|
|
||
|---|---|---|
|
hal-01323885v1
Rapport
Sorina Ionica, Malika Izabachène. Weak instances on composite order protocols [Research Report] INRIA. 2014, pp.1--13 |
||
|
lirmm-00395080v1
Communication dans un congrès
Serge Burckel, Emeric Gioan, Emmanuel Thomé. Mapping Computation with No Memory UC'2009: 8th International Conference on Unconventional Computation, Sep 2009, Ponta Delgada, Portugal. Springer, 5715 (5715), pp.85-97, 2009, LNCS. <10.1007/978-3-642-03745-0_15> |
||
|
lirmm-00287659v1
Communication dans un congrès
Emeric Gioan, Serge Burckel. In Situ Design of Register Operations ISVLSI'08: IEEE Computer Society Annual Symposium on Very-Large-Scale Integration, Apr 2008, Montpellier, France, IEEE Computer Society, Trends in VLSI Technology and Design, pp.4, 2008, <http://www.lirmm.fr/isvlsi2008/> |
||
|
hal-01475884v2
Rapport
Loris Marchal, Louis-Claude Canon, Frédéric Vivien. Low-Cost Approximation Algorithms for Scheduling Independent Tasks on Hybrid Platforms [Research Report] RR-9029, Inria - Research Centre Grenoble – Rhône-Alpes. 2017 |
||
|
hal-00842857v1
Article dans une revue
Marie Lefevre, Valentin Butoianu, Philippe Daubias, Lucie Daubigney, Françoise Greffier et al. Personnalisation de l'apprentissage : confrontation entre besoins et approches. Sciences et Technologies de l'Information et de la Communication pour l'Éducation et la Formation (STICEF), ATIEF, 2012, 19, pp.1-23 |
||
|
hal-00874808v1
Direction d'ouvrage, Proceedings
Bruno Zanuttini, Guillaume J. Laurent, Olivier Buffet. Apprentissage par renforcement et planification adaptative - Revue d'Intelligence Artificielle Lavoisier, pp.153-263, 2013, 978-2-7426-4573-0 |
||
|
hal-01206297v1
Article dans une revue
Véronique Cortier. Formal verification of e-voting: solutions and challenges SigLog Newsletter, ACM Special Interest Group on Logic and Computation, 2015, 2, pp.25-34. <10.1145/2728816.2728823> |
||
|
hal-01338054v1
Communication dans un congrès
Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini et al. Formal Analysis of Electronic Exams First Symposium on Digital Trust in Auvergne (SDTA'14), Dec 2014, Clermont-Ferrand, France |
||
|
hal-01155626v1
Direction d'ouvrage, Proceedings
Frédéric Dadeau, Pascale Le Gall. Actes des 14e journées sur les Approches Formelles dans l'Assistance au Développement de Logiciels Dadeau, Frédéric; Le Gall, Pascale. Approches Formelles dans l'Assistance au Développement de Logiciels, Jun 2015, Bordeaux, France. pp.88, 2015, <http://events.femto-st.fr/afadl-2015> |
||
|
hal-01090874v1
Article dans une revue
Véronique Cortier, Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols: A Tutorial Foundations and Trends in Programming Languages, Now Publishers, 2014, 1 (3), pp.117. <10.1561/2500000001> |
||
|
hal-01338064v1
Communication dans un congrès
Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. A Formal Taxonomy of Privacy in Voting Protocols First IEEE International Workshop on Security and Forensics in Communication Systems (ICC'12 WS - SFCS), Jun 2012, Ottawa, Canada. <10.1109/ICC.2012.6364938> |
||
|
hal-01206276v1
Communication dans un congrès
Rémy Chrétien, Véronique Cortier, Stéphanie Delaune. Decidability of trace equivalence for protocols with nonces 28th IEEE Computer Security Foundations Symposium (CSF'15), Jul 2015, Verona, Italy. Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF'15), <10.1109/CSF.2015.19> |
||
|
hal-01338067v1
Rapport
Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. A formal taxonomy of privacy in voting protocols [Technical Report] VERIMAG UMR 5104, Université Grenoble Alpes, France. 2011 |
||
|
hal-01206289v1
Communication dans un congrès
David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi. A comprehensive analysis of game-based ballot privacy definitions 36th IEEE Symposium on Security and Privacy (S&P'15), May 2015, San Jose, United States. <10.1109/SP.2015.37> |
||
|
hal-01338070v1
Communication dans un congrès
Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. Vote-Independence: A Powerful Privacy Notion for Voting Protocols 4th Canada-France MITACS Workshop on Foundations & Practice of Security (FPS'11), May 2011, Paris, France. 2012, <10.1007/978-3-642-27901-0_13> |
||
|
hal-01206669v1
Communication dans un congrès
Serdar Erbatur, Deepak Kapur, Andrew Marshall, Paliath Narendran, Christophe Ringeissen. Unification and Matching in Hierarchical Combinations of Syntactic Theories Carsten Lutz and Silvio Ranise. Frontiers of Combining Systems - 10th International Symposium, FroCoS 2015, Sep 2015, Wroclaw, Poland. Springer, 9322, pp.291--306, Lecture Notes in Computer Science. <10.1007/978-3-319-24246-0_18> |
