Filtrer vos résultats
- 6
- 4
- 3
- 3
- 3
- 1
- 2
- 10
- 1
- 1
- 2
- 1
- 1
- 1
- 2
- 1
- 9
- 1
- 5
- 5
- 5
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 6
- 4
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
10 résultats
|
|
triés par
|
|
Deciding knowledge in security protocols under (many more) equational theoriesCSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
Communication dans un congrès
inria-00000554v1
|
||
|
Deciding knowledge in security protocols under equational theories[Research Report] RR-5169, INRIA. 2004, pp.22
Rapport
inria-00071420v1
|
||
À propos de la sécurité informatiqueInterstices, 2011
Article dans une revue
hal-01350235v1
|
|||
Principles of Security and Trust8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
Proceedings/Recueil des communications
hal-01090879v1
|
|||
|
Deciding knowledge in security protocols under equational theoriesICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
Communication dans un congrès
inria-00099982v1
|
||
|
Deciding knowledge in security protocols under equational theories.Theoretical Computer Science, 2006, 367 (1-2), pp.2-32. ⟨10.1016/j.tcs.2006.08.032⟩
Article dans une revue
inria-00108372v1
|
||
|
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication[Research Report] ArXiv. 2016, pp.110
Rapport
hal-01423924v1
|
||
|
The Applied Pi Calculus: Mobile Values, New Names, and Secure CommunicationJournal of the ACM (JACM), 2017, 65 (1), pp.1 - 103. ⟨10.1145/3127586⟩
Article dans une revue
hal-01636616v1
|
||
|
Explicit substitutionsRR-1176, INRIA. 1990
Rapport
inria-00075382v1
|
||
|
Web PKI: Closing the Gap between Guidelines and PracticesNetwork and Distributed System Security Symposium, Feb 2014, San Diego, United States. ⟨10.14722/ndss.2014.23305⟩
Communication dans un congrès
hal-01102254v1
|