Nombre de documents

41

CV de Laurent Vigneron


Communication dans un congrès23 documents

  • Laurent Vigneron. Déduction automatique appliquée à l'analyse et la vérification de systèmes infinis. Souquières, Jeanine and Wiels, Virginie. Approches Formelles dans l'Assistance au Développement de Logiciels, Apr 2013, Nancy, France. 2013. <hal-00916581>
  • Pierre De Saqui-Sannes, Thierry Villemur, Benjamin Fontan, Sara del Socorro Mota Gonzalez, Mohamed Salah Bouassida, et al.. UML Modeling and Formal Verification of Secure Group Communication Protocols. Second IEEE International workshop UML and Formal Methods - UML&FM'2009, 2009, Rio de Janeiro, Brazil. 2009. <hal-00447668>
  • Francis Klay, Laurent Vigneron. Automatic Methods for Analyzing Non-repudiation Protocole with an Active Intruder. Pierpaolo Degano, Joshua D. Guttman and Fabio Martinelli. 5th International Workshop on Formal Aspects in Security and Trust - FAST 2008, Oct 2008, Malaga, Spain. Springer-Verlag, 5491, pp.192-209, 2009, Lecture Notes in Computer Science; Formal Aspects in Security and Trust. <10.1007/978-3-642-01465-9_13>. <inria-00376450>
  • Judson Santos Santiago, Laurent Vigneron. Optimistic Non-repudiation Protocol Analysis. Damien Sauveron and Konstantinos Markantonakis and Angelos Bilas and Jean-Jacques Quisquater. Information Security Theory and Practices - Smart Cards, Mobile and Ubiquitous Computing Systems, May 2007, Heraklion, Greece. Springer, 4462, pp.90-101, 2007, Lecture Notes in Computer Science; First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings. <10.1007/978-3-540-72354-7_8>. <inria-00176333>
  • Florent Jacquemard, Michael Rusinowitch, Laurent Vigneron. Tree automata with equality constraints modulo equational theories. Ulrich Furbach and Natarajan Shankar. 3d International Joint Conference on Automated Reasoning (IJCAR), Aug 2006, Seattle, United States. Springer, 4130, pp.557-571, 2006, Lecture Notes in Computer Science; 3d International Joint Conference on Automated Reasoning (IJCAR). <http://www.springerlink.com/content/j354023699610786/>. <10.1007/11814771_45>. <inria-00579011>
  • Judson Santos Santiago, Laurent Vigneron. Automatically Analysing Non-repudiation with Authentication. 3rd Taiwanese-French Conference on Information Technology - TFIT 06, Mar 2006, Nancy/France, pp.541-554, 2006. <inria-00105534>
  • Yohan Boichut, Nikolai Kosmatov, Laurent Vigneron. Validation of Prouve Protocols using the Automatic Tool TA4SP. 3rd Taiwanese-French Conference on Information Technology, Mar 2006, Nancy/France, pp.467-480, 2006. <inria-00105533>
  • Najah Chridi, Laurent Vigneron. Strategy for Flaws Detection based on a Services-driven Model for Group Protocols. Workshop on Constraints in Software Testing, Verification and Analysis - CSTVA 06, Sep 2006, Nantes/France, pp.88-99, 2006. <inria-00105519>
  • Mohamed Salah Bouassida, Najah Chridi, Isabelle Chrisment, Olivier Festor, Laurent Vigneron. Automatic Verification of Key Management Architecture for Hierarchical Group Protocols. Sécurité et Architecture des Réseaux - SAR 2006, May 2006, Seignosse/France, pp.381-397, 2006. <inria-00090165>
  • Alessandro Armando, David Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, et al.. The AVISPA Tool for the automated validation of internet security protocols and applications. Kousha Etessami and Sriram K. Rajamani. 17th International Conference on Computer Aided Verification - CAV 2005, Jul 2005, Edinburgh, Scotland/UK, France. Springer, 3576, pp.281-285, 2005, Lecture Notes in Computer Science. <inria-00000408>
