Recherche - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu

Filtrer vos résultats

593 résultats
Image document

Implementing a Unification Algorithm for Protocol Analysis with XOR

Max Tuengerthal , Ralf Küsters , Mathieu Turuani
20th International Workshop on Unification - UNIF'06, Aug 2006, Seattle, WA/USA, pp.1-5
Communication dans un congrès inria-00103602v1

Mutation-Based Test Generation from Security Protocols in HLPSL

Frédéric Dadeau , Pierre-Cyrille Héam , Rafik Kheddam
4th International Conference on Software Testing Verification and Validation (ICST'2011), Mar 2011, Berlin, Germany. ⟨10.1109/ICST.2011.42⟩
Communication dans un congrès inria-00559850v1
Image document

Soundness of Symbolic Equivalence for Modular Exponentiation

Yassine Lakhnech , Laurent Mazare , Bogdan Warinschi
Workshop on Formal and Computational Cryptography - FCC 2006, Véronique Cortier et Steve Kremer, Jul 2006, Venice/Italy
Communication dans un congrès inria-00080673v1
Image document

Formal Analysis of E-Cash Protocols

Jannik Dreier , Ali Kassem , Pascal Lafourcade
12th International Conference on Security and Cryptography (SECRYPT 2015), Jul 2015, Colmar, France. ⟨10.5220/0005544500650075⟩
Communication dans un congrès hal-01337410v1
Image document

Brandt's fully private auction protocol revisited

Jannik Dreier , Jean-Guillaume Dumas , Pascal Lafourcade
Journal of Computer Security, 2015, Special issue on security and high performance computing systems, 23 (5), pp.587-610. ⟨10.3233/JCS-150535⟩
Article dans une revue hal-01233555v1

Automatically Analysing Non-repudiation with Authentication

Judson Santos Santiago , Laurent Vigneron
3rd Taiwanese-French Conference on Information Technology - TFIT 06, Mar 2006, Nancy/France, pp.541-554
Communication dans un congrès inria-00105534v1

Sécurité des communications de groupe

Najah Chridi , Laurent Vigneron
La Revue de l'électricité et de l'électronique, 2006, Risques et sécurité des réseaux et des systèmes à composante logicielle, 6/7, pp.51-60
Article dans une revue inria-00105523v1
Image document

Computational soundness of observational equivalence

Hubert Comon-Lundh , Véronique Cortier
[Research Report] RR-6508, INRIA. 2008, pp.36
Rapport inria-00274158v2

A SysML Formal Framework to Combine Discrete and Continuous Simulation for Testing

Jean-Marie Gauthier , Fabrice Bouquet , Fabien Peureux , Hammed Ahmad
ICFEM'15, 17th Int. Conf. on Formal Engineering Methods, 2015, Paris, France. pp.134--152
Communication dans un congrès hal-01246024v1
Image document

Resolution of constraint systems for automatic composition of security-aware Web Services

Tigran Avanesov
Cryptography and Security [cs.CR]. Université Henri Poincaré - Nancy 1, 2011. English. ⟨NNT : ⟩
Thèse tel-01746193v3
Image document

C-tableaux

Calogero G. Zarba
[Research Report] RR-5229, INRIA. 2004, pp.31
Rapport inria-00070767v1
Image document

A rule-based system for automatic decidability and combinability

Elena Tushkanova , Alain Giorgetti , Christophe Ringeissen , Olga Kouchnarenko
Science of Computer Programming, 2015, Selected Papers from the Ninth International Workshop on Rewriting Logic and its Applications (WRLA 2012), 99, pp.3-23. ⟨10.1016/j.scico.2014.02.005⟩
Article dans une revue hal-01102883v1
Image document

A Gentle Non-Disjoint Combination of Satisfiability Procedures (Extended Version)

Paula Chocron , Pascal Fontaine , Christophe Ringeissen
[Research Report] RR-8529, INRIA. 2014
Rapport hal-00985135v1
Image document

Analyse des protocoles cryptographiques: des modèles symboliques aux modèles calculatoires

Véronique Cortier
Informatique [cs]. Institut National Polytechnique de Lorraine - INPL, 2009
HDR tel-00578816v1
Image document

Refinement and Verification of Synchronized Component-based Systems

Olga Kouchnarenko , Arnaud Lanoix
[Research Report] RR-4862, INRIA. 2003, pp.29
Rapport inria-00071721v1

A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols.

