Véronique Cortier

From MaRDI portal
Person:391119

Available identifiers

zbMath Open cortier.veroniqueWikidataQ21264854 ScholiaQ21264854MaRDI QIDQ391119

List of research outcomes

PublicationDate of PublicationType
https://portal.mardi4nfdi.de/entity/Q58741862023-02-07Paper
Efficiently deciding equivalence for standard primitives and phases2022-08-25Paper
Checking trace equivalence: how to get rid of nonces?2022-08-19Paper
When are three voters enough for privacy properties?2022-08-19Paper
A decidable class of security protocols for both reachability and equivalence properties2021-06-09Paper
Belenios: a simple private and verifiable electronic voting system2020-03-03Paper
Typing Messages for Free in Security Protocols2019-11-22Paper
Equivalence properties by typing in cryptographic branching protocols2019-09-16Paper
https://portal.mardi4nfdi.de/entity/Q52753982017-07-13Paper
From Security Protocols to Pushdown Automata2017-07-12Paper
Deciding security properties for cryptographic protocols. application to key cycles2015-09-17Paper
YAPA2015-09-17Paper
Modeling and verifying ad hoc routing protocols2014-10-20Paper
A generic security API for symmetric key management on cryptographic devices2014-10-20Paper
Electronic Voting: How Logic Can Help2014-09-26Paper
Typing Messages for Free in Security Protocols: The Case of Equivalence Properties2014-09-15Paper
Deciding equivalence-based properties using constraint solving2014-01-10Paper
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption2013-12-13Paper
From Security Protocols to Pushdown Automata2013-08-07Paper
Practical Everlasting Privacy2013-08-06Paper
Tractable Inference Systems: An Extension with a Deducibility Predicate2013-06-14Paper
https://portal.mardi4nfdi.de/entity/Q29174072012-09-28Paper
Secure Composition of Protocols2012-08-22Paper
Decidability and combination results for two notions of knowledge in security protocols2012-07-17Paper
Analysing Routing Protocols: Four Nodes Topologies Are Sufficient2012-06-29Paper
Security Proof with Dishonest Keys2012-06-29Paper
https://portal.mardi4nfdi.de/entity/Q31136702012-01-23Paper
Deciding knowledge in security protocols under some e-voting theories2011-10-28Paper
Deciding Security for Protocols with Recursive Tests2011-07-29Paper
A survey of symbolic methods in computational analysis of cryptographic systems2011-06-03Paper
Safely composing security protocols2009-07-06Paper
YAPA: A Generic Tool for Computing Intruder Knowledge2009-06-30Paper
Computationally sound implementations of equational theories against passive adversaries2009-04-16Paper
Relating Two Standard Notions of Secrecy2009-03-12Paper
Combining Algorithms for Deciding Knowledge in Security Protocols2008-09-16Paper
Deciding Key Cycles for Security Protocols2008-05-27Paper
Deciding Knowledge in Security Protocols for Monoidal Equational Theories2008-05-15Paper
Safely Composing Security Protocols2008-04-24Paper
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions2008-04-17Paper
Relating two standard notions of secrecy2007-11-15Paper
Automatic Analysis of the Security of XOR-Based Key Management Schemes2007-09-03Paper
Deciding knowledge in security protocols under equational theories2007-01-09Paper
A note on maximally repeated sub-patterns of a point set2006-09-14Paper
Automata, Languages and Programming2006-01-10Paper
Programming Languages and Systems2005-09-13Paper
Automata, Languages and Programming2005-08-24Paper
Tree automata with one memory set constraints and cryptographic protocols2005-04-06Paper
Security properties: two agents are sufficient2004-11-22Paper
https://portal.mardi4nfdi.de/entity/Q44472302004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44178862003-07-30Paper
https://portal.mardi4nfdi.de/entity/Q45350562002-06-12Paper
About the decision of reachability for register machines2002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q27536782001-11-11Paper
https://portal.mardi4nfdi.de/entity/Q49386292000-02-23Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Véronique Cortier