|
|
||
|---|---|---|
|
inria-00636794v1
Article dans une revue
Stefan Ciobaca, Stéphanie Delaune, Steve Kremer. Computing knowledge in security protocols under convergent equational theories Journal of Automated Reasoning, Springer Verlag, 2012, 48 (2), pp.219-262. <10.1007/s10817-010-9197-7> |
||
|
inria-00578855v1
Article dans une revue
Stéphanie Delaune, Florent Jacquemard. Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks Journal of Automated Reasoning, Springer Verlag, 2006, 36 (1-2), pp.85-124. <http://www.springerlink.com/content/g1504263136433v6/>. <10.1007/s10817-005-9017-7> |
||
|
hal-00729091v1
Communication dans un congrès
Stéphanie Delaune, Steve Kremer, Daniel Pasaila. Security protocols, constraint systems, and group theories 6th International Joint Conference on Automated Reasoning (IJCAR'12), Jun 2012, Manchester, United Kingdom. Springer, 7364, pp.164-178, 2012, Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12). <10.1007/978-3-642-31365-3_15> |
||
|
hal-00817230v1
Rapport
Rémy Chrétien, Véronique Cortier, Stéphanie Delaune. From security protocols to pushdown automata [Research Report] RR-8290, INRIA. 2013 |
||
|
hal-00732911v1
Communication dans un congrès
Véronique Cortier, Jan Degrieck, Stéphanie Delaune. Analysing routing protocols: four nodes topologies are sufficient Pierpaolo Degano and Joshua D. Guttman. 1st International Conference on Principles of Security and Trust (POST'12), Mar 2012, Tallinn, Estonia. Springer, 7215, pp.30--50, 2012, Lecture Notes in Computer Science; Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12). <10.1007/978-3-642-28641-4_3> |
||
|
hal-00881066v1
Communication dans un congrès
Rémy Chrétien, Véronique Cortier, Stéphanie Delaune. From security protocols to pushdown automata Fedor V. Fomin and Rūsiņš Freivalds and Marta Kwiatkowska and David Peleg. ICALP'2013 - 40th International Colloquium on Automata, Languages and Programming - 2013, Jul 2013, Riga, Lithuania. Springer, 7966, pp.137-149, 2013, Lecture Notes in Computer Science; Automata, Languages, and Programming. <10.1007/978-3-642-39212-2_15> |
||
|
inria-00636747v1
Communication dans un congrès
Stéphanie Delaune, Steve Kremer, Ryan Mark, Graham Steel. Formal analysis of protocols based on TPM state registers 24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. IEEE Computer Society, 2011, Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11). <10.1109/CSF.2011.12> |
||
|
hal-00881060v1
Article dans une revue
Vincent Cheval, Véronique Cortier, Stéphanie Delaune. Deciding equivalence-based properties using constraint solving Theoretical Computer Science, Elsevier, 2013, 492, pp.1-39. <10.1016/j.tcs.2013.04.016> |
||
|
inria-00579012v1
Communication dans un congrès
Stéphanie Delaune, Florent Jacquemard. A Decision Procedure for the Verification of Security Protocols with Explicit Destructors Atluri, Vijayalakshmi and Pfitzmann, Birgit and McDaniel, Patrick. 11th ACM Conference on Computer and Communications Security (CCS), Oct 2004, Washington D.C., United States. ACM Press, pp.278-287, 2004, Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS) |
||
|
inria-00579014v1
Communication dans un congrès
Stéphanie Delaune, Florent Jacquemard. A Theory of Dictionary Attacks and its Complexity 17th IEEE Computer Security Foundations Workshop (CSFW), Jun 2004, Asilomar, Pacific Grove, United States. IEEE Computer Society Press, pp.2-15, 2004, Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW) |
||
|
hal-00881009v1
Article dans une revue
Mathilde Arnaud, Véronique Cortier, Stéphanie Delaune. Modeling and Verifying Ad Hoc Routing Protocols Information and Computation, Elsevier, 2014, 238, pp.38 |
||
|
inria-00636753v1
Communication dans un congrès
Céline Chevalier, Stéphanie Delaune, Steve Kremer. Transforming Password Protocols to Compose 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), Dec 2011, Mumbai, India. 2011 |
||
|
hal-00732901v1
Article dans une revue
Mathieu Baudet, Véronique Cortier, Stéphanie Delaune. YAPA: A generic tool for computing intruder knowledge ACM Transactions on Computational Logic, Association for Computing Machinery, 2013, 14 (1), <10.1145/2422085.2422089> |
||
|
|
||