dblp.uni-trier.dewww.uni-trier.de

Véronique Cortier

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
38EEVéronique Cortier: Verification of Security Protocols. VMCAI 2009: 5-13
37EEVéronique Cortier, Stéphanie Delaune: Safely composing security protocols. Formal Methods in System Design 34(1): 1-36 (2009)
36EEMathieu Baudet, Véronique Cortier, Steve Kremer: Computationally sound implementations of equational theories against passive adversaries. Inf. Comput. 207(4): 496-520 (2009)
2008
35EEHubert Comon-Lundh, Véronique Cortier: Computational soundness of observational equivalence. ACM Conference on Computer and Communications Security 2008: 109-118
2007
34EEVéronique Cortier, Stéphanie Delaune, Graham Steel: A Formal Theory of Key Conjuring. CSF 2007: 79-96
33EEVéronique Cortier, Bogdan Warinschi, Eugen Zalinescu: Synthesizing Secure Protocols. ESORICS 2007: 406-421
32EEVéronique Cortier, Ralf Küsters, Bogdan Warinschi: A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols. ESORICS 2007: 422-437
31EEVéronique Cortier, Jérémie Delaitre, Stéphanie Delaune: Safely Composing Security Protocols. FSTTCS 2007: 352-363
30EEMathilde Arnaud, Véronique Cortier, Stéphanie Delaune: Combining Algorithms for Deciding Knowledge in Security Protocols. FroCos 2007: 103-117
29EEVéronique Cortier, Stéphanie Delaune: Deciding Knowledge in Security Protocols for Monoidal Equational Theories. LPAR 2007: 196-210
28EEVéronique Cortier, Gavin Keighren, Graham Steel: Automatic Analysis of the Security of XOR-Based Key Management Schemes. TACAS 2007: 538-552
27EEVéronique Cortier, Michaël Rusinowitch, Eugen Zalinescu: Relating two standard notions of secrecy CoRR abs/0706.0502: (2007)
26EEHubert Comon-Lundh, Véronique Cortier, Eugen Zalinescu: Deciding security properties for cryptographic protocols. Application to key cycles CoRR abs/0708.3564: (2007)
25EEVéronique Cortier, Heinrich Hördegen, Bogdan Warinschi: Explicit Randomness is not Necessary when Modeling Probabilistic Encryption. Electr. Notes Theor. Comput. Sci. 186: 49-65 (2007)
24EEVéronique Cortier, Michaël Rusinowitch, Eugen Zalinescu: Relating two standard notions of secrecy. Logical Methods in Computer Science 3(3): (2007)
2006
23EEVéronique Cortier, Michaël Rusinowitch, Eugen Zalinescu: Relating Two Standard Notions of Secrecy. CSL 2006: 303-318
22EEVéronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi: Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. FSTTCS 2006: 176-187
21EEVéronique Cortier, Eugen Zalinescu: Deciding Key Cycles for Security Protocols. LPAR 2006: 317-331
20EEEugen Zalinescu, Véronique Cortier, Michaël Rusinowitch: Relating two standard notions of secrecy. Trustworthy Software 2006
19EEVéronique Cortier, Heinrich Hördegen, Bogdan Warinschi: Explicit Randomness is not Necessary when Modeling Probabilistic Encryption CoRR abs/cs/0606030: (2006)
18EEVéronique Cortier, Xavier Goaoc, Mira Lee, Hyeon-Suk Na: A note on maximally repeated sub-patterns of a point set. Discrete Mathematics 306(16): 1965-1968 (2006)
17EEVéronique Cortier, Stéphanie Delaune, Pascal Lafourcade: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1): 1-43 (2006)
16EEMartín Abadi, Véronique Cortier: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1-2): 2-32 (2006)
2005
15EEMartín Abadi, Véronique Cortier: Deciding Knowledge in Security Protocols under (Many More) Equational Theories. CSFW 2005: 62-76
14EEVéronique Cortier, Bogdan Warinschi: Computationally Sound, Automated Proofs for Security Protocols. ESOP 2005: 157-171
13EEMathieu Baudet, Véronique Cortier, Steve Kremer: Computationally Sound Implementations of Equational Theories Against Passive Adversaries. ICALP 2005: 652-663
12EEVéronique Cortier, Michaël Rusinowitch, Eugen Zalinescu: A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. PPDP 2005: 12-22
11 Véronique Cortier: Vérifier les protocoles cryptographiques. Technique et Science Informatiques 24(1): 115-140 (2005)
10EEHubert Comon, Véronique Cortier: Tree automata with one memory set constraints and cryptographic protocols. Theor. Comput. Sci. 331(1): 143-214 (2005)
2004
9EEMartín Abadi, Véronique Cortier: Deciding Knowledge in Security Protocols Under Equational Theories. ICALP 2004: 46-58
8EEHubert Comon-Lundh, Véronique Cortier: Security properties: two agents are sufficient. Sci. Comput. Program. 50(1-3): 51-71 (2004)
2003
7EEHubert Comon-Lundh, Véronique Cortier: Security Properties: Two Agents Are Sufficient. ESOP 2003: 99-113
6EEHubert Comon-Lundh, Véronique Cortier: New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols. RTA 2003: 148-164
2002
5EEVéronique Cortier: About the decision of reachability for register machines. ITA 36(4): 341-358 (2002)
2001
4EEVéronique Cortier, Jonathan K. Millen, Harald Rueß: Proving Secrecy is Easy Enough. CSFW 2001: 97-
3EEHubert Comon, Véronique Cortier, John Mitchell: Tree Automata with One Memory, Set Constraints, and Ping-Pong Protocols. ICALP 2001: 682-693
2000
2EEHubert Comon, Véronique Cortier: Flatness Is Not a Weakness. CSL 2000: 262-276
1999
1EEVéronique Cortier, Harald Ganzinger, Florent Jacquemard, Margus Veanes: Decidable Fragments of Simultaneous Rigid Reachability. ICALP 1999: 250-260

Coauthor Index

1Martín Abadi [9] [15] [16]
2Mathilde Arnaud [30]
3Mathieu Baudet [13] [36]
4Hubert Comon-Lundh (Hubert Comon) [2] [3] [6] [7] [8] [10] [26] [35]
5Jérémie Delaitre [31]
6Stéphanie Delaune [17] [29] [30] [31] [34] [37]
7Harald Ganzinger [1]
8Xavier Goaoc [18]
9Heinrich Hördegen [19] [25]
10Florent Jacquemard [1]
11Gavin Keighren [28]
12Steve Kremer [13] [22] [36]
13Ralf Küsters [22] [32]
14Pascal Lafourcade [17]
15Mira Lee [18]
16Jonathan K. Millen [4]
17John Mitchell [3]
18Hyeon-Suk Na [18]
19Harald Rueß [4]
20Michaël Rusinowitch [12] [20] [23] [24] [27]
21Graham Steel [28] [34]
22Margus Veanes [1]
23Bogdan Warinschi [14] [19] [22] [25] [32] [33]
24Eugen Zalinescu [12] [20] [21] [23] [24] [26] [27] [33]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)