Filtrer vos résultats
- 37
- 30
- 33
- 17
- 12
- 3
- 1
- 1
- 13
- 2
- 67
- 1
- 1
- 2
- 2
- 1
- 1
- 3
- 2
- 1
- 2
- 7
- 2
- 5
- 3
- 5
- 4
- 3
- 3
- 7
- 6
- 5
- 2
- 63
- 4
- 52
- 47
- 44
- 43
- 4
- 3
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 67
- 36
- 10
- 7
- 6
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
67 résultats
|
Decidability of Deterministic Process Equivalence for Finitary Deduction Systems28th Euromicro International Conference on Parallel, Distributed and network-based Processing - PDP 2020, Mar 2020, Västerås, Sweden. pp.441-444, ⟨10.1109/PDP50117.2020.00074⟩
Communication dans un congrès
hal-02960354v1
|
||
|
Strategy for Verifying Security Protocols with Unbounded Message Size[Research Report] RR-4368, INRIA. 2002, pp.18
Rapport
inria-00072220v1
|
||
|
Automated Unbounded Verification of Security Protocols[Research Report] RR-4369, INRIA. 2002, pp.16
Rapport
inria-00072219v1
|
||
|
Compiling and securing cryptographic protocols[Research Report] 2009, pp.12
Rapport
inria-00426669v1
|
||
|
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version)2007
Pré-publication, Document de travail
hal-00183337v1
|
||
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in ExponentsFST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Dec 2003, Mumbai, India, pp.124-135
Communication dans un congrès
inria-00103935v1
|
|||
|
Intruder deducibility constraints with negation. Decidability and application to secured service compositions.[Research Report] RR-8017, INRIA. 2012
Rapport
hal-00719011v1
|
||
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of SessionsComputer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, pp.128-141
Communication dans un congrès
inria-00099514v1
|
|||
|
Self-Correcting Unsound Reasoning Agents (DARe 2017)4th International Workshop on Defeasible and Ampliative Reasoning (DARe 2017), Jul 2017, Espoo, Finland. pp.16-28
Communication dans un congrès
hal-03128332v1
|
||
|
Éléments d'état de l'art sur l'extraction et la modélisation de règles formelles à partir de textes légaux34es Journées francophones d'Ingénierie des Connaissances (IC 2023) @ PFIA 2023, Collège SIC (Science de l'Ingénierie des Connaissances) de l'AFIA, Jul 2023, Strasbourg, France. pp.79-84
Communication dans un congrès
hal-04153047v1
|
||
A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols[Intern report] A04-R-067 || chevalier04b, 2004, 17 p
Rapport
inria-00100219v1
|
|||
|
Guarded Variable Automata over Infinite Alphabets2013
Pré-publication, Document de travail
hal-00914779v1
|
||
|
Hierarchical combination of intruder theoriesInformation and Computation, 2008, 206 (2-4), pp.352-377. ⟨10.1016/j.ic.2007.07.004⟩
Article dans une revue
inria-00329715v1
|
||
|
A logical approach to dynamic role-based access control in a distributed environment13th International Conference on Artificial Intelligence: Methodology, Systems, Applications (AIMSA 2008), Jan 2008, Varna, Bulgaria. pp.194--208, ⟨10.1007/978-3-540-85776-1_17⟩
Communication dans un congrès
hal-04000448v1
|
||
|
Implementing Security Protocol MonitorsSCSS 2021 - 9th International Symposium on Symbolic Computation in Software Science, Sep 2021, Linz/virtual, Austria. pp.22-34, ⟨10.4204/EPTCS.342.3⟩
Communication dans un congrès
hal-03463789v1
|
||
Deciding the Security of Protocols with Commuting Public Key Encryption.Workshop on Automated Reasoning for Security Protocol Analysis - ARSPA'2004, Jul 2004, Cork, Ireland. 11 p
Communication dans un congrès
inria-00100013v1
|
|||
Middleware et Services : Internet Services Integration[Contract] IRIT. 2006
Rapport
hal-04002025v1
|
|||
Approche logique pour les contraintes de contrôle d’accès dans les services WebAtelier sur les droits d’accès à des Services et des Données définis dans un Environnement Collaboratif (SDEC 2009), conjoint à INFORSID 2009, May 2009, Toulouse, France
Communication dans un congrès
hal-03997680v1
|
|||
|
A Simple Constraint-solving Decision Procedure for Protocols with Exclusive or[Research Report] RR-5224, INRIA. 2004, pp.35
Rapport
inria-00070771v1
|
||
|
Compiling and securing cryptographic protocolsInformation Processing Letters, 2010, 110 (3), pp.116-122. ⟨10.1016/j.ipl.2009.11.004⟩
Article dans une revue
inria-00527633v1
|
||
|
Finitary Deduction Systems[Research Report] IRIT - Institut de recherche en informatique de Toulouse. 2011
Rapport
hal-00585559v2
|
||
|
The AVISPA Tool for the automated validation of internet security protocols and applications17th International Conference on Computer Aided Verification - CAV 2005, Jul 2005, Edinburgh, Scotland/UK, France. pp.281-285
Communication dans un congrès
inria-00000408v1
|
||
Satisfiability of General Intruder Constraints with a Set ConstructorThe Fifth International Conference on Risks and Security of Internet and Systems - CRiSIS 2010, Oct 2010, Montreal, Canada
Communication dans un congrès
inria-00531025v1
|
|||
|
Toward an Automatic Analysis of Web Service Security[Research Report] RR-6341, INRIA. 2007, pp.40
Rapport
inria-00133996v2
|
||
Strategy for Verifying Security Protocols with Unbounded Message SizeAutomated Software Engineering, 2004, 11 (2), pp.141-166. ⟨10.1023/B:AUSE.0000017741.10347.9b⟩
Article dans une revue
istex
inria-00099945v1
|
|||
|
Expressive Equivalence and Succinctness of Parametrized Automata with respect to Finite Memory AutomataFOR-MOVES 2015: FORmal MOdeling and VErification of Service-based systems, Nov 2015, Goa, India
Communication dans un congrès
hal-01224144v1
|
||
Towards Efficient Automated Verification of Security ProtocolsVerification Workshop - VERIFY'01 (in connection with IJCAR'01), Jun 2001, Siena, Italy, 15 p
Communication dans un congrès
inria-00101104v1
|
|||
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryptionACM Transactions on Computational Logic, 2008, 9 (4), pp.Article 24. ⟨10.1145/1380572.1380573⟩
Article dans une revue
inria-00329740v1
|
|||
|
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions[Research Report] RR-4869, INRIA. 2003, pp.22
Rapport
inria-00071714v1
|
||
|
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented ArchitecturesTools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, TACAS 2012, Mar 2012, Tallinn, Estonia. pp.267-282, ⟨10.1007/978-3-642-28756-5_19⟩
Communication dans un congrès
hal-00759725v1
|