2008 |
22 | EE | Philippe Balbiani,
Yannick Chevalier,
Marwa El Houri:
A Logical Approach to Dynamic Role-Based Access Control.
AIMSA 2008: 194-208 |
21 | EE | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani:
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption.
ACM Trans. Comput. Log. 9(4): (2008) |
20 | EE | Yannick Chevalier,
Michaël Rusinowitch:
Hierarchical combination of intruder theories.
Inf. Comput. 206(2-4): 352-377 (2008) |
2007 |
19 | EE | Yannick Chevalier,
Mounira Kourjieh:
Key Substitution in the Symbolic Analysis of Cryptographic Protocols.
FSTTCS 2007: 121-132 |
18 | EE | Yannick Chevalier,
Denis Lugiez,
Michaël Rusinowitch:
Towards an Automatic Analysis of Web Service Security.
FroCos 2007: 133-147 |
17 | EE | Yannick Chevalier,
Denis Lugiez,
Michaël Rusinowitch:
Verifying Cryptographic Protocols with Subterms Constraints.
LPAR 2007: 181-195 |
16 | EE | Yannick Chevalier,
Mounira Kourjieh:
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version)
CoRR abs/0710.5674: (2007) |
2006 |
15 | EE | Yannick Chevalier,
Mounira Kourjieh:
A Symbolic Intruder Model for Hash-Collision Attacks.
ASIAN 2006: 13-27 |
14 | EE | Yannick Chevalier,
Michaël Rusinowitch:
Hierarchical Combination of Intruder Theories.
RTA 2006: 108-122 |
13 | EE | Yannick Chevalier,
Mounira Kourjieh:
A Symbolic Intruder Model for Hash-Collision Attacks
CoRR abs/cs/0611142: (2006) |
2005 |
12 | EE | Alessandro Armando,
David A. Basin,
Yohan Boichut,
Yannick Chevalier,
Luca Compagna,
Jorge Cuéllar,
Paul Hankes Drielsma,
Pierre-Cyrille Héam,
Olga Kouchnarenko,
Jacopo Mantovani,
Sebastian Mödersheim,
David von Oheimb,
Michaël Rusinowitch,
Judson Santiago,
Mathieu Turuani,
Luca Viganò,
Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
CAV 2005: 281-285 |
11 | EE | Yannick Chevalier,
Michaël Rusinowitch:
Combining Intruder Theories.
ICALP 2005: 639-651 |
10 | EE | Yannick Chevalier,
Laurent Vigneron:
Rule-based Programs Describing Internet Security Protocols.
Electr. Notes Theor. Comput. Sci. 124(1): 113-132 (2005) |
9 | EE | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani:
Deciding the Security of Protocols with Commuting Public Key Encryption.
Electr. Notes Theor. Comput. Sci. 125(1): 55-66 (2005) |
8 | EE | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani:
An NP decision procedure for protocol insecurity with XOR.
Theor. Comput. Sci. 338(1-3): 247-274 (2005) |
2004 |
7 | EE | Yannick Chevalier,
Laurent Vigneron:
Strategy for Verifying Security Protocols with Unbounded Message Size.
Autom. Softw. Eng. 11(2): 141-166 (2004) |
2003 |
6 | EE | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani,
Laurent Vigneron:
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions.
CSL 2003: 128-141 |
5 | EE | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani:
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents.
FSTTCS 2003: 124-135 |
4 | EE | Yannick Chevalier,
Ralf Küsters,
Michaël Rusinowitch,
Mathieu Turuani:
An NP Decision Procedure for Protocol Insecurity with XOR.
LICS 2003: 261-270 |
2002 |
3 | EE | Yannick Chevalier,
Laurent Vigneron:
Automated Unbounded Verification of Security Protocols.
CAV 2002: 324-337 |
2 | EE | Alessandro Armando,
David A. Basin,
Mehdi Bouallagui,
Yannick Chevalier,
Luca Compagna,
Sebastian Mödersheim,
Michaël Rusinowitch,
Mathieu Turuani,
Luca Viganò,
Laurent Vigneron:
The AVISS Security Protocol Analysis Tool.
CAV 2002: 349-353 |
2001 |
1 | EE | Yannick Chevalier,
Laurent Vigneron:
A Tool for Lazy Verification of Security Protocols.
ASE 2001: 373-376 |