||
|
tel-01248018v1
Thèse
Jean-Marie Gauthier. Combining Discrete and Continuous Domains for SysML-Based Simulation and Test Generation Software Engineering [cs.SE]. Université de Franche-Comté, 2015. English |
||
|
hal-01347699v1
Pré-publication, Document de travail
Béatrice Bérard, Olga Kouchnarenko, John Mullins, Mathieu Sassolas. Probabilistic Opacity in Refinement-Based Modeling 2015 |
||
|
hal-00878632v1
Communication dans un congrès
Steve Kremer, Robert Künnemann, Graham Steel. Universally Composable Key-Management Crampton, Jason and Jajodia, Sushil. 18th European Symposium on Research in Computer Security (ESORICS'13), 2013, Egham, United Kingdom. Springer, 8134, 2013, Lecture Notes in Computer Science. <10.1007/978-3-642-40203-6_19> |
||
|
hal-01347712v1
Communication dans un congrès
Béatrice Bérard, Olga Kouchnarenko, John Mullins, Mathieu Sassolas. Preserving opacity on Interval Markov Chains under simulation WODES 2016 - 13th International Workshop on Discrete Event Systems , May 2016, Xi'an, China. Proceedings of 13th International Workshop on Discrete Event Systems (WODES) 2016, IEEE, pp.319-324, 2016, <Christos G. Cassandras and Alessandro Giua and Zhiwu Li>. <10.1109/WODES.2016.7497866> |
||
|
hal-01384153v1
Rapport
Béatrice Bérard, Olga Kouchnarenko, John Mullins, Mathieu Sassolas. Opacity for Linear Constraint Markov Chains [Research Report] LIP6 UMR 7606 UPMC Sorbonne Universités, France; Univ. de Franche-Comté; Ecole Polytechnique de Montréal; LACL, Université Paris-Est. 2016 |
||
|
hal-01246025v1
Communication dans un congrès
Jean-Marie Gauthier, Fabrice Bouquet, Ahmed Hammad, Fabien Peureux. Tooled Process for Early Validation of SysML Models using Modelica Simulation Mehdi Dastani; Marjan Sirjani. 6th Fundamentals of Software Engineering (FSEN), 2015, Tehran, Iran. Springer, Lecture Notes in Computer Science, LNCS-9392, pp.230-237, 2015, Fundamentals of Software Engineering. <10.1007/978-3-319-24644-4_16> |
||
|
hal-00729091v1
Communication dans un congrès
Stéphanie Delaune, Steve Kremer, Daniel Pasaila. Security protocols, constraint systems, and group theories 6th International Joint Conference on Automated Reasoning (IJCAR'12), Jun 2012, Manchester, United Kingdom. Springer, 7364, pp.164-178, 2012, Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12). <10.1007/978-3-642-31365-3_15> |
||
|
hal-01496470v1
Rapport
Jacques Julliand, Olga Kouchnarenko, Pierre-Alain Masson, Guillaume Voiron. Approximating Event System Abstractions by Covering their States and Transitions [Research Report] RR–FEMTO-ST–2496, FEMTO-ST. 2017 |
||
|
hal-01091241v1
Communication dans un congrès
Steve Kremer, Robert Künnemann. Automated Analysis of Security Protocols with Global State IEEE Computer Society. 35th IEEE Symposium on Security and Privacy (S&P'14), May 2014, San Jose, United States. pp.163-178, Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P'14). <10.1109/SP.2014.18> |
||
|
hal-00732905v1
Communication dans un congrès
Rohit Chadha, Stefan Ciobaca, Steve Kremer. Automated verification of equivalence properties of cryptographic protocols Helmut Seidl. 21th European Symposium on Programming (ESOP'12), Mar 2012, Talinn, Estonia. Springer, 7211, pp.108-127, 2012, Proceedings of the 21th European Symposium on Programming (ESOP'12). <10.1007/978-3-642-28869-2_6> |
||
|
hal-01103545v1
Communication dans un congrès
Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling. Type-Based Verification of Electronic Voting Protocols 4th Conference on Principles of Security and Trust (POST), Apr 2015, London, United Kingdom. Springer, Proceedings of the 4th Conference on Principles of Security and Trust (POST) |
||
|
hal-01224144v1
Communication dans un congrès
Tushant Jha, Walid Belkhir, Yannick Chevalier, Michael Rusinowitch. Expressive Equivalence and Succinctness of Parametrized Automata with respect to Finite Memory Automata FOR-MOVES 2015: FORmal MOdeling and VErification of Service-based systems, Nov 2015, Goa, India |
||
|
hal-01228995v1
Communication dans un congrès
Richard Genestier, Alain Giorgetti, Guillaume Petiot. Sequential generation of structured arrays and its deductive verification TAP 2015, 9th Int. Conf. of Tests and Proofs, 2015, L'Aquila, Italy. Springer, 9154, pp.109--128, 2015, LNCS |
||
|
hal-01233555v1
Article dans une revue
Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade. Brandt's fully private auction protocol revisited Journal of Computer Security, IOS Press, 2015, Special issue on security and high performance computing systems, 23 (5), pp.587-610. <10.3233/JCS-150535> |
||
|
|
||