Filtrer vos résultats
- 25
- 18
- 24
- 7
- 4
- 3
- 2
- 1
- 1
- 1
- 2
- 43
- 1
- 1
- 1
- 3
- 2
- 1
- 4
- 6
- 5
- 6
- 3
- 2
- 2
- 1
- 1
- 3
- 1
- 37
- 6
- 42
- 34
- 33
- 12
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 43
- 10
- 6
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
43 résultats
|
|
triés par
|
|
Automatic Methods for Analyzing Non-repudiation Protocole with an Active Intruder5th International Workshop on Formal Aspects in Security and Trust - FAST 2008, Oct 2008, Malaga, Spain. pp.192-209, ⟨10.1007/978-3-642-01465-9_13⟩
Communication dans un congrès
inria-00376450v1
|
||
4th International Workshop on First-Order Theorem Proving- FTP'2003Elsevier Science Publishers, 1 (1), 2003, Electronic Notes in Theoretical Computer Science
Ouvrages
inria-00099513v1
|
|||
Congruence Closure modulo Associativity-Commutativity3rd International Workshop on Frontiers of Combining Systems - FroCoS'2000, Mar 2000, Nancy, France, pp.242-256
Communication dans un congrès
inria-00099214v1
|
|||
Automatic Verification of Security Protocols18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 2 p
Communication dans un congrès
inria-00100032v1
|
|||
Rule-based Programs describing Internet Security Protocols5th International Workshop on Rule-Based Programming - RULE'2004, Jun 2004, Aachen, Germany, pp.83-97
Communication dans un congrès
inria-00099888v1
|
|||
|
Proceedings of the 19th International Workshop on UnificationLORIA, A05-R-022 (A05-R-022), pp.143, 2005
Ouvrages
inria-00000409v1
|
||
Rough Algebras & Automated DeductionL. Polkowski & A. Skowron. Rough Sets in Knowledge Discovery, Springer Verlag, pp.261-275, 1998
Chapitre d'ouvrage
inria-00098475v1
|
|||
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of SessionsComputer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, pp.128-141
Communication dans un congrès
inria-00099514v1
|
|||
Strategy for Flaws Detection based on a Services-driven Model for Group ProtocolsFrédéric Benhamou and Narendra Jussien and Barry O\'Sullivan. Future and Trends in Constraint Programming, ISTE, pp.361-370, 2007, 1905209975
Chapitre d'ouvrage
inria-00176326v1
|
|||
Abstract Congruence ClosureJournal of Automated Reasoning, 2003, 31 (2), pp.129-168
Article dans une revue
inria-00099511v1
|
|||
Towards Efficient Automated Verification of Security ProtocolsVerification Workshop - VERIFY'01 (in connection with IJCAR'01), Jun 2001, Siena, Italy, 15 p
Communication dans un congrès
inria-00101104v1
|
|||
|
A Constraint-based Approach to Web Services Provisioning[Research Report] RR-7413, INRIA. 2010, pp.39
Rapport
inria-00524590v1
|
||
|
Study for Automatically Analysing Non-repudiation1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes- CRiSIS 2005, Oct 2005, Bourges/France, pp.157--171
Communication dans un congrès
inria-00000607v1
|
||
UML Modeling and Formal Verification of Secure Group Communication ProtocolsSecond IEEE International workshop UML and Formal Methods - UML&FM'2009, 2009, Rio de Janeiro, Brazil
Communication dans un congrès
hal-00447668v1
|
|||
|
Tree automata with equality constraints modulo equational theoriesJournal of Logic and Algebraic Programming, 2008, 75 (2), pp.182-208. ⟨10.1016/j.jlap.2007.10.006⟩
Article dans une revue
inria-00329693v1
|
||
|
Tree automata with equality constraints modulo equational theories3d International Joint Conference on Automated Reasoning (IJCAR), Aug 2006, Seattle, United States. pp.557-571, ⟨10.1007/11814771_45⟩
Communication dans un congrès
inria-00579011v1
|
||
Rough Diagrams6th International Workshop on Rough Sets, Data Mining & Granular Computing (RSDMGrC'98) at the 4th Joint Conference on Information Sciences, 1998, Research Triangle Park, NC, 4 p
Communication dans un congrès
inria-00098493v1
|
|||
|
Rough Sets based Proofs Visualisation18th International Conference of the North American Fuzzy Information Processing Society - NAFIPS'99, invited session on Granular Computing and Rough Sets, 1999, New York, USA, pp.805-808
Communication dans un congrès
inria-00098752v1
|
||
|
AI for securing communicationsWorkshop sur l’Intelligence Artificielle et son impact dans les différentes organisations, Jul 2023, Longwy, France
Communication dans un congrès
hal-04231070v1
|
||
|
Formal Verification of Secure Group Communication Protocols Modelled in UMLInnovations in Systems and Software Engineering, 2010, Special Issue ICFEM'09, 6 (1-2), pp.125-133. ⟨10.1007/s11334-010-0122-3⟩
Article dans une revue
inria-00594387v1
|
||
The AVISS Security Protocol Analysis Tool14th International Conference on Computer Aided Verification - CAV'2002, Jul 2002, Copenhaguen, Denmark, pp.349-353
Communication dans un congrès
inria-00100915v1
|
|||
Automatically Analysing Non-repudiation with Authentication3rd Taiwanese-French Conference on Information Technology - TFIT 06, Mar 2006, Nancy/France, pp.541-554
Communication dans un congrès
inria-00105534v1
|
|||
|
Déduction automatique avec contraintes symboliques dans les théories équationnellesInformatique [cs]. Université Henri Poincaré - Nancy 1, 1994. Français. ⟨NNT : 1994NAN10371⟩
Thèse
tel-01748621v1
|
||
Sécurité des communications de groupeLa Revue de l'électricité et de l'électronique, 2006, Risques et sécurité des réseaux et des systèmes à composante logicielle, 6/7, pp.51-60
Article dans une revue
inria-00105523v1
|
|||
|
A Tool for Lazy Verification of Security Protocols[Intern report] A01-R-140 || chevalier01b, 2001, 10 p
Rapport
inria-00107545v1
|
||
Automated Unbounded Verification of Security Protocols14th International Conference on Computer Aided Verification - CAV'2002, 2002, Copenhaguen, Denmark, pp.324-337
Communication dans un congrès
inria-00100916v1
|
|||
|
A High Level Protocol Specification Language for Industrial Security-Sensitive ProtocolsWorkshop on Specification and Automated Processing of Security Requirements - SAPS'2004, 2004, Linz, Austria, 13 p
Communication dans un congrès
inria-00099882v1
|
||
Design and Verification of a Non-repudiation Protocol Based on Receiver-Side Smart CardIET Information Security, 2010, 4 (1), pp.15-29
Article dans une revue
inria-00426527v1
|
|||
Un outil d'aide à la conception de protocoles cryptographiques2005
Autre publication scientifique
inria-00000407v1
|
|||
A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols[Intern report] A04-R-067 || chevalier04b, 2004, 17 p
Rapport
inria-00100219v1
|
- 1
- 2