|
|
|
|---|---|---|
|
inria-00101104v1
Communication dans un congrès
Yannick Chevalier, Laurent Vigneron. Towards Efficient Automated Verification of Security Protocols Verification Workshop - VERIFY'01 (in connection with IJCAR'01), Jun 2001, Siena, Italy, 15 p, 2001 |
||
|
hal-01224144v1
Communication dans un congrès
Tushant Jha, Walid Belkhir, Yannick Chevalier, Michael Rusinowitch. Expressive Equivalence and Succinctness of Parametrized Automata with respect to Finite Memory Automata FOR-MOVES 2015: FORmal MOdeling and VErification of Service-based systems, Nov 2015, Goa, India |
||
|
hal-00759725v1
Communication dans un congrès
Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi et al. The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures Cormac Flanagan and Barbara Konig. Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, TACAS 2012, Mar 2012, Tallinn, Estonia. Springer, 7214, pp.267-282, 2012, Lecture Notes in Computer Science. <10.1007/978-3-642-28756-5_19> |
||
|
hal-00914778v1
Communication dans un congrès
Walid Belkhir, Yannick Chevalier, Michael Rusinowitch. Fresh-Variable Automata for Service Composition SYNASC 2013 -15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Sep 2013, Timisoara, Romania. IEEE, 2013 |
||
|
hal-00914779v1
Pré-publication, Document de travail
Walid Belkhir, Yannick Chevalier, Michael Rusinowitch. Guarded Variable Automata over Infinite Alphabets 29 pages. arXiv admin note: text overlap with arXiv:1302.4205. 2013 |
||
|
hal-00719011v1
Rapport
Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani. Intruder deducibility constraints with negation. Decidability and application to secured service compositions. [Research Report] RR-8017, INRIA. 2012 |
||
|
hal-00675954v2
Rapport
Yannick Chevalier, Mounira Kourjieh. Automated Synthesis of a Finite Complexity Ordering for Saturation [Research Report] 2012 |
||
|
hal-00755947v1
Communication dans un congrès
Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani. Towards the Orchestration of Secured Services under Non-disclosure Policies. Igor V. Kotenko and Victor A. Skormin. 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, Oct 2012, St. Petersburg, Russia. Springer, 7531, pp.130-145, 2012, Lecture Notes in Computer Science. <10.1007/978-3-642-33704-8_12> |
||
|
inria-00455290v1
Article dans une revue
Yannick Chevalier, Michael Rusinowitch. Symbolic Protocol Analysis in the Union of Disjoint Intruder Theories: Combining Decision Procedures Theoretical Computer Science, Elsevier, 2010, 411 (10), pp.1261-1282. <10.1016/j.tcs.2009.10.022> |
||
|
inria-00103807v1
Article dans une revue
Yannick Chevalier, Ralf Küsters, Michael Rusinowitch, Mathieu Turuani. An NP Decision Procedure for Protocol Insecurity with XOR Theoretical Computer Science, Elsevier, 2005, Theoretical Computer Science, 338 (1-3), pp.247-274 |
||
|
inria-00072220v1
Rapport
Yannick Chevalier, Laurent Vigneron. Strategy for Verifying Security Protocols with Unbounded Message Size [Research Report] RR-4368, INRIA. 2002, pp.18 |
||
|
inria-00072219v1
Rapport
Yannick Chevalier, Laurent Vigneron. Automated Unbounded Verification of Security Protocols [Research Report] RR-4369, INRIA. 2002, pp.16 |
||
|
inria-00107545v1
Rapport
Yannick Chevalier, Laurent Vigneron. A Tool for Lazy Verification of Security Protocols [Intern report] A01-R-140 || chevalier01b, 2001, 10 p |
||
|
inria-00426669v1
Rapport
Yannick Chevalier, Michael Rusinowitch. Compiling and securing cryptographic protocols [Research Report] 2009, pp.12 |
||
|
inria-00071889v1
Rapport
Yannick Chevalier, Ralf Küsters, Michael Rusinowitch, Mathieu Turuani. An NP Decision Procedure for Protocol Insecurity with XOR [Research Report] RR-4697, INRIA. 2003, pp.22 |
||
|
inria-00071714v1
Rapport
Yannick Chevalier, Ralf Küsters, Michael Rusinowitch, Mathieu Turuani, Laurent Vigneron. Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions [Research Report] RR-4869, INRIA. 2003, pp.22 |
||
|
inria-00557707v1
Communication dans un congrès
Yannick Chevalier, Denis Lugiez, Michael Rusinowitch. Towards an Automatic Analysis of Web Service Security Konev, Boris and Wolter, Franck. 6th International Symposium on Frontiers of Combining Systems - FroCoS'07, Sep 2007, Liverpool, United Kingdom. Springer, 4720, pp.133-147, 2007, Lecture Notes in Artificial Intelligence; Frontiers of Combining Systems. <10.1007/978-3-540-74621-8_9> |
