Véronique Cortier

From MaRDI portal
(Redirected from Person:391119)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
scientific article; zbMATH DE number 7650814 (Why is no real title available?)2023-02-07Paper
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols
1511.68042
2022-12-22Paper
Efficiently deciding equivalence for standard primitives and phases2022-08-25Paper
Checking trace equivalence: how to get rid of nonces?2022-08-19Paper
When are three voters enough for privacy properties?2022-08-19Paper
A decidable class of security protocols for both reachability and equivalence properties
Journal of Automated Reasoning
2021-06-09Paper
Belenios: a simple private and verifiable electronic voting system2020-03-03Paper
Typing messages for free in security protocols
ACM Transactions on Computational Logic
2019-11-22Paper
Equivalence properties by typing in cryptographic branching protocols2019-09-16Paper
Secure refinements of communication channels2017-07-13Paper
From security protocols to pushdown automata
ACM Transactions on Computational Logic
2017-07-12Paper
YAPA: a generic tool for computing intruder knowledge
ACM Transactions on Computational Logic
2015-09-17Paper
Deciding security properties for cryptographic protocols. application to key cycles
ACM Transactions on Computational Logic
2015-09-17Paper
Modeling and verifying ad hoc routing protocols
Information and Computation
2014-10-20Paper
A generic security API for symmetric key management on cryptographic devices
Information and Computation
2014-10-20Paper
Electronic Voting: How Logic Can Help
Automated Reasoning
2014-09-26Paper
Typing messages for free in security protocols: the case of equivalence properties
CONCUR 2014 – Concurrency Theory
2014-09-15Paper
Deciding equivalence-based properties using constraint solving
Theoretical Computer Science
2014-01-10Paper
Explicit randomness is not necessary when modeling probabilistic encryption
Electronic Notes in Theoretical Computer Science
2013-12-13Paper
From security protocols to pushdown automata
Automata, Languages, and Programming
2013-08-07Paper
Practical Everlasting Privacy
Lecture Notes in Computer Science
2013-08-06Paper
Tractable inference systems: an extension with a deducibility predicate
Automated Deduction – CADE-24
2013-06-14Paper
Relating two standard notions of secrecy2012-09-28Paper
Secure composition of protocols
Theory of Security and Applications
2012-08-22Paper
Decidability and combination results for two notions of knowledge in security protocols
Journal of Automated Reasoning
2012-07-17Paper
Analysing routing protocols: four nodes topologies are sufficient
Lecture Notes in Computer Science
2012-06-29Paper
Security proof with dishonest keys
Lecture Notes in Computer Science
2012-06-29Paper
How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.2012-01-23Paper
Deciding knowledge in security protocols under some e-voting theories
RAIRO - Theoretical Informatics and Applications
2011-10-28Paper
Deciding security for protocols with recursive tests
Lecture Notes in Computer Science
2011-07-29Paper
A survey of symbolic methods in computational analysis of cryptographic systems
Journal of Automated Reasoning
2011-06-03Paper
Safely composing security protocols
Formal Methods in System Design
2009-07-06Paper
YAPA: A Generic Tool for Computing Intruder Knowledge
Rewriting Techniques and Applications
2009-06-30Paper
Computationally sound implementations of equational theories against passive adversaries
Information and Computation
2009-04-16Paper
Relating Two Standard Notions of Secrecy
Computer Science Logic
2009-03-12Paper
Combining Algorithms for Deciding Knowledge in Security Protocols
Frontiers of Combining Systems
2008-09-16Paper
Deciding Key Cycles for Security Protocols
Logic for Programming, Artificial Intelligence, and Reasoning
2008-05-27Paper
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Logic for Programming, Artificial Intelligence, and Reasoning
2008-05-15Paper
Safely Composing Security Protocols
FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science
2008-04-24Paper
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science
2008-04-17Paper
Relating two standard notions of secrecy
Logical Methods in Computer Science
2007-11-15Paper
Automatic Analysis of the Security of XOR-Based Key Management Schemes
Tools and Algorithms for the Construction and Analysis of Systems
2007-09-03Paper
Deciding knowledge in security protocols under equational theories
Theoretical Computer Science
2007-01-09Paper
A note on maximally repeated sub-patterns of a point set
Discrete Mathematics
2006-09-14Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Programming Languages and Systems
Lecture Notes in Computer Science
2005-09-13Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2005-08-24Paper
Tree automata with one memory set constraints and cryptographic protocols
Theoretical Computer Science
2005-04-06Paper
Security properties: two agents are sufficient
Science of Computer Programming
2004-11-22Paper
scientific article; zbMATH DE number 2043527 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1956548 (Why is no real title available?)2003-07-30Paper
scientific article; zbMATH DE number 1754629 (Why is no real title available?)2002-06-12Paper
About the decision of reachability for register machines
RAIRO - Theoretical Informatics and Applications
2002-01-01Paper
About the decision of reachability for register machines
RAIRO - Theoretical Informatics and Applications
2002-01-01Paper
About the decision of reachability for register machines
RAIRO - Theoretical Informatics and Applications
2002-01-01Paper
scientific article; zbMATH DE number 1670482 (Why is no real title available?)2001-11-11Paper
scientific article; zbMATH DE number 1405649 (Why is no real title available?)2000-02-23Paper


Research outcomes over time


This page was built for person: Véronique Cortier