Véronique Cortier , Ralf Kuesters , Bogdan Warinschi
12th European Symposium On Research In Computer Security - ESORICS'07, Sep 2007, Dresden, Germany. pp.422-437
Communication dans un congrès inria-00181601v1
Image document

Practical Analysis Framework for Component Systems with Dynamic Reconfigurations

Olga Kouchnarenko , Jean-François Weber
17th International Conference on Formal Engineering Methods, Nov 2015, Paris, France
Communication dans un congrès hal-01135720v3

Dynamic Web Services Provisioning with Constraints

Eric Monfroy , Olivier Perrin , Christophe Ringeissen
International Conference on Cooperative Information Systems, OTM Conferences, Nov 2008, Monterrey, Mexico. pp.26-43
Communication dans un congrès inria-00329815v1

Formal verification of e-voting: solutions and challenges

Véronique Cortier
ACM SIGLOG News, 2015, 2, pp.25-34. ⟨10.1145/2728816.2728823⟩
Article dans une revue hal-01206297v1

Modeling and simulation of modular complex system: Application to air-jet conveyor

Ahmed Hammad , Fabrice Bouquet , Jean-Marie Gauthier , Dominique Gendreau
Advanced Intelligent Mechatronics (AIM), Jul 2014, Besançon, France. pp.6, ⟨10.1109/AIM.2014.6878244⟩
Communication dans un congrès hal-01093474v1

Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices

Véronique Cortier , Graham Steel , Cyrille Wiedling
19th ACM Conference on Computer and Communications Security (CCS'12), Oct 2012, Raleigh, United States
Communication dans un congrès hal-00732902v1
Image document

Guessing a Conjecture in Enumerative Combinatorics and Proving It with a Computer Algebra System

Alain Giorgetti
Symbolic Computation in Software Science, Jul 2010, Linz, Austria. pp.5--18
Communication dans un congrès hal-00563330v1

Timed Specification For Web Services Compatibility Analysis

Nawal Guermouche , Olivier Perrin , Christophe Ringeissen
International Workshop on Automated Specification and Verification of Web Systems - WWV 2007, Dec 2007, San Servolo island, Venice, Italy
Communication dans un congrès inria-00190978v1
Image document

A random testing approach using pushdown automata

Aloïs Dreyfus , Pierre-Cyrille Héam , Olga Kouchnarenko , Catherine Masson
Journal of Software Testing, Verification and Reliability, 2014, 24, pp.656 - 683. ⟨10.1002/stvr.1526⟩
Article dans une revue istex hal-01088712v1
Image document

Filtrage Efficace Pour la Détection d'Intrusions

Tarek Abbes , Adel Bouhoula , Michaël Rusinowitch
Conférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p
Communication dans un congrès inria-00099496v1
Image document

{JML}-based Verification of Liveness Properties on a Class in isolation

Julien Groslambert , Jacques Julliand , Olga Kouchnarenko
SAVCBS'06, Specification and Verification of Component-Based Systems, 2006, United States. pp.41--48
Communication dans un congrès hal-00561442v1

Relating two standard notions of secrecy

Véronique Cortier , Michaël Rusinowitch , Eugen Zalinescu
Logical Methods in Computer Science, 2007, 3 (3, paper 2), pp.1-29. ⟨10.2168/LMCS-3(3:2)2007⟩
Article dans une revue inria-00178352v1
Image document

On the Polling Problem for Social Networks

Hoang Bao Thien , Abdessamad Imine
[Research Report] RR-8055, INRIA. 2012
Rapport hal-00727599v2

Grey-Box Testing and Verification of Java/JML

Frédéric Dadeau , Fabien Peureux
3rd International Workshop on Constraints in Software Testing Verification and Analysis, Mar 2011, Berlin, Germany. pp.298-303, ⟨10.1109/ICSTW.2011.30⟩
Communication dans un congrès hal-00640381v1

Computationally Sound Implementations of Equational Theories against Passive Adversaries

Mathieu Baudet , Véronique Cortier , Steve Kremer
Information and Computation, 2009, 207 (4), pp.496-520. ⟨10.1016/j.ic.2008.12.005⟩
Article dans une revue inria-00426620v1