|
||
---|---|---|
inria-00379423v1
Conference papers
CONNECT: Emergent Connectors for Eternal Software Intensive Networked Systems FET'09 - The European Future Technologies Conference and Exhibition, European Commission, Apr 2009, Prague, Czech Republic |
||
hal-01125667v2
Conference papers
Trusted Software within Focal C&ESAR 2008 - Computer & Electronics Security Applications Rendez-vous, Dec 2008, Rennes, France. pp.162-179 |
||
|
||
inria-00525778v1
Journal articles
Decidability and combination results for two notions of knowledge in security protocols. Journal of Automated Reasoning, Springer Verlag, 2012, 48 (October), pp.441-487. ⟨10.1007/s10817-010-9208-8⟩ ![]() |
||
tel-00636769v1
Habilitation à diriger des recherches
Modelling and analyzing security protocols in cryptographic process calculi Computer Science [cs]. École normale supérieure de Cachan - ENS Cachan, 2011 |
||
inria-00379776v1
Reports
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems [Research Report] RR-6912, INRIA. 2009, pp.42 |
||
hal-01671356v1
Preprints, Working Papers, ...
Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures 2017 |
||
tel-00010545v1
Theses
Information Flow Security for Asynchronous, Distributed, and Mobile Applications Modeling and Simulation. Université Nice Sophia Antipolis, 2005. English |
||
hal-01238094v1
Conference papers
Secure refinements of communication channels FSTTCS 2015, Dec 2015, Bangalore, India |
||
hal-01215265v2
Reports
Secure refinements of communication channels [Research Report] RR-8790, LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy. 2015, pp.50 |
||
hal-01140824v1
Conference papers
Observation-Level-Driven Formal Modeling 16th IEEE International Symposium on High Assurance Systems Engineering. HASE 2015, Jan 2015, Daytona Beach (FL), United States. pp.158--165, ⟨10.1109/HASE.2015.32⟩ |
||
hal-01257171v1
Directions of work or proceedings
Theoretical Aspects of Computing - ICTAC 2015 France. 9399, Springer, 2015, Lecture Notes in Computer Science, 978-3-319-25149-3. ⟨10.1007/978-3-319-25150-9⟩ ![]() |
||
hal-00747305v1
Conference papers
Critical systems development methodology using formal techniques 3rd International Symposium on Information and Communication Technology - SoICT 2012, Aug 2012, Ha Long, Vietnam. pp.3-12, ⟨10.1145/2350716.2350720⟩ |
||
hal-00743808v1
Books
FM 2012: Formal Methods - 18th International Symposium, Paris, France, August 27-31, 2012. Proceedings Dimitra Giannakopoulou and Dominique Méry. Springer, 7436, pp.488, 2012, LNCS - Lecture Notes in Computer Science, 978-3-642-32758-2. ⟨10.1007/978-3-642-32759-9⟩ |
||
hal-01087659v1
Conference papers
Simulation-Based Abstractions for Software Product-Line Model Checking ICSE 2012 : 34th International Conference on Software Engineering, Jun 2012, Zürich, Switzerland. pp.672 - 682, ⟨10.1109/ICSE.2012.6227150⟩ |
||
hal-01823749v1
Journal articles
TT-BIP: using correct-by-design BIP approach for modelling real-time system with time-triggered paradigm Innovations in Systems and Software Engineering, Springer Verlag, 2018, 14 (2), pp.117 - 142. ⟨10.1007/s11334-018-0312-y⟩ |
||
hal-02598330v1
Reports
Recursive Operator Definitions [Research Report] RR-9341, Inria Saclay Ile de France. 2020, pp.17 |
||
tel-01750224v2
Theses
A Simulation Framework for the Validation of Event-B Specifications Formal Languages and Automata Theory [cs.FL]. Université de Lorraine, 2013. English. ⟨NNT : 2013LORR0158⟩ |
||
hal-00719011v1
Reports
Intruder deducibility constraints with negation. Decidability and application to secured service compositions. [Research Report] RR-8017, INRIA. 2012 |
||
hal-01405851v1
Journal articles
Intruder deducibility constraints with negation. Decidability and application to secured service compositions Journal of Symbolic Computation, Elsevier, 2017, 80, pp.4 - 26. ⟨10.1016/j.jsc.2016.07.008⟩ |
||
hal-01798224v1
Conference papers
Explicit modelling of physical measures: from Event-B to Java IMPEX 2017: 1st International Workshop on Handling IMPlicit and EXplicit knowledge in formal system development, Nov 2017, Xi’An, China. pp.64 - 79, ⟨10.4204/EPTCS.271.5⟩ |
||
hal-01658423v1
Conference papers
Applying a Dependency Mechanism for Voting Protocol Models Using Event-B 37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE 2017), Jun 2017, Neuchâtel, Switzerland. pp.124-138, ⟨10.1007/978-3-319-60225-7_9⟩ |
||
tel-01235044v2
Theses
Méthodes formelles pour le respect de la vie privée par construction Génie logiciel [cs.SE]. INSA de Lyon, 2015. Français. ⟨NNT : 2015ISAL0016⟩ |
||
tel-01981380v2
Theses
Secure, fast and verified cryptographic applications : a scalable approach Cryptography and Security [cs.CR]. PSL Research University, 2018. English. ⟨NNT : 2018PSLEE052⟩ |
||
inria-00528582v1
Journal articles
Why does Astrée scale up? Formal Methods in System Design, Springer Verlag, 2009, Special issue on Numerical Software Verification, 35 (3), pp.229-264. ⟨10.1007/s10703-009-0089-6⟩ ![]() |
||
tel-02411487v1
Theses
Abstractions of Biochemical Reaction Networks Quantitative Methods [q-bio.QM]. PSL University, 2019. English |
||
hal-02737859v1
Preprints, Working Papers, ...
Enhancing Separation of Concerns, Parallelism, and Formalism in Distributed Software Deployment with Madeus 2020 |
||
hal-01246846v1
Preprints, Working Papers, ...
Model-based Investigation of the Coupling between the Cell Cycle and the Circadian Clock in Mouse Embryonic Fibroblasts 2015 |
||
hal-01361422v1
Conference papers
SpecCert: Specifying and Verifying Hardware-based Software Enforcement 21st International Symposium on Formal Methods (FM 2016), Nov 2016, Limassol, Cyprus. ⟨10.1007/978-3-319-48989-6_30⟩ |
||
tel-01483676v1
Theses
Formally verified compilation of low-level C code Programming Languages [cs.PL]. Université Rennes 1, 2016. English. ⟨NNT : 2016REN1S088⟩ |
||
|