Fundamentals of Computer Security Technology, 1994. ,
A Calculus for Quality, 9th International Symposium on Formal Aspects of Component Software (FACS'12, pp.188-204, 2012. ,
DOI : 10.1007/978-3-642-35861-6_12
Secure Pseudonymous Channels, 14th European Symposium on Research in Computer Security (ESORICS'09, pp.337-354, 2009. ,
DOI : 10.1007/978-3-540-75227-1_6
The inductive approach to verifying cryptographic protocols, Journal of Computer Security, vol.6, issue.1-2, pp.85-128, 1998. ,
DOI : 10.3233/JCS-1998-61-205
Towards an Automatic Analysis of Security Protocols in First-Order Logic, 16th International Conference on Automated Deduction (CADE-16), pp.314-328, 1999. ,
DOI : 10.1007/3-540-48660-7_29
Flow Logic : A Multi-paradigmatic Approach In: The Essence of Computation, Complexity Analysis, Transformation. Essays Dedicated to Neil D. Jones. LNCS, vol.2566, pp.223-244, 2002. ,
Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009. ,
DOI : 10.3233/JCS-2009-0339
Satisfiability modulo theories, Communications of the ACM, vol.54, issue.9, pp.69-77, 2011. ,
DOI : 10.1145/1995376.1995394
URL : https://hal.archives-ouvertes.fr/hal-01095009
On SAT Modulo Theories and Optimization Problems, Theory and Applications of Satisfiability Testing (SAT'06, pp.156-169, 2006. ,
DOI : 10.1007/11814948_18
Satisfiability Modulo the Theory of Costs: Foundations and Applications, LNCS, vol.6015, pp.99-113, 2010. ,
DOI : 10.1007/978-3-642-12002-2_8
A cost-based framework for analysis of denial of service in networks, Journal of Computer Security, vol.9, issue.1-2, pp.143-164, 2001. ,
DOI : 10.3233/JCS-2001-91-206
Minimum Satisfying Assignments for SMT, Computer Aided Verification (CAV'12, pp.394-409, 2012. ,
DOI : 10.1007/978-3-642-31424-7_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.7373
Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
The Cyber-Physical Attacker, LNCS, vol.7613, pp.347-356, 2012. ,
DOI : 10.1007/978-3-642-33675-1_31
Messin??? with Texas Deriving Mother???s Maiden Names Using Public Records, Applied Cryptography and Network Security, pp.91-103, 2005. ,
DOI : 10.1007/11496137_7
Validating firewalls using flow logics, Theoretical Computer Science, vol.283, issue.2, pp.381-418, 2002. ,
DOI : 10.1016/S0304-3975(01)00140-2
URL : http://doi.org/10.1016/s0304-3975(01)00140-2