Filtrer vos résultats
- 37
- 30
- 33
- 17
- 12
- 3
- 1
- 1
- 13
- 2
- 67
- 1
- 1
- 2
- 2
- 1
- 1
- 3
- 2
- 1
- 2
- 7
- 2
- 5
- 3
- 5
- 4
- 3
- 3
- 7
- 6
- 5
- 2
- 63
- 4
- 52
- 47
- 44
- 43
- 4
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 67
- 36
- 10
- 7
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
67 résultats
|
Decidability of Deterministic Process Equivalence for Finitary Deduction Systems28th Euromicro International Conference on Parallel, Distributed and network-based Processing - PDP 2020, Mar 2020, Västerås, Sweden. pp.441-444, ⟨10.1109/PDP50117.2020.00074⟩
Communication dans un congrès
hal-02960354v1
|
||
|
Strategy for Verifying Security Protocols with Unbounded Message Size[Research Report] RR-4368, INRIA. 2002, pp.18
Rapport
inria-00072220v1
|
||
|
Automated Unbounded Verification of Security Protocols[Research Report] RR-4369, INRIA. 2002, pp.16
Rapport
inria-00072219v1
|
||
|
Compiling and securing cryptographic protocols[Research Report] 2009, pp.12
Rapport
inria-00426669v1
|
||
|
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version)2007
Pré-publication, Document de travail
hal-00183337v1
|
||
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in ExponentsFST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Dec 2003, Mumbai, India, pp.124-135
Communication dans un congrès
inria-00103935v1
|
|||
|
Intruder deducibility constraints with negation. Decidability and application to secured service compositions.[Research Report] RR-8017, INRIA. 2012
Rapport
hal-00719011v1
|
||
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of SessionsComputer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, pp.128-141
Communication dans un congrès
inria-00099514v1
|
|||
|
Self-Correcting Unsound Reasoning Agents (DARe 2017)4th International Workshop on Defeasible and Ampliative Reasoning (DARe 2017), Jul 2017, Espoo, Finland. pp.16-28
Communication dans un congrès
hal-03128332v1
|
||
|
Éléments d'état de l'art sur l'extraction et la modélisation de règles formelles à partir de textes légaux34es Journées francophones d'Ingénierie des Connaissances (IC 2023) @ PFIA 2023, Collège SIC (Science de l'Ingénierie des Connaissances) de l'AFIA, Jul 2023, Strasbourg, France. pp.79-84
Communication dans un congrès
hal-04153047v1
|
||
A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols[Intern report] A04-R-067 || chevalier04b, 2004, 17 p
Rapport
inria-00100219v1
|
|||
|
Guarded Variable Automata over Infinite Alphabets2013
Pré-publication, Document de travail
hal-00914779v1
|
||
|
Hierarchical combination of intruder theoriesInformation and Computation, 2008, 206 (2-4), pp.352-377. ⟨10.1016/j.ic.2007.07.004⟩
Article dans une revue
inria-00329715v1
|
||
|
A logical approach to dynamic role-based access control in a distributed environment13th International Conference on Artificial Intelligence: Methodology, Systems, Applications (AIMSA 2008), Jan 2008, Varna, Bulgaria. pp.194--208, ⟨10.1007/978-3-540-85776-1_17⟩
Communication dans un congrès
hal-04000448v1
|
||
Middleware et Services : Internet Services Integration[Contract] IRIT. 2006
Rapport
hal-04002025v1
|
|||
|
Implementing Security Protocol MonitorsSCSS 2021 - 9th International Symposium on Symbolic Computation in Software Science, Sep 2021, Linz/virtual, Austria. pp.22-34, ⟨10.4204/EPTCS.342.3⟩
Communication dans un congrès
hal-03463789v1
|
||
Deciding the Security of Protocols with Commuting Public Key Encryption.Workshop on Automated Reasoning for Security Protocol Analysis - ARSPA'2004, Jul 2004, Cork, Ireland. 11 p
Communication dans un congrès
inria-00100013v1
|
|||
Approche logique pour les contraintes de contrôle d’accès dans les services WebAtelier sur les droits d’accès à des Services et des Données définis dans un Environnement Collaboratif (SDEC 2009), conjoint à INFORSID 2009, May 2009, Toulouse, France
Communication dans un congrès
hal-03997680v1
|
|||
|
A Simple Constraint-solving Decision Procedure for Protocols with Exclusive or[Research Report] RR-5224, INRIA. 2004, pp.35
Rapport
inria-00070771v1
|
||
|
Compiling and securing cryptographic protocolsInformation Processing Letters, 2010, 110 (3), pp.116-122. ⟨10.1016/j.ipl.2009.11.004⟩
Article dans une revue
inria-00527633v1
|
||
|
Finitary Deduction Systems[Research Report] IRIT - Institut de recherche en informatique de Toulouse. 2011
Rapport
hal-00585559v2
|
||
|
The AVISPA Tool for the automated validation of internet security protocols and applications17th International Conference on Computer Aided Verification - CAV 2005, Jul 2005, Edinburgh, Scotland/UK, France. pp.281-285
Communication dans un congrès
inria-00000408v1
|
||
Satisfiability of General Intruder Constraints with a Set ConstructorThe Fifth International Conference on Risks and Security of Internet and Systems - CRiSIS 2010, Oct 2010, Montreal, Canada
Communication dans un congrès
inria-00531025v1
|
|||
|
Toward an Automatic Analysis of Web Service Security[Research Report] RR-6341, INRIA. 2007, pp.40
Rapport
inria-00133996v2
|
||
Strategy for Verifying Security Protocols with Unbounded Message SizeAutomated Software Engineering, 2004, 11 (2), pp.141-166. ⟨10.1023/B:AUSE.0000017741.10347.9b⟩
Article dans une revue
istex
inria-00099945v1
|
|||
|
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systemsJournal of Network and Computer Applications (JNCA), 2014, 39, pp.152 - 166. ⟨10.1016/j.jnca.2013.06.002⟩
Article dans une revue
hal-00845810v1
|
||
|
Automated Synthesis of a Finite Complexity Ordering for Saturation[Research Report] IRIT - Institut de recherche en informatique de Toulouse; LORIA (Université de Lorraine, CNRS, INRIA). 2012
Rapport
hal-00675954v2
|
||
|
An NP Decision Procedure for Protocol Insecurity with XORTheoretical Computer Science, 2005, Theoretical Computer Science, 338 (1-3), pp.247-274. ⟨10.1016/j.tcs.2005.01.015⟩
Article dans une revue
inria-00103807v1
|
||
The AVISS Security Protocol Analysis Tool14th International Conference on Computer Aided Verification - CAV'2002, Jul 2002, Copenhaguen, Denmark, pp.349-353
Communication dans un congrès
inria-00100915v1
|
|||
|
Orchestration under Security ConstraintsFormal Methods for Components and Objects (FMCO 2010), Nov 2010, Graz, Austria
Communication dans un congrès
hal-00642855v1
|