria-00105523v1  Journal articles
Najah ChridiLaurent Vigneron. Sécurité des communications de groupe
La Revue de l'électricité et de l'électronique, Société de l'Électricité, de l'Électronique et des Technologies de l'Information et de la Communication, 2006, Risques et sécurité des réseaux et des systèmes à composante logicielle, pp.51-60
inria-00105533v1  Conference papers
yohan BoichutNikolai KosmatovLaurent Vigneron. Validation of Prouve Protocols using the Automatic Tool TA4SP
3rd Taiwanese-French Conference on Information Technology, Mar 2006, Nancy/France, pp.467-480