Filtrer vos résultats
- 320
- 272
- 1
- 330
- 103
- 97
- 19
- 10
- 9
- 9
- 8
- 4
- 2
- 1
- 1
- 84
- 9
- 573
- 5
- 4
- 1
- 26
- 24
- 23
- 1
- 7
- 50
- 54
- 46
- 56
- 61
- 44
- 56
- 40
- 43
- 45
- 34
- 30
- 20
- 6
- 555
- 38
- 593
- 593
- 593
- 61
- 43
- 27
- 26
- 23
- 22
- 21
- 12
- 8
- 8
- 7
- 7
- 7
- 6
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 113
- 93
- 49
- 44
- 44
- 41
- 40
- 37
- 33
- 32
- 32
- 25
- 25
- 23
- 22
- 22
- 19
- 17
- 17
- 17
- 16
- 16
- 16
- 15
- 15
- 14
- 13
- 13
- 13
- 13
- 12
- 12
- 11
- 11
- 10
- 10
- 10
- 10
- 9
- 9
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
593 résultats
|
Implementing a Unification Algorithm for Protocol Analysis with XOR20th International Workshop on Unification - UNIF'06, Aug 2006, Seattle, WA/USA, pp.1-5
Communication dans un congrès
inria-00103602v1
|
||
Mutation-Based Test Generation from Security Protocols in HLPSL4th International Conference on Software Testing Verification and Validation (ICST'2011), Mar 2011, Berlin, Germany. ⟨10.1109/ICST.2011.42⟩
Communication dans un congrès
inria-00559850v1
|
|||
|
Soundness of Symbolic Equivalence for Modular ExponentiationWorkshop on Formal and Computational Cryptography - FCC 2006, Véronique Cortier et Steve Kremer, Jul 2006, Venice/Italy
Communication dans un congrès
inria-00080673v1
|
||
|
Formal Analysis of E-Cash Protocols12th International Conference on Security and Cryptography (SECRYPT 2015), Jul 2015, Colmar, France. ⟨10.5220/0005544500650075⟩
Communication dans un congrès
hal-01337410v1
|
||
|
Brandt's fully private auction protocol revisitedJournal of Computer Security, 2015, Special issue on security and high performance computing systems, 23 (5), pp.587-610. ⟨10.3233/JCS-150535⟩
Article dans une revue
hal-01233555v1
|
||
Automatically Analysing Non-repudiation with Authentication3rd Taiwanese-French Conference on Information Technology - TFIT 06, Mar 2006, Nancy/France, pp.541-554
Communication dans un congrès
inria-00105534v1
|
|||
Sécurité des communications de groupeLa Revue de l'électricité et de l'électronique, 2006, Risques et sécurité des réseaux et des systèmes à composante logicielle, 6/7, pp.51-60
Article dans une revue
inria-00105523v1
|
|||
|
Computational soundness of observational equivalence[Research Report] RR-6508, INRIA. 2008, pp.36
Rapport
inria-00274158v2
|
||
A SysML Formal Framework to Combine Discrete and Continuous Simulation for TestingICFEM'15, 17th Int. Conf. on Formal Engineering Methods, 2015, Paris, France. pp.134--152
Communication dans un congrès
hal-01246024v1
|
|||
|
Resolution of constraint systems for automatic composition of security-aware Web ServicesCryptography and Security [cs.CR]. Université Henri Poincaré - Nancy 1, 2011. English. ⟨NNT : ⟩
Thèse
tel-01746193v3
|
||
|
C-tableaux[Research Report] RR-5229, INRIA. 2004, pp.31
Rapport
inria-00070767v1
|
||
|
A rule-based system for automatic decidability and combinabilityScience of Computer Programming, 2015, Selected Papers from the Ninth International Workshop on Rewriting Logic and its Applications (WRLA 2012), 99, pp.3-23. ⟨10.1016/j.scico.2014.02.005⟩
Article dans une revue
hal-01102883v1
|
||
|
A Gentle Non-Disjoint Combination of Satisfiability Procedures (Extended Version)[Research Report] RR-8529, INRIA. 2014
Rapport
hal-00985135v1
|
||
|
