Yannick Chevalier

From MaRDI portal
(Redirected from Person:437029)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
ACM Transactions on Computational Logic
2017-07-12Paper
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
Journal of Symbolic Computation
2017-02-06Paper
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
Journal of Symbolic Computation
2017-02-06Paper
Satisfiability of general intruder constraints with and without a set constructor
Journal of Symbolic Computation
2017-02-06Paper
Parametrized automata simulation and application to service composition
Journal of Symbolic Computation
2015-01-14Paper
Deciding the security of protocols with commuting public key encryption2013-09-25Paper
Decidability of equivalence of symbolic derivations
Journal of Automated Reasoning
2012-07-17Paper
Compiling and securing cryptographic protocols
Information Processing Letters
2010-09-02Paper
Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures
Theoretical Computer Science
2010-03-10Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
Lecture Notes in Computer Science
2009-08-06Paper
A Logical Approach to Dynamic Role-Based Access Control
Artificial Intelligence: Methodology, Systems, and Applications
2008-11-04Paper
Hierarchical Combination of Intruder Theories
Lecture Notes in Computer Science
2008-09-25Paper
Towards an Automatic Analysis of Web Service Security
Frontiers of Combining Systems
2008-09-16Paper
Verifying Cryptographic Protocols with Subterms Constraints
Logic for Programming, Artificial Intelligence, and Reasoning
2008-05-15Paper
Key Substitution in the Symbolic Analysis of Cryptographic Protocols
FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science
2008-04-24Paper
Hierarchical combination of intruder theories
Information and Computation
2008-04-16Paper
Computer Science Logic
Lecture Notes in Computer Science
2007-06-21Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
An NP decision procedure for protocol insecurity with XOR
Theoretical Computer Science
2005-06-30Paper
scientific article; zbMATH DE number 1903364 (Why is no real title available?)2003-05-01Paper
scientific article; zbMATH DE number 1903362 (Why is no real title available?)2003-05-01Paper


Research outcomes over time


This page was built for person: Yannick Chevalier