| Publication | Date of Publication | Type |
|---|
A procedure for deciding symbolic equivalence between sets of constraint systems Information and Computation | 2017-08-08 | Paper |
Deciding security properties for cryptographic protocols. application to key cycles ACM Transactions on Computational Logic | 2015-09-17 | Paper |
Deducibility constraints and blind signatures Information and Computation | 2014-10-20 | Paper |
Computational and symbolic anonymity in an unbounded network JSIAM Letters | 2013-11-19 | Paper |
Tractable inference systems: an extension with a deducibility predicate Automated Deduction – CADE-24 | 2013-06-14 | Paper |
About models of security protocols | 2012-10-19 | Paper |
Towards unconditional soundness: computationally complete symbolic attacker Lecture Notes in Computer Science | 2012-06-29 | Paper |
Security proof with dishonest keys Lecture Notes in Computer Science | 2012-06-29 | Paper |
Computational soundness of indistinguishability properties without computable parsing Information Security Practice and Experience | 2012-06-29 | Paper |
How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones. | 2012-01-23 | Paper |
Automating security analysis: symbolic equivalence of constraint systems Automated Reasoning | 2010-09-14 | Paper |
Easy intruder deductions Lecture Notes in Computer Science | 2010-03-23 | Paper |
Deducibility constraints Advances in Computer Science - ASIAN 2009. Information Security and Privacy | 2010-01-14 | Paper |
Models and Proofs of Protocol Security: A Progress Report Computer Aided Verification | 2009-06-30 | Paper |
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions Rewriting Techniques and Applications | 2009-06-30 | Paper |
Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables Formal to Practical Security | 2009-06-09 | Paper |
Deducibility Constraints, Equational Theory and Electronic Money Rewriting, Computation and Proof | 2009-03-06 | Paper |
Challenges in the Automated Verification of Security Protocols Automated Reasoning | 2008-11-27 | Paper |
Visibly Tree Automata with Memory and Constraints Logical Methods in Computer Science | 2008-08-07 | Paper |
Foundations of Software Science and Computation Structures Lecture Notes in Computer Science | 2007-09-28 | Paper |
Tree Automata with Memory, Visibility and Structural Constraints Foundations of Software Science and Computational Structures | 2007-09-07 | Paper |
Associative-Commutative Deducibility Constraints STACS 2007 | 2007-09-03 | Paper |
Term Rewriting and Applications Lecture Notes in Computer Science | 2005-11-11 | Paper |
Security properties: two agents are sufficient Science of Computer Programming | 2004-11-22 | Paper |
scientific article; zbMATH DE number 2043527 (Why is no real title available?) | 2004-02-16 | Paper |
scientific article; zbMATH DE number 1956548 (Why is no real title available?) | 2003-07-30 | Paper |