| 2008 |
| 9 | EE | Karthikeyan Bhargavan,
Cédric Fournet,
Ricardo Corin,
Eugen Zalinescu:
Cryptographically verified implementations for TLS.
ACM Conference on Computer and Communications Security 2008: 459-468 |
| 2007 |
| 8 | EE | Véronique Cortier,
Bogdan Warinschi,
Eugen Zalinescu:
Synthesizing Secure Protocols.
ESORICS 2007: 406-421 |
| 7 | EE | Véronique Cortier,
Michaël Rusinowitch,
Eugen Zalinescu:
Relating two standard notions of secrecy
CoRR abs/0706.0502: (2007) |
| 6 | EE | Hubert Comon-Lundh,
Véronique Cortier,
Eugen Zalinescu:
Deciding security properties for cryptographic protocols. Application to key cycles
CoRR abs/0708.3564: (2007) |
| 5 | EE | Véronique Cortier,
Michaël Rusinowitch,
Eugen Zalinescu:
Relating two standard notions of secrecy.
Logical Methods in Computer Science 3(3): (2007) |
| 2006 |
| 4 | EE | Véronique Cortier,
Michaël Rusinowitch,
Eugen Zalinescu:
Relating Two Standard Notions of Secrecy.
CSL 2006: 303-318 |
| 3 | EE | Véronique Cortier,
Eugen Zalinescu:
Deciding Key Cycles for Security Protocols.
LPAR 2006: 317-331 |
| 2 | EE | Eugen Zalinescu,
Véronique Cortier,
Michaël Rusinowitch:
Relating two standard notions of secrecy.
Trustworthy Software 2006 |
| 2005 |
| 1 | EE | Véronique Cortier,
Michaël Rusinowitch,
Eugen Zalinescu:
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures.
PPDP 2005: 12-22 |