Skip to Main content Skip to Navigation

inria-00000408v1  Conference papers
Alessandro ArmandoDavid Basinyohan Boichutyannick ChevalierLuca Compagna et al.  The AVISPA Tool for the automated validation of internet security protocols and applications
17th International Conference on Computer Aided Verification - CAV 2005, Jul 2005, Edinburgh, Scotland/UK, France. pp.281-285
inria-00000409v1  Directions of work or proceedings
Laurent Vigneron. Proceedings of the 19th International Workshop on Unification
A05-R-022 (A05-R-022), LORIA, pp.143, 2005
inria-00000426v1  Journal articles
Abdessamad ImineMichaël RusinowitchGérald OsterPascal Molli. Formal Design and Verification of Operational Transformation Algorithms for Copies Convergence
Theoretical Computer Science, Elsevier, 2006, Algebraic Methodology and Software Technology, 351 (2), pp.167--183. ⟨10.1016/j.tcs.2005.09.066⟩
inria-00000427v1  Conference papers
Abdessamad IminePascal MolliGérald OsterMichaël Rusinowitch. Towards Synchronizing Linear Collaborative Objects with Operation Transformation
International Conference on Formal Techniques for Networked and Distributed Systems - FORTE 2005, Oct 2005, Taipei/Taiwan, pp.411-427
inria-00000428v1  Conference papers
Gérald OsterPascal UrsoPascal MolliAbdessamad Imine. Edition collaborative sur réseau pair-à-pair à large échelle
Journées Francophones sur la Cohérence des Données en Univers Réparti - CDUR 2005, Nov 2005, Paris/France, pp.42-47
inria-00000481v1  Conference papers
Pascal FontaineSilvio RaniseCalogero G. Zarba. Combining Lists with Non-Stably Infinite Theories
11th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'04), Mar 2005, Montevideo/Uruguay, pp.51--66, ⟨10.1007/b106931⟩
inria-00000553v1  Journal articles
Hubert Comon-LundhVéronique Cortier. Tree automata with one memory, set constraints and cryptographic protocols
Theoretical Computer Science, Elsevier, 2005, 331 (1), pp.143-214
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
inria-00000555v1  Conference papers
Mathieu BaudetVéronique CortierSteve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries
32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, pp.652-663, ⟨10.1007/11523468⟩
inria-00000556v1  Conference papers
Véronique CortierBogdan Warinschi. Computationally Sound, Automated Proofs for Security Protocols
14th European Symposium on Programming - ESOP 2005, Apr 2005, Edinburgh/United Kingdom, pp.157-171, ⟨10.1007/b107380⟩
inria-00000557v1  Conference papers
Véronique CortierMichaël RusinowitchEugen Zalinescu. A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures
7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming - PPDP'05, Jul 2005, Lisbonne/Portugal, pp.12-22
inria-00000570v1  Conference papers
Silvio RaniseChristophe RingeissenCalogero G. Zarba. Combining data structures with nonstably infinite theories using many-sorted logic
5th International Workshop on Frontiers of Combining Systems - FroCoS'05, Sep 2005, Vienna/Austria, pp.48--64, ⟨10.1007/11559306⟩
inria-00000586v1  Conference papers
Hélène KirchnerSilvio RaniseChristophe RingeissenDuc-Khanh Tran. On Superposition-Based Satisfiability Procedures and their Combination
2nd International Colloquium on Theoretical Aspects of Computing - ICTAC'05, Oct 2005, Hanoi/Vietnam, pp.594--608, ⟨10.1007/11560647⟩
inria-00000606v1  Conference papers
Najah ChridiLaurent Vigneron. Modélisation des propriétés de sécurité de protocoles de groupe
1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes, CRiSIS, Oct 2005, Bourges, France, pp.119-132
inria-00000607v1  Conference papers
Judson Santos SantiagoLaurent Vigneron. Study for Automatically Analysing Non-repudiation
1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes- CRiSIS 2005, Oct 2005, Bourges/France, pp.157--171
inria-00070512v1  Reports
yannick ChevalierMichaël Rusinowitch. Combining Intruder Theories
[Research Report] RR-5495, INRIA. 2005, pp.37
inria-00070767v1  Reports
Calogero G. Zarba. C-tableaux
[Research Report] RR-5229, INRIA. 2004, pp.31
inria-00080593v1  Conference papers
Anupam DattaAnte DerekJohn C. MitchellArnab RoyVitaly Shmatikov et al.  Computationally Sound Compositional Logic for Security Protocols
Workshop on Formal and Computational Cryptography - FCC 2006, Véronique Cortier et Steve Kremer, Jul 2006, Venice/Italy
inria-00080673v1  Conference papers
yassine LakhnechLaurent MazareBogdan Warinschi. Soundness of Symbolic Equivalence for Modular Exponentiation
Workshop on Formal and Computational Cryptography - FCC 2006, Véronique Cortier et Steve Kremer, Jul 2006, Venice/Italy
inria-00090165v1  Conference papers
Mohamed Salah BouassidaNajah ChridiIsabelle ChrismentOlivier FestorLaurent Vigneron. Automatic Verification of Key Management Architecture for Hierarchical Group Protocols
Sécurité et Architecture des Réseaux - SAR 2006, May 2006, Seignosse/France, pp.381-397