Yannick Chevalier
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j14]Igor V. Kotenko, Maxim Kolomeets, Andrey Chechulin, Yannick Chevalier:
A visual analytics approach for the cyber forensics based on different views of the network traffic. JoWUA 9(2): 57-73 (2018) - 2017
- [j13]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Intruder deducibility constraints with negation. Decidability and application to secured service compositions. J. Symb. Comput. 80: 4-26 (2017) - [j12]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of general intruder constraints with and without a set constructor. J. Symb. Comput. 80: 27-61 (2017) - [c27]
- 2015
- [j11]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Parametrized automata simulation and application to service composition. J. Symb. Comput. 69: 40-60 (2015) - [c26]Tushant Jha, Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Expressive Equivalence and Succinctness of Parametrized Automata with Respect to Finite Memory Automata. ICSOC Workshops 2015: 145-156 - 2014
- [j10]Wiem Tounsi, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Yannick Chevalier, Frédéric Cuppens:
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. J. Network and Computer Applications 39: 152-166 (2014) - [c25]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
An EXPTIME Algorithm for Data-Aware Service Simulation Using Parametrized Automata. ICSOC Workshops 2014: 295-307 - 2013
- [c24]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Fresh-Variable Automata: Application to Service Composition. SYNASC 2013: 153-160 - [i10]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Fresh-Variable Automata for Service Composition. CoRR abs/1302.4205 (2013) - [i9]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Guarded Variable Automata over Infinite Alphabets. CoRR abs/1304.6297 (2013) - 2012
- [j9]Yannick Chevalier, Michaël Rusinowitch:
Decidability of Equivalence of Symbolic Derivations. J. Autom. Reasoning 48(2): 263-292 (2012) - [c23]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Towards the Orchestration of Secured Services under Non-disclosure Policies. MMM-ACNS 2012: 130-145 - [c22]Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea, Sebastian Mödersheim, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - [i8]Yannick Chevalier, Mounira Kourjieh:
Automated Synthesis of a Finite Complexity Ordering for Saturation. CoRR abs/1203.2809 (2012) - [i7]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Intruder deducibility constraints with negation. Decidability and application to secured service compositions. CoRR abs/1207.4871 (2012) - 2011
- [c21]Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch:
Web Services Verification and Prudent Implementation. DPM/SETOP 2011: 173-189 - [c20]Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch, Mathieu Turuani:
Distributed Orchestration of Web Services under Security Constraints. DPM/SETOP 2011: 235-252 - [i6]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of General Intruder Constraints with and without a Set Constructor. CoRR abs/1103.0220 (2011) - [i5]
- 2010
- [j8]Yannick Chevalier, Michaël Rusinowitch:
Compiling and securing cryptographic protocols. Inf. Process. Lett. 110(3): 116-122 (2010) - [j7]Yannick Chevalier, Michaël Rusinowitch:
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures. Theor. Comput. Sci. 411(10): 1261-1282 (2010) - [c19]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of general intruder constraints with a set constructor. CRiSIS 2010: 1-8 - [c18]Philippe Balbiani, Yannick Chevalier, Marwa El Houri:
An intruder model for trust negotiation. CRiSIS 2010: 1-8 - [c17]Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch:
Orchestration under Security Constraints. FMCO 2010: 23-44
2000 – 2009
- 2009
- [c16]Philippe Balbiani, Yannick Chevalier, Marwa El Houri:
A logical framework for reasoning about policies with trust negotiations and workflows in a distributed environment. CRiSIS 2009: 3-11 - [i4]Yannick Chevalier, Mounira Kourjieh:
On the Decidability of (ground) Reachability Problems for Cryptographic Protocols (extended version). CoRR abs/0906.1199 (2009) - [i3]Yannick Chevalier, Michaël Rusinowitch:
Compiling and securing cryptographic protocols. CoRR abs/0910.5099 (2009) - 2008
- [j6]Yannick Chevalier, Michaël Rusinowitch:
Hierarchical combination of intruder theories. Inf. Comput. 206(2-4): 352-377 (2008) - [j5]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ACM Trans. Comput. Log. 9(4): 24:1-24:52 (2008) - [c15]Philippe Balbiani, Yannick Chevalier, Marwa El Houri:
A Logical Approach to Dynamic Role-Based Access Control. AIMSA 2008: 194-208 - [c14]Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch:
Automatic Composition of Services with Security Policies. SERVICES I 2008: 529-537 - 2007
- [c13]Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch:
Towards an Automatic Analysis of Web Service Security. FroCoS 2007: 133-147 - [c12]Yannick Chevalier, Mounira Kourjieh:
Key Substitution in the Symbolic Analysis of Cryptographic Protocols. FSTTCS 2007: 121-132 - [c11]Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch:
Verifying Cryptographic Protocols with Subterms Constraints. LPAR 2007: 181-195 - [i2]Yannick Chevalier, Mounira Kourjieh:
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version). CoRR abs/0710.5674 (2007) - 2006
- [c10]Yannick Chevalier, Mounira Kourjieh:
A Symbolic Intruder Model for Hash-Collision Attacks. ASIAN 2006: 13-27 - [c9]Yannick Chevalier, Michaël Rusinowitch:
Hierarchical Combination of Intruder Theories. RTA 2006: 108-122 - [i1]Yannick Chevalier, Mounira Kourjieh:
A Symbolic Intruder Model for Hash-Collision Attacks. CoRR abs/cs/0611142 (2006) - 2005
- [j4]Yannick Chevalier, Laurent Vigneron:
Rule-based Programs Describing Internet Security Protocols. Electr. Notes Theor. Comput. Sci. 124(1): 113-132 (2005) - [j3]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
Deciding the Security of Protocols with Commuting Public Key Encryption. Electr. Notes Theor. Comput. Sci. 125(1): 55-66 (2005) - [j2]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
An NP decision procedure for protocol insecurity with XOR. Theor. Comput. Sci. 338(1-3): 247-274 (2005) - [c8]Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 - [c7]
- 2004
- [j1]Yannick Chevalier, Laurent Vigneron:
Strategy for Verifying Security Protocols with Unbounded Message Size. Autom. Softw. Eng. 11(2): 141-166 (2004) - 2003
- [c6]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron:
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. CSL 2003: 128-141 - [c5]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. FSTTCS 2003: 124-135 - [c4]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
An NP Decision Procedure for Protocol Insecurity with XOR. LICS 2003: 261-270 - 2002
- [c3]Yannick Chevalier, Laurent Vigneron:
Automated Unbounded Verification of Security Protocols. CAV 2002: 324-337 - [c2]Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISS Security Protocol Analysis Tool. CAV 2002: 349-353 - 2001
- [c1]Yannick Chevalier, Laurent Vigneron:
A Tool for Lazy Verification of Security Protocols. ASE 2001: 373-376
Coauthor Index
last updated on 2019-02-16 23:11 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint