Véronique Cortier

From MaRDI portal
Person:391119

Available identifiers

zbMath Open cortier.veroniqueDBLP65/550WikidataQ21264854 ScholiaQ21264854MaRDI QIDQ391119

List of research outcomes





PublicationDate of PublicationType
https://portal.mardi4nfdi.de/entity/Q58741862023-02-07Paper
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols2022-12-22Paper
Efficiently deciding equivalence for standard primitives and phases2022-08-25Paper
Checking trace equivalence: how to get rid of nonces?2022-08-19Paper
When are three voters enough for privacy properties?2022-08-19Paper
A decidable class of security protocols for both reachability and equivalence properties2021-06-09Paper
Belenios: a simple private and verifiable electronic voting system2020-03-03Paper
Typing messages for free in security protocols2019-11-22Paper
Equivalence properties by typing in cryptographic branching protocols2019-09-16Paper
Secure refinements of communication channels2017-07-13Paper
From security protocols to pushdown automata2017-07-12Paper
YAPA: a generic tool for computing intruder knowledge2015-09-17Paper
Deciding security properties for cryptographic protocols. application to key cycles2015-09-17Paper
Modeling and verifying ad hoc routing protocols2014-10-20Paper
A generic security API for symmetric key management on cryptographic devices2014-10-20Paper
Electronic Voting: How Logic Can Help2014-09-26Paper
Typing messages for free in security protocols: the case of equivalence properties2014-09-15Paper
Deciding equivalence-based properties using constraint solving2014-01-10Paper
Explicit randomness is not necessary when modeling probabilistic encryption2013-12-13Paper
From security protocols to pushdown automata2013-08-07Paper
Practical Everlasting Privacy2013-08-06Paper
Tractable inference systems: an extension with a deducibility predicate2013-06-14Paper
Relating two standard notions of secrecy2012-09-28Paper
Secure composition of protocols2012-08-22Paper
Decidability and combination results for two notions of knowledge in security protocols2012-07-17Paper
Analysing routing protocols: four nodes topologies are sufficient2012-06-29Paper
Security proof with dishonest keys2012-06-29Paper
How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.2012-01-23Paper
Deciding knowledge in security protocols under some e-voting theories2011-10-28Paper
Deciding security for protocols with recursive tests2011-07-29Paper
A survey of symbolic methods in computational analysis of cryptographic systems2011-06-03Paper
Safely composing security protocols2009-07-06Paper
YAPA: A Generic Tool for Computing Intruder Knowledge2009-06-30Paper
Computationally sound implementations of equational theories against passive adversaries2009-04-16Paper
Relating Two Standard Notions of Secrecy2009-03-12Paper
Combining Algorithms for Deciding Knowledge in Security Protocols2008-09-16Paper
Deciding Key Cycles for Security Protocols2008-05-27Paper
Deciding Knowledge in Security Protocols for Monoidal Equational Theories2008-05-15Paper
Safely Composing Security Protocols2008-04-24Paper
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions2008-04-17Paper
Relating two standard notions of secrecy2007-11-15Paper
Automatic Analysis of the Security of XOR-Based Key Management Schemes2007-09-03Paper
Deciding knowledge in security protocols under equational theories2007-01-09Paper
A note on maximally repeated sub-patterns of a point set2006-09-14Paper
Automata, Languages and Programming2006-01-10Paper
Programming Languages and Systems2005-09-13Paper
Automata, Languages and Programming2005-08-24Paper
Tree automata with one memory set constraints and cryptographic protocols2005-04-06Paper
Security properties: two agents are sufficient2004-11-22Paper
https://portal.mardi4nfdi.de/entity/Q44472302004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44178862003-07-30Paper
https://portal.mardi4nfdi.de/entity/Q45350562002-06-12Paper
About the decision of reachability for register machines2002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q27536782001-11-11Paper
https://portal.mardi4nfdi.de/entity/Q49386292000-02-23Paper

Research outcomes over time

This page was built for person: Véronique Cortier