  • Najah Chridi, Laurent Vigneron. Modélisation des propriétés de sécurité de protocoles de groupe. 1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes, CRiSIS, Oct 2005, Bourges, France, pp.119-132, 2005. <inria-00000606>
  • Judson Santos Santiago, Laurent Vigneron. Study for Automatically Analysing Non-repudiation. 1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes- CRiSIS 2005, Oct 2005, Bourges/France, pp.157--171, 2005. <inria-00000607>
  • Laurent Vigneron. Automatic Verification of Security Protocols. Kohlhase, Michael. 18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 2 p, 2004. <inria-00100032>
  • Yannick Chevalier, Luca Compagna, Jorge Cuellar, Paul Hankes Drielsma, Jacopo Mantovani, et al.. A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. Workshop on Specification and Automated Processing of Security Requirements - SAPS'2004, 2004, Linz, Austria, Austrian Computer Society, 13 p, 2004. <inria-00099882>
  • Yannick Chevalier, Laurent Vigneron. Rule-based Programs describing Internet Security Protocols. Abdennadher, Slim and Ringeissen, Christophe. 5th International Workshop on Rule-Based Programming - RULE'2004, Jun 2004, Aachen, Germany, pp.83-97, 2004. <inria-00099888>
  • Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron. Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. M. Baaz and J. A. Makowsky. Computer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, Springer, 2803, pp.128-141, 2003, Lecture Notes in Computer Science. <inria-00099514>
  • Alessandro Armando, David Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, et al.. The AVISS Security Protocol Analysis Tool. Ed Brinksma and Kim Guldstrand Larsen. 14th International Conference on Computer Aided Verification - CAV'2002, Jul 2002, Copenhaguen, Denmark, Springer, 2404, pp.349-353, 2002, Lecture Notes in Computer Science. <inria-00100915>
  • Yannick Chevalier, Laurent Vigneron. Automated Unbounded Verification of Security Protocols. Ed Brinksma and Kim Guldstrand Larsen. 14th International Conference on Computer Aided Verification - CAV'2002, 2002, Copenhaguen, Denmark, Springer, 2404, pp.324-337, 2002, Lecture Notes in Computer Science. <inria-00100916>
  • Yannick Chevalier, Laurent Vigneron. Towards Efficient Automated Verification of Security Protocols. Verification Workshop - VERIFY'01 (in connection with IJCAR'01), Jun 2001, Siena, Italy, 15 p, 2001. <inria-00101104>
  • Leo Bachmair, I. V. Ramakrishnan, Ashish Tiwari, Laurent Vigneron. Congruence Closure modulo Associativity-Commutativity. Kirchner, H. et Ringeissen, Ch. 3rd International Workshop on Frontiers of Combining Systems - FroCoS'2000, Mar 2000, Nancy, France, Springer Verlag, 1794, pp.242-256, 2000, Lecture Notes in Computer Science. <inria-00099214>
  • Laurent Vigneron, Anita Wasilewska. Rough Sets based Proofs Visualisation. Dave, R. N. & Sudkamp, T. 18th International Conference of the North American Fuzzy Information Processing Society - NAFIPS'99, invited session on Granular Computing and Rough Sets, 1999, New York, USA, IEEE, pp.805-808, 1999. <inria-00098752>
  • Laurent Vigneron, Anita Wasilewska. Rough Sets Congruences and Diagrams. R. Slowinski. 16th European Conference on Operational Research (EURO XVI), session on Rough Sets, 1998, Brussels, Belgium, 1 p, 1998. <inria-00098492>
  • Laurent Vigneron, Anita Wasilewska. Rough Diagrams. T.Y. Lin. 6th International Workshop on Rough Sets, Data Mining & Granular Computing (RSDMGrC'98) at the 4th Joint Conference on Information Sciences, 1998, Research Triangle Park, NC, 4 p, 1998. <inria-00098493>

