Cachan

Results: 458



#Item
201

Computing knowledge in security protocols under convergent equational theories ? (for presentation only) S ¸ tefan Ciobˆ ac˘

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2009-07-06 12:24:06
    202

    Extending the Rackoff technique to affine nets R´emi Bonnet, Alain Finkel, M. Praveen October 2012

    Add to Reading List

    Source URL: www.lsv.ens-cachan.fr

    Language: English - Date: 2012-10-05 15:31:30
      203

      D2.3 Implementation of prototypes for equivalence properties Steve Kremer January 16, 2012 The results presented in this report have been obtained by Mathieu Baudet, Rohit Chadha, Ştefan Ciobâcă, Vincent Cheval, Huber

      Add to Reading List

      Source URL: www.lsv.ens-cachan.fr

      Language: English - Date: 2012-12-05 06:09:37
        204

        ECOLE NORMALE SUPERIEURE DE CACHAN GUIDE D’ACCUEIL SOMMAIRE

        Add to Reading List

        Source URL: www.dptinfo.ens-cachan.fr

        Language: French - Date: 2014-06-24 12:29:03
          205

          Towards automatic analysis of election verifiability properties ? ?? Ben Smyth1,2 , Mark Ryan1 , Steve Kremer3 , and Mounira Kourjieh1,4

          Add to Reading List

          Source URL: www.lsv.ens-cachan.fr

          Language: English - Date: 2010-03-18 09:48:39
            206

            Computational soundness of observational equivalence∗ Hubert Comon-Lundh† V´eronique Cortier ‡

            Add to Reading List

            Source URL: www.lsv.ens-cachan.fr

            Language: English - Date: 2008-08-05 09:55:07
              207

              YAPA: A generic tool for computing intruder knowledge ? Mathieu Baudet1 , V´eronique Cortier2 , and St´ephanie Delaune3 1 DCSSI, France

              Add to Reading List

              Source URL: www.lsv.ens-cachan.fr

              Language: English - Date: 2009-07-06 12:39:38
                208

                Computationally Sound Analysis of Protocols using Bilinear Pairings ∗ Steve Kremer1 1 Laurent Mazar´e2

                Add to Reading List

                Source URL: www.lsv.ens-cachan.fr

                Language: English - Date: 2008-12-17 08:08:02
                  209

                  Attacking and fixing Helios: An analysis of ballot secrecy∗ V´eronique Cortier and Ben Smyth Loria, CNRS & INRIA Nancy Grand Est, France June 1, 2011

                  Add to Reading List

                  Source URL: www.lsv.ens-cachan.fr

                  Language: English - Date: 2011-08-02 11:02:31
                    210

                    D4-1. Formal description of our case study: Helios 2.0 Ben Smyth and V´eronique Cortier Loria, CNRS, France Abstract

                    Add to Reading List

                    Source URL: www.lsv.ens-cachan.fr

                    Language: English - Date: 2011-02-18 04:23:56
                      UPDATE