Filtrer vos résultats
- 29
- 4
- 18
- 7
- 6
- 1
- 1
- 4
- 3
- 33
- 5
- 5
- 4
- 1
- 5
- 4
- 2
- 3
- 3
- 1
- 33
- 28
- 28
- 10
- 6
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 33
- 15
- 8
- 7
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
33 résultats
|
|
triés par
|
|
Exploiting Symmetries When Proving Equivalence Properties for Security ProtocolsCCS'19 - 26th ACM Conference on Computer and Communications Security, Nov 2019, London, United Kingdom
Communication dans un congrès
hal-02269043v1
|
||
|
Automatic verification of transparency protocols2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), Jul 2023, Delft, Netherlands. ⟨10.1109/EuroSP57164.2023.00016⟩
Communication dans un congrès
hal-04219234v1
|
||
|
DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice[Research Report] INRIA Nancy. 2018
Rapport
hal-01698177v1
|
||
|
A procedure for deciding symbolic equivalence between sets of constraint systemsInformation and Computation, 2017, 255, pp.94 - 125. ⟨10.1016/j.ic.2017.05.004⟩
Article dans une revue
hal-01584242v1
|
||
|
Secure Composition of PKIs with Public Key Protocols CSF'17 - 30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. pp.144 - 158, ⟨10.1109/CSF.2017.28⟩
Communication dans un congrès
hal-01625766v1
|
||
|
Deciding equivalence-based properties using constraint solvingTheoretical Computer Science, 2013, 492, pp.1-39. ⟨10.1016/j.tcs.2013.04.016⟩
Article dans une revue
hal-00881060v1
|
||
Timing attacks in security protocols: symbolic framework and proof techniques4th Conference on Principles of Security and Trust (POST 2015), Apr 2015, Londres, United Kingdom
Communication dans un congrès
hal-01103618v1
|
|||
|
Election Verifiability with ProVerifCSF 2023 - 36th IEEE Computer Security Foundations Symposium, Jul 2023, Dubrovnik, Croatia. ⟨10.1109/CSF57540.2023.00032⟩
Communication dans un congrès
hal-04177268v2
|
||
|
DTKI: A New Formalized PKI with Verifiable Trusted PartiesThe Computer Journal, 2016, 59, pp.1695-1713. ⟨10.1093/comjnl/bxw039⟩
Article dans une revue
hal-01403899v1
|
||
|
Lengths may break privacy -- or how to check for equivalences with lengthCAV'13 - 25th International Conference on Computer Aided Verification - 2013, Jul 2013, Saint Petersbourg, Russia. pp.708-723, ⟨10.1007/978-3-642-39799-8_50⟩
Communication dans un congrès
hal-00881065v1
|
||
|
The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols (technical report)[Technical Report] Inria Nancy Grand-Est. 2020
Rapport
hal-02501577v4
|
||
|
The DEEPSEC prover CAV 2018 - 30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom
Communication dans un congrès
hal-01763138v1
|
||
|
Symbolic protocol verification with dice: process equivalences in the presence of probabilities (extended version)2023
Pré-publication, Document de travail
hal-03683907v2
|
||
|
Symbolic protocol verification with dice: process equivalences in the presence of probabilitiesCSF'22 - 35th IEEE Computer Security Foundations Symposium, Aug 2022, Haifa, Israel
Communication dans un congrès
hal-03700492v1
|
||
|
Automated verification of equivalence properties of cryptographic protocolsACM Transactions on Computational Logic, 2016, 17 (4), ⟨10.1145/2926715⟩
Article dans une revue
hal-01306561v1
|
||
|
A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerifCSF'2018 - 31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom
Communication dans un congrès
hal-01900088v1
|
||
|
Exploiting symmetries when proving equivalence properties for security protocols (Technical report)[Technical Report] INRIA Nancy Grand-Est. 2020
Rapport
hal-02267866v3
|
||
|
On the semantics of communications when verifying equivalence propertiesJournal of Computer Security, 2020, 28 (1), pp.71-127. ⟨10.3233/JCS-191366⟩
Article dans une revue
hal-02446910v1
|
||
|
Handshake Privacy for TLS 1.3 - Technical report[Research Report] Inria Paris; Cloudflare. 2022
Rapport
hal-03594482v1
|
||
|
ProVerif with Lemmas, Induction, Fast Subsumption, and Much MoreS&P 2022 - 43rd IEEE Symposium on Security and Privacy, May 2022, San Francisco, United States
Communication dans un congrès
hal-03366962v1
|
||
|
A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif[Research Report] Inria Nancy - Grand Est; LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy. 2018
Rapport
hal-01774803v2
|
||
|
On communication models when verifying equivalence properties (extended version)6th International Conference on Principles of Security and Trust (POST), 2017, Uppsala, Sweden
Communication dans un congrès
hal-01438639v1
|
||
|
Sapic+ : protocol verifiers of the world, unite!USENIX 2022 - 31st USENIX Security Symposium, Aug 2022, Boston, United States
Communication dans un congrès
hal-03693843v3
|
||
|
Proving More Observational Equivalences with ProVerifPOST 2013 - 2nd Conference on Principles of Security and Trust, Mar 2013, Rome, Italy. pp.226-246, ⟨10.1007/978-3-642-36830-1_12⟩
Communication dans un congrès
hal-00863377v1
|
||
|
DEEPSEC: Deciding Equivalence Properties in Security Protocols - Theory and Practice39th IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States
Communication dans un congrès
hal-01763122v1
|
||
|
Secure refinements of communication channelsFSTTCS 2015, Dec 2015, Bangalore, India
Communication dans un congrès
hal-01238094v1
|
||
|
Secure refinements of communication channels[Research Report] RR-8790, LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy. 2015, pp.50
Rapport
hal-01215265v2
|
||
|
Indistinguishability Beyond Diff-Equivalence in ProVerif2023 IEEE 36th Computer Security Foundations Symposium (CSF), Jul 2023, Dubrovnik, Croatia. pp.184-199, ⟨10.1109/CSF57540.2023.00036⟩
Communication dans un congrès
hal-04219230v1
|
||
|
The hitchhiker's guide to decidability and complexity of equivalence properties in security protocolsNigam, V., Ban Kirigin, T., Talcott, C., Guttman, J., Kuznetsov, S., Thau Loo, B., Okada, M. Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, LNCS-12300, Springer, 2020, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-62077-6_10⟩
Chapitre d'ouvrage
hal-02961617v1
|
||
|
On communication models when verifying equivalence properties6th International Conference on Principles of Security and Trust (POST), Apr 2017, Uppsala, Sweden
Communication dans un congrès
hal-01450898v1
|
- 1
- 2