Filtrer vos résultats
- 106
- 88
- 109
- 40
- 33
- 3
- 3
- 3
- 2
- 1
- 37
- 193
- 20
- 3
- 3
- 7
- 5
- 2
- 4
- 8
- 5
- 7
- 8
- 11
- 4
- 10
- 13
- 11
- 6
- 5
- 7
- 13
- 12
- 4
- 15
- 4
- 8
- 7
- 2
- 1
- 1
- 3
- 1
- 2
- 2
- 191
- 3
- 185
- 143
- 113
- 56
- 24
- 20
- 9
- 7
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 194
- 36
- 17
- 16
- 14
- 14
- 10
- 10
- 9
- 9
- 9
- 8
- 8
- 8
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
194 résultats
Optimistic access control for distributed collaborative editors2011 ACM Symposium on Applied Computing (SAC), Mar 2011, Taichung, Taiwan. pp.861-868, ⟨10.1145/1982185.1982374⟩
Communication dans un congrès
inria-00576880v1
|
|||
A Parametrized Propositional Dynamic Logic with Application to Service SynthesisAdvances in Modal Logic, Aug 2014, Groningen, Netherlands. pp.34-53
Communication dans un congrès
hal-01087829v1
|
|||
The theory of total unary RPO is decidableFirst International Conference on Computational Logic - Cl'2000, 2000, Londres, UK, pp.660-672
Communication dans un congrès
inria-00099166v1
|
|||
|
Gender Inference for Facebook Picture OwnersTrustBus 2019 - 16th International Conference on Trust, Privacy and Security in Digital Business, Aug 2019, Linz, Austria. pp.145--160, ⟨10.1007/978-3-030-27813-7_10⟩
Communication dans un congrès
hal-02271825v1
|
||
RPO constraint solving is in NP[Intern report] 98-R-023 || narendran98a, 1998, 12 p
Rapport
inria-00098428v1
|
|||
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded ListsComputer Security Foundations Symposium, Jul 2009, Port Jefferson, United States. pp.277-289
Communication dans un congrès
inria-00426919v1
|
|||
|
Compiling symbolic attacks to protocol implementation testsFourth International Symposium on Symbolic Computation in Software Science, Adel Bouhoula and Tetsuo Ida and Fairouz Kamareddine, Dec 2012, Tunis, Tunisia. ⟨10.4204/EPTCS.122.4⟩
Communication dans un congrès
hal-00915320v1
|
||
|
Safe and Efficient Strategies for Updating Firewall Policies[Research Report] RR-6940, INRIA. 2009, pp.19
Rapport
inria-00381778v2
|
||
|
Analyse d'activité et exposition de la vie privée sur les médias sociaux16ème conférence francophone sur l'Extraction et la Gestion des Connaissances (EGC 2016), Jan 2016, Reims, France. 2016
Poster de conférence
hal-01241619v1
|
||
|
Computing Approximations of Linear Transition Systems[Research Report] RR-4774, INRIA. 2003, pp.20
Rapport
inria-00071812v1
|
||
Efficient Decision Tree for Protocol Analysis in Intrusion DetectionInternational Journal of Security and Networks, 2010, 5 (4), pp.220-235. ⟨10.1504/IJSN.2010.037661⟩
Article dans une revue
inria-00528201v1
|
|||
|
Rewrite Closure and CF Hedge Automata7th International Conference on Language and Automata Theory and Application, Apr 2013, Bilbao, Spain
Communication dans un congrès
hal-00767719v1
|
||
|
Constraints-based Verification of Parameterized Cryptographic Protocols.[Research Report] RR-6712, INRIA. 2008, pp.54
Rapport
inria-00336539v1
|
||
|
FOX: Fooling with Explanations Privacy Protection with Adversarial Reactions in Social MediaPST 2021 - 18th Annual International Conference on Privacy, Security and Trust, Dec 2021, Auckland/Virtual, New Zealand
Communication dans un congrès
hal-03480304v1
|
||
Deductive Verification of Distributed Groupware SystemsTenth International Conference on Algebraic Methodology and Software Technology - AMAST 2004, 2004, Stirling, Scotland, United Kingdom, pp.226-240
Communication dans un congrès
inria-00099986v1
|
|||
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in ExponentsFST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Dec 2003, Mumbai, India, pp.124-135
Communication dans un congrès
inria-00103935v1
|
|||
|
Intruder deducibility constraints with negation. Decidability and application to secured service compositions.[Research Report] RR-8017, INRIA. 2012
Rapport
hal-00719011v1
|
||
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of SessionsComputer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, pp.128-141
Communication dans un congrès
inria-00099514v1
|
|||
|
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.338-356, ⟨10.1007/978-3-030-81242-3_20⟩
Communication dans un congrès
hal-03463902v1
|
||
ACID-Unification is NEXPTIME-Decidable2003, pp.169--178
Communication dans un congrès
hal-00080663v1
|
|||
|
Network Structure Release under Differential PrivacyTransactions on Data Privacy, 2016, 9 (3), pp.26. ⟨10.5555/3121413.3121415⟩
Article dans une revue
hal-01424911v1
|
||
Automated Verification of Security Protocols and ServicesThird International Seminar on Program Verification, Automated Debugging and Symbolic Computation, Tudor Jebelean; Wei Li ; Dongming Wang, Jul 2014, Vienna, Austria
Communication dans un congrès
hal-01090000v1
|
|||
|
Data Structures with Arithmetic Constraints: a Non-Disjoint Combination[Research Report] RR-6963, INRIA. 2009, pp.23
Rapport
inria-00397080v1
|
||
Protocol Analysis in Intrusion Detection Using Decision TreeInternational Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408
Communication dans un congrès
inria-00100006v1
|
|||
|
Rewrite based Verification of XML Updates[Research Report] RR-7007, INRIA. 2009, pp.39
Rapport
inria-00408162v1
|
||
XML Access Control: from XACML to Annotated SchemasSecond International Conference on Communications and Networking (ComNet), Nov 2010, Tozeur, Tunisia. pp.1-8, ⟨10.1109/COMNET.2010.5699810⟩
Communication dans un congrès
inria-00578884v1
|
|||
|
Observational proofs by rewritingTheoretical Computer Science, 2002, 275 (1-2), pp.675-698. ⟨10.1016/S0304-3975(01)00333-4⟩
Article dans une revue
inria-00100714v1
|
||
Journal of Automata, Languages and Combinatorics, Vol. 11(1)Otto-von-Guericke-Universität, D-39016 Magdeburg, pp.142, 2006
Ouvrages
hal-00468802v1
|
|||
|
Mechanical Verification of a Generic Incremental ABR Conformance Algorithm[Research Report] RR-3794, INRIA. 1999, pp.43
Rapport
inria-00072865v1
|
||
|
Uniform Derivation of Decision Procedures by Superposition[Research Report] RR-4151, INRIA. 2001, pp.13
Rapport
inria-00072474v1
|