Published in: LIPIcs, Volume 152, 28th EACSL Annual Conference on Computer Science Logic (CSL 2020)
Véronique Cortier. Verification of Security Protocols (Invited Talk). In 28th EACSL Annual Conference on Computer Science Logic (CSL 2020). Leibniz International Proceedings in Informatics (LIPIcs), Volume 152, pp. 1:1-1:2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2020)
@InProceedings{cortier:LIPIcs.CSL.2020.1, author = {Cortier, V\'{e}ronique}, title = {{Verification of Security Protocols}}, booktitle = {28th EACSL Annual Conference on Computer Science Logic (CSL 2020)}, pages = {1:1--1:2}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-132-0}, ISSN = {1868-8969}, year = {2020}, volume = {152}, editor = {Fern\'{a}ndez, Maribel and Muscholl, Anca}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.CSL.2020.1}, URN = {urn:nbn:de:0030-drops-116447}, doi = {10.4230/LIPIcs.CSL.2020.1}, annote = {Keywords: Security protocols, automated deduction, security} }
Published in: LIPIcs, Volume 45, 35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2015)
Vincent Cheval, Véronique Cortier, and Eric le Morvan. Secure Refinements of Communication Channels. In 35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2015). Leibniz International Proceedings in Informatics (LIPIcs), Volume 45, pp. 575-589, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2015)
@InProceedings{cheval_et_al:LIPIcs.FSTTCS.2015.575, author = {Cheval, Vincent and Cortier, V\'{e}ronique and le Morvan, Eric}, title = {{Secure Refinements of Communication Channels}}, booktitle = {35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2015)}, pages = {575--589}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-939897-97-2}, ISSN = {1868-8969}, year = {2015}, volume = {45}, editor = {Harsha, Prahladh and Ramalingam, G.}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2015.575}, URN = {urn:nbn:de:0030-drops-56583}, doi = {10.4230/LIPIcs.FSTTCS.2015.575}, annote = {Keywords: Protocol, Composition, Formal methods, Channels, Implementation} }
Published in: LIPIcs, Volume 9, 28th International Symposium on Theoretical Aspects of Computer Science (STACS 2011)
Hubert Comon-Lundh and Véronique Cortier. How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.. In 28th International Symposium on Theoretical Aspects of Computer Science (STACS 2011). Leibniz International Proceedings in Informatics (LIPIcs), Volume 9, pp. 29-44, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)
@InProceedings{comonlundh_et_al:LIPIcs.STACS.2011.29, author = {Comon-Lundh, Hubert and Cortier, V\'{e}ronique}, title = {{How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.}}, booktitle = {28th International Symposium on Theoretical Aspects of Computer Science (STACS 2011)}, pages = {29--44}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-939897-25-5}, ISSN = {1868-8969}, year = {2011}, volume = {9}, editor = {Schwentick, Thomas and D\"{u}rr, Christoph}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.STACS.2011.29}, URN = {urn:nbn:de:0030-drops-29993}, doi = {10.4230/LIPIcs.STACS.2011.29}, annote = {Keywords: verification, security, cryptography} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Eugen Zalinescu, Véronique Cortier, and Michaël Rusinowitch. Relating two standard notions of secrecy. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-29, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{zalinescu_et_al:OASIcs.TrustworthySW.2006.691, author = {Zalinescu, Eugen and Cortier, V\'{e}ronique and Rusinowitch, Micha\"{e}l}, title = {{Relating two standard notions of secrecy}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--29}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.691}, URN = {urn:nbn:de:0030-drops-6911}, doi = {10.4230/OASIcs.TrustworthySW.2006.691}, annote = {Keywords: Verification, security protocols, secrecy, applied-pi calculus} }
Feedback for Dagstuhl Publishing