Yannick Chevalier

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
ACM Transactions on Computational Logic
2017-07-12Paper
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
Journal of Symbolic Computation
2017-02-06Paper
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
Journal of Symbolic Computation
2017-02-06Paper
Satisfiability of general intruder constraints with and without a set constructor
Journal of Symbolic Computation
2017-02-06Paper
Parametrized automata simulation and application to service composition
Journal of Symbolic Computation
2015-01-14Paper
Deciding the security of protocols with commuting public key encryption2013-09-25Paper
Decidability of equivalence of symbolic derivations
Journal of Automated Reasoning
2012-07-17Paper
Compiling and securing cryptographic protocols
Information Processing Letters
2010-09-02Paper
Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures
Theoretical Computer Science
2010-03-10Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
Lecture Notes in Computer Science
2009-08-06Paper
A Logical Approach to Dynamic Role-Based Access Control
Artificial Intelligence: Methodology, Systems, and Applications
2008-11-04Paper
Hierarchical Combination of Intruder Theories
Lecture Notes in Computer Science
2008-09-25Paper
Towards an Automatic Analysis of Web Service Security
Frontiers of Combining Systems
2008-09-16Paper
Verifying Cryptographic Protocols with Subterms Constraints
Logic for Programming, Artificial Intelligence, and Reasoning
2008-05-15Paper
Key Substitution in the Symbolic Analysis of Cryptographic Protocols
FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science
2008-04-24Paper
Hierarchical combination of intruder theories
Information and Computation
2008-04-16Paper
Computer Science Logic
Lecture Notes in Computer Science
2007-06-21Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
An NP decision procedure for protocol insecurity with XOR
Theoretical Computer Science
2005-06-30Paper
scientific article; zbMATH DE number 1903364 (Why is no real title available?)2003-05-01Paper
scientific article; zbMATH DE number 1903362 (Why is no real title available?)2003-05-01Paper


Research outcomes over time


This page was built for person: Yannick Chevalier