|
||
---|---|---|
inria-00000407v1
Other publications
Un outil d'aide à la conception de protocoles cryptographiques 2005 |
||
inria-00000408v1
Conference papers
The AVISPA Tool for the automated validation of internet security protocols and applications 17th International Conference on Computer Aided Verification - CAV 2005, Jul 2005, Edinburgh, Scotland/UK, France. pp.281-285 |
||
inria-00000409v1
Directions of work or proceedings
Proceedings of the 19th International Workshop on Unification A05-R-022 (A05-R-022), LORIA, pp.143, 2005 |
||
inria-00000426v1
Journal articles
Formal Design and Verification of Operational Transformation Algorithms for Copies Convergence Theoretical Computer Science, Elsevier, 2006, Algebraic Methodology and Software Technology, 351 (2), pp.167--183. ⟨10.1016/j.tcs.2005.09.066⟩ ![]() |
||
inria-00000427v1
Conference papers
Towards Synchronizing Linear Collaborative Objects with Operation Transformation International Conference on Formal Techniques for Networked and Distributed Systems - FORTE 2005, Oct 2005, Taipei/Taiwan, pp.411-427 |
||
inria-00000428v1
Conference papers
Edition collaborative sur réseau pair-à-pair à large échelle Journées Francophones sur la Cohérence des Données en Univers Réparti - CDUR 2005, Nov 2005, Paris/France, pp.42-47 |
||
inria-00000481v1
Conference papers
Combining Lists with Non-Stably Infinite Theories 11th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'04), Mar 2005, Montevideo/Uruguay, pp.51--66, ⟨10.1007/b106931⟩ |
||
inria-00000553v1
Journal articles
Tree automata with one memory, set constraints and cryptographic protocols Theoretical Computer Science, Elsevier, 2005, 331 (1), pp.143-214 |
||
inria-00000554v1
Conference papers
Deciding knowledge in security protocols under (many more) equational theories CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩ ![]() |
||
inria-00000555v1
Conference papers
Computationally Sound Implementations of Equational Theories against Passive Adversaries 32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, pp.652-663, ⟨10.1007/11523468⟩ |
||
inria-00000556v1
Conference papers
Computationally Sound, Automated Proofs for Security Protocols 14th European Symposium on Programming - ESOP 2005, Apr 2005, Edinburgh/United Kingdom, pp.157-171, ⟨10.1007/b107380⟩ ![]() |
||
inria-00000557v1
Conference papers
A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures 7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming - PPDP'05, Jul 2005, Lisbonne/Portugal, pp.12-22 |
||
inria-00000570v1
Conference papers
Combining data structures with nonstably infinite theories using many-sorted logic 5th International Workshop on Frontiers of Combining Systems - FroCoS'05, Sep 2005, Vienna/Austria, pp.48--64, ⟨10.1007/11559306⟩ |
||
inria-00000586v1
Conference papers
On Superposition-Based Satisfiability Procedures and their Combination 2nd International Colloquium on Theoretical Aspects of Computing - ICTAC'05, Oct 2005, Hanoi/Vietnam, pp.594--608, ⟨10.1007/11560647⟩ |
||
inria-00000606v1
Conference papers
Modélisation des propriétés de sécurité de protocoles de groupe 1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes, CRiSIS, Oct 2005, Bourges, France, pp.119-132 |
||
inria-00000607v1
Conference papers
Study for Automatically Analysing Non-repudiation 1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes- CRiSIS 2005, Oct 2005, Bourges/France, pp.157--171 |
||
inria-00070169v1
Reports
Handling Algebraic Properties in Automatic Analysis of Security Protocols [Research Report] RR-5857, INRIA. 2006, pp.18 |
||
inria-00070247v1
Reports
A note on maximally repeated sub-patterns of a point set [Research Report] RR-5773, INRIA. 2005, pp.5 |
||
inria-00070291v1
Reports
Automatic Verification of Security Protocols Using Approximations [Research Report] RR-5727, INRIA. 2005, pp.27 |
||
inria-00070335v1
Reports
Combining Data Structures with Nonstably Infinite Theories using Many-Sorted Logic [Research Report] RR-5678, INRIA. 2005, pp.39 |
||
|
||
inria-00070660v1
Reports
Computationally Sound, Automated Proofs for Security Protocols [Research Report] RR-5341, INRIA. 2004, pp.23 |
||
inria-00070731v1
Reports
A Decision Procedure for a Fragment of Set Theory Involving Monotone, Additive, and Multiplicative Functions [Research Report] RR-5267, INRIA. 2004, pp.22 |
||
inria-00070766v1
Reports
Network Traffic Classification for Intrusion Detection [Research Report] RR-5230, INRIA. 2004, pp.20 |
||
|
||
inria-00070771v1
Reports
A Simple Constraint-solving Decision Procedure for Protocols with Exclusive or [Research Report] RR-5224, INRIA. 2004, pp.35 |
||
inria-00071213v1
Reports
Proving correctness of transformation functions in collaborative editing systems [Research Report] RR-5795, INRIA. 2005, pp.45 |
||
inria-00071215v1
Reports
Tree Automata with Equality Constraints Modulo Equational Theories [Research Report] RR-5754, INRIA. 2005, pp.27 |
||
inria-00071218v1
Reports
Optimistic Replication for Massive Collaborative Editing [Research Report] RR-5719, INRIA. 2005, pp.18 |
||
inria-00071240v1
Reports
Real time group editors without Operational transformation [Research Report] RR-5580, INRIA. 2005, pp.24 |
||
|