Analyse des protocoles cryptographiques: des modèles symboliques aux modèles calculatoiresInformatique [cs]. Institut National Polytechnique de Lorraine - INPL, 2009
HDR
tel-00578816v1
|
||
|
Refinement and Verification of Synchronized Component-based Systems[Research Report] RR-4862, INRIA. 2003, pp.29
Rapport
inria-00071721v1
|
||
A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols.12th European Symposium On Research In Computer Security - ESORICS'07, Sep 2007, Dresden, Germany. pp.422-437
Communication dans un congrès
inria-00181601v1
|
|||
|
Practical Analysis Framework for Component Systems with Dynamic Reconfigurations17th International Conference on Formal Engineering Methods, Nov 2015, Paris, France
Communication dans un congrès
hal-01135720v3
|
||
Dynamic Web Services Provisioning with ConstraintsInternational Conference on Cooperative Information Systems, OTM Conferences, Nov 2008, Monterrey, Mexico. pp.26-43
Communication dans un congrès
inria-00329815v1
|
|||
|
Formal verification of e-voting: solutions and challengesACM SIGLOG News, 2015, 2, pp.25-34. ⟨10.1145/2728816.2728823⟩
Article dans une revue
hal-01206297v1
|
||
|
Modeling and simulation of modular complex system: Application to air-jet conveyorAdvanced Intelligent Mechatronics (AIM), Jul 2014, Besançon, France. pp.6, ⟨10.1109/AIM.2014.6878244⟩
Communication dans un congrès
hal-01093474v1
|
||
Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices19th ACM Conference on Computer and Communications Security (CCS'12), Oct 2012, Raleigh, United States
Communication dans un congrès
hal-00732902v1
|
|||
|
Guessing a Conjecture in Enumerative Combinatorics and Proving It with a Computer Algebra SystemSymbolic Computation in Software Science, Jul 2010, Linz, Austria. pp.5--18
Communication dans un congrès
hal-00563330v1
|
||
Timed Specification For Web Services Compatibility AnalysisInternational Workshop on Automated Specification and Verification of Web Systems - WWV 2007, Dec 2007, San Servolo island, Venice, Italy
Communication dans un congrès
inria-00190978v1
|
|||
|
A random testing approach using pushdown automataJournal of Software Testing, Verification and Reliability, 2014, 24, pp.656 - 683. ⟨10.1002/stvr.1526⟩
Article dans une revue
istex
hal-01088712v1
|
||
|
Filtrage Efficace Pour la Détection d'IntrusionsConférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p
Communication dans un congrès
inria-00099496v1
|
||
|
{JML}-based Verification of Liveness Properties on a Class in isolationSAVCBS'06, Specification and Verification of Component-Based Systems, 2006, United States. pp.41--48
Communication dans un congrès
hal-00561442v1
|
||
|
Relating two standard notions of secrecyLogical Methods in Computer Science, 2007, 3 (3, paper 2), pp.1-29. ⟨10.2168/LMCS-3(3:2)2007⟩
Article dans une revue
inria-00178352v1
|
||
|
On the Polling Problem for Social Networks[Research Report] RR-8055, INRIA. 2012
Rapport
hal-00727599v2
|
||
Grey-Box Testing and Verification of Java/JML3rd International Workshop on Constraints in Software Testing Verification and Analysis, Mar 2011, Berlin, Germany. pp.298-303, ⟨10.1109/ICSTW.2011.30⟩
Communication dans un congrès
hal-00640381v1
|
|||
|
Computationally Sound Implementations of Equational Theories against Passive AdversariesInformation and Computation, 2009, 207 (4), pp.496-520. ⟨10.1016/j.ic.2008.12.005⟩
Article dans une revue
inria-00426620v1
|