||
|
inria-00557710v1
Communication dans un congrès
Yannick Chevalier, Denis Lugiez, Michael Rusinowitch. Verifying Cryptographic Protocols with Subterms Constraints Dershowitz, Nachum and Voronkov, Andrei. 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning - LPAR 2007, Oct 2007, Yerevan, Armenia. Springer, 4790, pp.181-195, 2007, Lecture Notes in Artificial Intelligence; Logic for Programming, Artificial Intelligence, and Reasoning. <10.1007/978-3-540-75560-9_15> |
||
|
inria-00070512v1
Rapport
Yannick Chevalier, Michael Rusinowitch. Combining Intruder Theories [Research Report] RR-5495, INRIA. 2005, pp.37 |
||
|
inria-00480632v3
Rapport
Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani. Satisfiability of General Intruder Constraints with and without a Set Constructor [Research Report] RR-7276, INRIA. 2010, pp.50 |
||
|
inria-00392226v1
Pré-publication, Document de travail
Yannick Chevalier, Mounira Kourjieh. On the Decidability of (ground) Reachability Problems for Cryptographic Protocols (extended version) 2008 |
||
|
inria-00099889v1
Communication dans un congrès
Yannick Chevalier. A Simple Constraint-solving Decision Procedure for Protocols with Exclusive or Kohlhase, Michael. 18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 15 p, 2004 |
||
|
inria-00099945v1
Article dans une revue
Yannick Chevalier, Laurent Vigneron. Strategy for Verifying Security Protocols with Unbounded Message Size Journal of Automated Software Engineering, Springer, 2004, 11 (2), pp.141-166 |
||
|
inria-00099888v1
Communication dans un congrès
Yannick Chevalier, Laurent Vigneron. Rule-based Programs describing Internet Security Protocols Abdennadher, Slim and Ringeissen, Christophe. 5th International Workshop on Rule-Based Programming - RULE'2004, Jun 2004, Aachen, Germany, pp.83-97, 2004 |
||
|
inria-00099882v1
Communication dans un congrès
Yannick Chevalier, Luca Compagna, Jorge Cuellar, Paul Hankes Drielsma, Jacopo Mantovani et al. A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols Workshop on Specification and Automated Processing of Security Requirements - SAPS'2004, 2004, Linz, Austria, Austrian Computer Society, 13 p, 2004 |
||
|
inria-00099514v1
Communication dans un congrès
Yannick Chevalier, Ralf Küsters, Michael Rusinowitch, Mathieu Turuani, Laurent Vigneron. Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions M. Baaz and J. A. Makowsky. Computer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, Springer, 2803, pp.128-141, 2003, Lecture Notes in Computer Science |
||
|
inria-00070771v1
Rapport
Yannick Chevalier. A Simple Constraint-solving Decision Procedure for Protocols with Exclusive or [Research Report] RR-5224, INRIA. 2004, pp.35 |
||
|
hal-00642855v1
Communication dans un congrès
Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch. Orchestration under Security Constraints Bernhard K Aichernig and Frank S. de Boer and Marcello M. Bonsangue. Formal Methods for Components and Objects (FMCO 2010), Nov 2010, Graz, Austria. Springer, 6957, 2011, Lecture Notes in Computer Science; Formal Methods for Components and Objects |
||
|
inria-00432528v1
Communication dans un congrès
Philippe Balbiani, Yannick Chevalier, Marwa El-Houri. A Logical Framework for Reasoning about Policies with Trust Negotiations and Workflows in a Distributed Environment 4th International Conference on Risks and Security of Internet and Systems - CRiSIS 2009, Oct 2009, Toulouse, France. IEEE, pp.3-11, 2009, Proceedings of the fourth international conference on Risks and Security of Internet and Systems - CRiSIS 2009. <10.1109/CRISIS.2009.5411983> |
||
|
hal-00641326v1
Communication dans un congrès
Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch. Web Services Verification and Prudent Implementation 4th SETOP International Workshop on Autonomous and Spontaneous Security, Sep 2011, Leuven, Belgium. Springer, 2012, Lecture Notes in Computer Science; Post-Proceedings of the 4th SETOP International Workshop on Autonomous and Spontaneous Security |
||
|
|
|