Véronique Cortier
Véronique Cortier
CNRS, LORIA
Dirección de correo verificada de loria.fr - Página principal
TítuloCitado porAño
A survey of algebraic properties used in cryptographic protocols
V Cortier, S Delaune, P Lafourcade
Journal of Computer Security 14 (1), 1-43, 2006
2082006
Computationally sound, automated proofs for security protocols
V Cortier, B Warinschi
European Symposium on Programming, 157-171, 2005
1752005
Deciding knowledge in security protocols under equational theories
M Abadi, V Cortier
Theoretical Computer Science 367 (1), 2-32, 2006
1722006
Attacking and fixing Helios: An analysis of ballot secrecy
V Cortier, B Smyth
Journal of Computer Security 21 (1), 89-148, 2013
1642013
New decidability results for fragments of first-order logic and application to cryptographic protocols
H Comon-Lundh, V Cortier
International Conference on Rewriting Techniques and Applications, 148-164, 2003
1202003
Computational soundness of observational equivalence
H Comon-Lundh, V Cortier
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1122008
A survey of symbolic methods in computational analysis of cryptographic systems
V Cortier, S Kremer, B Warinschi
Journal of Automated Reasoning 46 (3-4), 225-259, 2011
1012011
Tree automata with one memory set constraints and cryptographic protocols
H Comon, V Cortier
Theoretical Computer Science 331 (1), 143-214, 2005
992005
Election verifiability for Helios under weaker trust assumptions
V Cortier, D Galindo, S Glondu, M Izabachene
European Symposium on Research in Computer Security, 327-344, 2014
902014
Deciding knowledge in security protocols under equational theories
M Abadi, V Cortier
International Colloquium on Automata, Languages, and Programming, 46-58, 2004
842004
Adapting Helios for provable ballot privacy
D Bernhard, V Cortier, O Pereira, B Smyth, B Warinschi
European Symposium on Research in Computer Security, 335-354, 2011
832011
Safely composing security protocols
V Cortier, S Delaune
Formal Methods in System Design 34 (1), 1-36, 2009
812009
Computationally sound implementations of equational theories against passive adversaries
M Baudet, V Cortier, S Kremer
International Colloquium on Automata, Languages, and Programming, 652-663, 2005
812005
Security properties: two agents are sufficient
H Comon-Lundh, V Cortier
Science of Computer Programming 50 (1-3), 51-71, 2004
802004
SoK: A comprehensive analysis of game-based ballot privacy definitions
D Bernhard, V Cortier, D Galindo, O Pereira, B Warinschi
2015 IEEE Symposium on Security and Privacy, 499-516, 2015
792015
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
D Ünay, Z Çataltepe, S Aksoy
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2010
792010
Security properties: two agents are sufficient
H Comon-Lundh, V Cortier
European Symposium On Programming, 99-113, 2003
792003
Flatness is not a weakness
H Comon, V Cortier
International workshop on computer science logic, 262-276, 2000
782000
Deciding security properties for cryptographic protocols. application to key cycles
H Comon-Lundh, V Cortier, E Zălinescu
ACM Transactions on Computational Logic (TOCL) 11 (2), 1-42, 2010
762010
A method for proving observational equivalence
V Cortier, S Delaune
2009 22nd IEEE Computer Security Foundations Symposium, 266-276, 2009
752009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20