HDR1 document

  • Laurent Vigneron. Déduction automatique appliquée à l'analyse et la vérification de systèmes infinis. Cryptographie et sécurité [cs.CR]. Université Nancy II, 2011. <tel-00642467>

Rapport4 documents

  • Eric Monfroy, Olivier Perrin, Christophe Ringeissen, Laurent Vigneron. A Constraint-based Approach to Web Services Provisioning. [Research Report] RR-7413, INRIA. 2010, pp.39. <inria-00524590>
  • Francis Klay, Judson Santiago, Laurent Vigneron. Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder. [Research Report] RR-6324, INRIA. 2007, pp.22. <inria-00179550v2>
  • Yannick Chevalier, Luca Compagna, Jorge Cuellar, Paul Hankes Drielsma, Jacopo Mantovani, et al.. A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. [Intern report] A04-R-067 || chevalier04b, 2004, 17 p. <inria-00100219>
  • Yannick Chevalier, Laurent Vigneron. A Tool for Lazy Verification of Security Protocols. [Intern report] A01-R-140 || chevalier01b, 2001, 10 p. <inria-00107545>

Article dans une revue7 documents

  • Pierre Saqui-Sannes, Thierry Villemur, Benjamin Fontan, Sara del Socorro Mota Gonzalez, Mohamed Salah Bouassida, et al.. Formal Verification of Secure Group Communication Protocols Modelled in UML. Innovations in Systems and Software Engineering, Springer Verlag, 2010, Special Issue ICFEM'09, 6 (1-2), pp.125-133. <10.1007/s11334-010-0122-3>. <inria-00594387>
  • Liu Jing, Laurent Vigneron. Design and Verification of a Non-repudiation Protocol Based on Receiver-Side Smart Card. IET Information Security, Institution of Engineering and Technology, 2010, 4 (1), pp.15-29. <inria-00426527>
  • Florent Jacquemard, Michael Rusinowitch, Laurent Vigneron. Tree automata with equality constraints modulo equational theories. Journal of Logic and Algebraic Programming, Elsevier, 2008, 75 (2), pp.182-208. <10.1016/j.jlap.2007.10.006>. <inria-00329693>
  • Mohamed Salah Bouassida, Najah Chridi, Isabelle Chrisment, Olivier Festor, Laurent Vigneron. Automated Verification of a Key Management Architecture for Hierarchical Group Protocols. Annals of Telecommunications - annales des télécommunications, Springer, 2007, 62 (11-12), pp.1365-1387. <inria-00594389>
  • Najah Chridi, Laurent Vigneron. Sécurité des communications de groupe. La Revue de l'Electricité et de l'Electronique, Société de l'Électricité, de l'Électronique et des Technologies de l'Information et de la Communication, 2006, Risques et sécurité des réseaux et des systèmes à composante logicielle, pp.51-60. <inria-00105523>
  • Yannick Chevalier, Laurent Vigneron. Strategy for Verifying Security Protocols with Unbounded Message Size. Journal of Automated Software Engineering, Springer, 2004, 11 (2), pp.141-166. <inria-00099945>
  • Leo Bachmair, Ashish Tiwari, Laurent Vigneron. Abstract Congruence Closure. Journal of Automated Reasoning, Springer Verlag, 2003, 31 (2), pp.129-168. <inria-00099511>

Chapitre d'ouvrage2 documents

  • Laurent Vigneron, Najah Chridi. Strategy for Flaws Detection based on a Services-driven Model for Group Protocols. Frédéric Benhamou and Narendra Jussien and Barry O\'Sullivan. Future and Trends in Constraint Programming, ISTE, pp.361-370, 2007, 1905209975. <inria-00176326>
  • Anita Wasilewska, Laurent Vigneron. Rough Algebras & Automated Deduction. L. Polkowski & A. Skowron. Rough Sets in Knowledge Discovery, Springer Verlag, pp.261-275, 1998. <inria-00098475>

Direction d'ouvrage, Proceedings3 documents

  • Laurent Vigneron. Proceedings of the 19th International Workshop on Unification. A05-R-022 (A05-R-022), LORIA, pp.143, 2005. <inria-00000409>
  • Deepak Kapur, Laurent Vigneron. Special issue on First-Order Theorem Proving of the Journal of Automated Reasoning. Deepak Kapur and Laurent Vigneron. 33 / n°3-4, Kluwer, pp.219-383, 2004. <inria-00100031>
  • Ingo Dahn, Laurent Vigneron. 4th International Workshop on First-Order Theorem Proving- FTP'2003. 1 (1), Elsevier Science Publishers, 2003, Electronic Notes in Theoretical Computer Science. <inria-00099513>

Autre publication1 document

  • Laurent Vigneron. Un outil d'aide à la conception de protocoles cryptographiques. 2005. <inria-00000407>