Skip to Main content Skip to Navigation


...
hal-01242268v1  Journal articles
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado Cortez. De-anonymization attack on geolocated data
Journal of Computer and System Sciences, Elsevier, 2014, 80 (8), pp.1597-1614. ⟨10.1016/j.jcss.2014.04.024⟩
inria-00543100v1  Journal articles
Yehuda AfekEli GafniSergio RajsbaumMichel RaynalCorentin Travers. The k-simultaneous consensus problem
Distributed Computing, Springer Verlag, 2010, 22 (3), pp.185-196. ⟨10.1007/s00446-009-0090-8⟩
hal-00764124v1  Journal articles
Guang TanAnne-Marie Kermarrec. Greedy Geographic Routing in Large-Scale Sensor Networks: A Minimum Network Decomposition Approach.
IEEE/ACM Transactions on Networking, IEEE/ACM, 2012, 20 (3), pp.864-877
inria-00338084v1  Journal articles
Roy FriedmanAchour MostefaouiMichel Raynal. On the Respective Power of *P and *S to Solve One-Shot Agreement Problems
IEEE Transactions on Parallel and Distributed Systems, Institute of Electrical and Electronics Engineers, 2007, 18 (5), pp.589-597
inria-00436485v1  Journal articles
Jiannong CaoMichel RaynalWeigang Wu. Eventual Clusterer: a Modular Approach to Designing Hierarchical Consensus Protocols in MANETs
IEEE Transactions on Parallel and Distributed Systems, Institute of Electrical and Electronics Engineers, 2009, ⟨10.1109/TPDS.2008.266⟩
hal-02470995v1  Journal articles
Brice MinaudPatrick DerbezPierre-Alain FouquePierre Karpman. Key-Recovery Attacks on ASASA.
Journal of Cryptology, Springer Verlag, 2018, 31 (3), pp.845-884
hal-00566602v1  Journal articles
Caroline de DieuleveultJocelyne ErhelMichel Kern. A global strategy for solving reactive transport equations
Journal of Computational Physics, Elsevier, 2009, 228 (17), pp.6395-6410. ⟨10.1016/j.jcp.2009.05.044⟩
...
hal-01097141v1  Journal articles
Pierre FraigniaudGeorge Giakkoupis. Greedy routing in small-world networks with power-law degrees
Distributed Computing, Springer Verlag, 2014, 27 (4), pp.231 - 253. ⟨10.1007/s00446-014-0210-y⟩
hal-00839625v1  Journal articles
Carole Delporte-GalletHugues FauconnierRachid GuerraouiAnne-Marie KermarrecEric Ruppert et al.  Byzantine agreement with homonyms
Distributed Computing, Springer Verlag, 2013, 26 (5-6), pp.321-340. ⟨10.1007/s00446-013-0190-3⟩
inria-00440386v1  Conference papers
Raimundo MacêdoMichel Raynal. Adding Dynamicity to the Uncertainty that Characterizes Distributed Systems: Challenges Ahead
Franco-Brazilian Colloquium on Advances and Challenges in Computer Science (COLIBRI'09), Jul 2009, Bento Goncalves, Brazil
hal-00761351v1  Journal articles
Mathieu JaumeValérie Viet Triem TongGuillaume Hiet. Spécification et mécanisme de détection de flots d'information illégaux
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2012, 31 (6), pp.713-742. ⟨10.3166/tsi.31.713-742⟩
hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
...
hal-01624274v1  Conference papers
Véronique CortierAntoine DallonStéphanie Delaune. SAT-Equiv: An Efficient Tool for Equivalence Properties
30th IEEE Computer Security Foundations Symposium (CSF'17), Jul 2017, Santa Barbara, United States. pp.481 - 494, ⟨10.1109/CSF.2017.15⟩
...
hal-01529966v1  Reports
Véronique CortierAntoine DallonStéphanie Delaune. SAT-Equiv: an efficient tool for equivalence properties
[Research Report] LSV, ENS Cachan, CNRS, INRIA, Université Paris-Saclay, Cachan (France); IRISA, Inria Rennes; LORIA - Université de Lorraine; CNRS. 2017
...
hal-01900083v1  Conference papers
Véronique CortierAntoine DallonStéphanie Delaune. Efficiently deciding equivalence for standard primitives and phases
ESORICS 2018 - 23rd European Symposium on Research in Computer Security, Sep 2018, Barcelona, Spain
...
hal-01741172v1  Reports
Rémy ChrétienVéronique CortierAntoine DallonStéphanie Delaune. Typing messages for free in security protocols
[Research Report] LSV, ENS Cachan, CNRS, INRIA, Université Paris-Saclay, Cachan (France). 2018, pp.1-49
hal-01906639v1  Journal articles
Stéphanie DelauneDavid BaeldeLucca Hirschi. A Reduced Semantics for Deciding Trace Equivalence
Logical Methods in Computer Science, Logical Methods in Computer Science Association, 2017, 13 (2), pp.1-48. ⟨10.23638/LMCS-13(2:8)2017⟩
...
hal-01410216v1  Conference papers
Gilles BartheSonia BelaïdFrançois DupressoirPierre-Alain FouqueBenjamin Grégoire et al.  Strong Non-Interference and Type-Directed Higher-Order Masking
CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Oct 2016, Vienne, Austria. pp.116 - 129, ⟨10.1145/2976749.2978427⟩
hal-01906651v1  Conference papers
Stéphanie DelauneDavid BaeldeLucca Hirschi. POR for Security Protocol Equivalences - Beyond Action-Determinism
Computer Security - 23rd European Symposium on Research in Computer Security, 2018, Barcelone, Spain
...
inria-00135239v1  Conference papers
Yann BusnelMarin BertierEric FleuryAnne-Marie Kermarrec. GCP: Gossip-based Code Propagation for Large-scale Mobile Wireless Sensor Network
EuroSys 2007, Second conference of the European Chapter of ACM SIGOPS, European Chapter of ACM SIGOPS, Mar 2007, Lisboa/Portugal
...
hal-00916091v1  Conference papers
Matthieu DorierGabriel AntoniuRobert RossDries KimpeShadi Ibrahim. CALCioM: Mitigating I/O Interference in HPC Systems through Cross-Application Coordination
IPDPS - International Parallel and Distributed Processing Symposium, May 2014, Phoenix, United States