Filtrer vos résultats
- 106
- 88
- 109
- 40
- 33
- 3
- 3
- 3
- 2
- 1
- 37
- 193
- 20
- 3
- 3
- 7
- 5
- 2
- 4
- 8
- 5
- 7
- 8
- 11
- 4
- 10
- 13
- 11
- 6
- 5
- 7
- 13
- 12
- 4
- 15
- 4
- 8
- 7
- 2
- 1
- 1
- 3
- 1
- 2
- 2
- 191
- 3
- 185
- 143
- 113
- 56
- 24
- 20
- 9
- 7
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 194
- 36
- 17
- 16
- 14
- 14
- 10
- 10
- 9
- 9
- 9
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
194 résultats
Optimistic access control for distributed collaborative editors2011 ACM Symposium on Applied Computing (SAC), Mar 2011, Taichung, Taiwan. pp.861-868, ⟨10.1145/1982185.1982374⟩
Communication dans un congrès
inria-00576880v1
|
|||
A Parametrized Propositional Dynamic Logic with Application to Service SynthesisAdvances in Modal Logic, Aug 2014, Groningen, Netherlands. pp.34-53
Communication dans un congrès
hal-01087829v1
|
|||
The theory of total unary RPO is decidableFirst International Conference on Computational Logic - Cl'2000, 2000, Londres, UK, pp.660-672
Communication dans un congrès
inria-00099166v1
|
|||
|
Gender Inference for Facebook Picture OwnersTrustBus 2019 - 16th International Conference on Trust, Privacy and Security in Digital Business, Aug 2019, Linz, Austria. pp.145--160, ⟨10.1007/978-3-030-27813-7_10⟩
Communication dans un congrès
hal-02271825v1
|
||
RPO constraint solving is in NP[Intern report] 98-R-023 || narendran98a, 1998, 12 p
Rapport
inria-00098428v1
|
|||
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded ListsComputer Security Foundations Symposium, Jul 2009, Port Jefferson, United States. pp.277-289
Communication dans un congrès
inria-00426919v1
|
|||
|
Compiling symbolic attacks to protocol implementation testsFourth International Symposium on Symbolic Computation in Software Science, Adel Bouhoula and Tetsuo Ida and Fairouz Kamareddine, Dec 2012, Tunis, Tunisia. ⟨10.4204/EPTCS.122.4⟩
Communication dans un congrès
hal-00915320v1
|
||
|
Safe and Efficient Strategies for Updating Firewall Policies[Research Report] RR-6940, INRIA. 2009, pp.19
Rapport
inria-00381778v2
|
||
|
Analyse d'activité et exposition de la vie privée sur les médias sociaux16ème conférence francophone sur l'Extraction et la Gestion des Connaissances (EGC 2016), Jan 2016, Reims, France. 2016
Poster de conférence
hal-01241619v1
|
||
|
Computing Approximations of Linear Transition Systems[Research Report] RR-4774, INRIA. 2003, pp.20
Rapport
inria-00071812v1
|
||
Efficient Decision Tree for Protocol Analysis in Intrusion DetectionInternational Journal of Security and Networks, 2010, 5 (4), pp.220-235. ⟨10.1504/IJSN.2010.037661⟩
Article dans une revue
inria-00528201v1
|
|||
|
Rewrite Closure and CF Hedge Automata7th International Conference on Language and Automata Theory and Application, Apr 2013, Bilbao, Spain
Communication dans un congrès
hal-00767719v1
|
||
|
Constraints-based Verification of Parameterized Cryptographic Protocols.[Research Report] RR-6712, INRIA. 2008, pp.54
Rapport
inria-00336539v1
|
||
|
FOX: Fooling with Explanations Privacy Protection with Adversarial Reactions in Social MediaPST 2021 - 18th Annual International Conference on Privacy, Security and Trust, Dec 2021, Auckland/Virtual, New Zealand
Communication dans un congrès
hal-03480304v1
|
||
Deductive Verification of Distributed Groupware SystemsTenth International Conference on Algebraic Methodology and Software Technology - AMAST 2004, 2004, Stirling, Scotland, United Kingdom, pp.226-240
Communication dans un congrès
inria-00099986v1
|
|||
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in ExponentsFST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Dec 2003, Mumbai, India, pp.124-135
Communication dans un congrès
inria-00103935v1
|
|||
|
Intruder deducibility constraints with negation. Decidability and application to secured service compositions.[Research Report] RR-8017, INRIA. 2012
Rapport
hal-00719011v1
|
||
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of SessionsComputer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, pp.128-141
Communication dans un congrès
inria-00099514v1
|
|||
|
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.338-356, ⟨10.1007/978-3-030-81242-3_20⟩
Communication dans un congrès
hal-03463902v1
|
||
|
One-variable context-free hedge automataJournal of Computer and System Sciences, 2016, ⟨10.1016/j.jcss.2016.10.006⟩
Article dans une revue
hal-01426626v1
|
||
|
Filtrage Efficace Pour la Détection d'IntrusionsConférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p
Communication dans un congrès
inria-00099496v1
|
||
|
Relating two standard notions of secrecyLogical Methods in Computer Science, 2007, 3 (3, paper 2), pp.1-29. ⟨10.2168/LMCS-3(3:2)2007⟩
Article dans une revue
inria-00178352v1
|
||
|
Towards Synchronizing Linear Collaborative Objects with Operation TransformationInternational Conference on Formal Techniques for Networked and Distributed Systems - FORTE 2005, Oct 2005, Taipei/Taiwan, pp.411-427
Communication dans un congrès
inria-00000427v1
|
||
Relating two standard notions of secrecyProc. of the 20th Int. Conference Computer Science Logic (CSL'06), Sep 2006, Szeged, Hungary
Communication dans un congrès
inria-00108391v1
|
|||
Combining Satisfiability Procedures for Unions of Theories with a Shared Counting OperatorFundamenta Informaticae, 2010, 105 (1-2), pp.163--187. ⟨10.3233/FI-2010-362⟩
Article dans une revue
inria-00526683v1
|
|||
Automated verification of security protocols and application to servicesVerification and Evaluation of Computer and Communication Systems, Alessandro Fantechi, University of Florence, Italy, Nov 2013, Florence, Italy
Communication dans un congrès
hal-00915323v1
|
|||
|
Web Services Verification and Prudent Implementation4th SETOP International Workshop on Autonomous and Spontaneous Security, Sep 2011, Leuven, Belgium
Communication dans un congrès
hal-00641326v1
|
||
Automatic Composition of Services with Security PoliciesWeb Service Composition and Adaptation Workshop (held in conjunction with SCC/SERVICES-2008), Jul 2008, Honolulu, United States. pp.529-537, ⟨10.1109/SERVICES-1.2008.13⟩
Communication dans un congrès
inria-00330338v1
|
|||
|
On word problems in equational theories[Research Report] RR-0678, INRIA. 1987, pp.20
Rapport
inria-00075875v1
|
||
Unification modulo Block Chaining[Research Report] 2011
Rapport
inria-00618376v1
|