13 résultats  enregistrer la recherche


...
inria-00636794v1  Article dans une revue
Stefan CiobacaStéphanie DelauneSteve KremerComputing knowledge in security protocols under convergent equational theories
Journal of Automated Reasoning, Springer Verlag, 2012, 48 (2), pp.219-262. <10.1007/s10817-010-9197-7>
...
hal-00729091v1  Communication dans un congrès
Stéphanie DelauneSteve KremerDaniel PasailaSecurity protocols, constraint systems, and group theories
6th International Joint Conference on Automated Reasoning (IJCAR'12), Jun 2012, Manchester, United Kingdom. Springer, 7364, pp.164-178, 2012, Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12). <10.1007/978-3-642-31365-3_15>
hal-00732911v1  Communication dans un congrès
Véronique CortierJan DegrieckStéphanie DelauneAnalysing routing protocols: four nodes topologies are sufficient
Pierpaolo Degano and Joshua D. Guttman. 1st International Conference on Principles of Security and Trust (POST'12), Mar 2012, Tallinn, Estonia. Springer, 7215, pp.30--50, 2012, Lecture Notes in Computer Science; Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12). <10.1007/978-3-642-28641-4_3>
hal-00881066v1  Communication dans un congrès
Rémy ChrétienVéronique CortierStéphanie DelauneFrom security protocols to pushdown automata
Fedor V. Fomin and Rūsiņš Freivalds and Marta Kwiatkowska and David Peleg. ICALP'2013 - 40th International Colloquium on Automata, Languages and Programming - 2013, Jul 2013, Riga, Lithuania. Springer, 7966, pp.137-149, 2013, Lecture Notes in Computer Science; Automata, Languages, and Programming. <10.1007/978-3-642-39212-2_15>
...
inria-00636747v1  Communication dans un congrès
Stéphanie DelauneSteve KremerRyan MarkGraham SteelFormal analysis of protocols based on TPM state registers
24th IEEE Computer Security Foundations Symposium (CSF'11), Jun 2011, Cernay-la-Ville, France. IEEE Computer Society, 2011, Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11). <10.1109/CSF.2011.12>
...
inria-00579012v1  Communication dans un congrès
Stéphanie DelauneFlorent JacquemardA Decision Procedure for the Verification of Security Protocols with Explicit Destructors
Atluri, Vijayalakshmi and Pfitzmann, Birgit and McDaniel, Patrick. 11th ACM Conference on Computer and Communications Security (CCS), Oct 2004, Washington D.C., United States. ACM Press, pp.278-287, 2004, Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS)
...
inria-00579014v1  Communication dans un congrès
Stéphanie DelauneFlorent JacquemardA Theory of Dictionary Attacks and its Complexity
17th IEEE Computer Security Foundations Workshop (CSFW), Jun 2004, Asilomar, Pacific Grove, United States. IEEE Computer Society Press, pp.2-15, 2004, Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW)
hal-00881009v1  Article dans une revue
Mathilde ArnaudVéronique CortierStéphanie DelauneModeling and Verifying Ad Hoc Routing Protocols
Information and Computation, Elsevier, 2014, 238, pp.38
...
inria-00636753v1  Communication dans un congrès
Céline ChevalierStéphanie DelauneSteve KremerTransforming Password Protocols to Compose
31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11), Dec 2011, Mumbai, India. 2011
hal-00732901v1  Article dans une revue
Mathieu BaudetVéronique CortierStéphanie DelauneYAPA: A generic tool for computing intruder knowledge
ACM Transactions on Computational Logic, Association for Computing Machinery, 2013, 14 (1), <10.1145/2422085.2422089>