Cachan

Results: 458



#Item
151

Trace Equivalence Decision: Negative Tests and ∗ Non-determinism Vincent Cheval Hubert Comon-Lundh

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2011-08-02 11:08:20
    152

    Verifying privacy-type properties of electronic voting protocols ⋆ St´ephanie Delaune a,b , Steve Kremer b , Mark Ryan a a

    Add to Reading List

    Source URL: www.lsv.ens-cachan.fr

    Language: English - Date: 2008-08-05 09:54:58
      153

      INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Deciding knowledge in security protocols under some e-voting theories N° 6903

      Add to Reading List

      Source URL: www.lsv.ens-cachan.fr

      Language: English - Date: 2011-08-02 11:02:30
        154

        Sp´ecificit´es des protocoles de vote ´electronique St´ephanie Delaune Steve Kremer 16 Janvier 2009

        Add to Reading List

        Source URL: www.lsv.ens-cachan.fr

        Language: French - Date: 2009-07-06 11:55:56
          155

          Epistemic Logic for the Applied Pi Calculus⋆ Rohit Chadha1 , St´ephanie Delaune2 , and Steve Kremer2 1 2 University of Illinois at Urbana-Champaign, USA

          Add to Reading List

          Source URL: www.lsv.ens-cachan.fr

          Language: English - Date: 2009-07-06 12:39:48
            156

            Replace this file with prentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Relation between Unification Problem and Intruder Deduction Problem

            Add to Reading List

            Source URL: www.lsv.ens-cachan.fr

            Language: English - Date: 2008-09-19 09:10:06
              157

              Composition of Password-based Protocols St´ephanie Delaune LSV, ENS Cachan & CNRS & INRIA France ∗

              Add to Reading List

              Source URL: www.cs.bham.ac.uk

              Language: English - Date: 2009-02-25 10:33:23
                158

                Computational Soundness of Observational Equivalence Hubert Comon-Lundh Véronique Cortier∗ Research Center for Information Security and

                Add to Reading List

                Source URL: www.lsv.ens-cachan.fr

                Language: English - Date: 2008-08-11 03:16:43
                  159

                  Formalising security properties in electronic voting protocols St´ephanie Delaune and Steve Kremer LSV, ENS Cachan & CNRS & INRIA Saclay ˆIle-de-France The results presented in this report are based on joint work with

                  Add to Reading List

                  Source URL: www.lsv.ens-cachan.fr

                  Language: English - Date: 2010-04-22 04:30:41
                    160

                    Computationally sound implementations of equational theories against passive adversariesI Mathieu Baudeta , V´eronique Cortierb , Steve Kremerc a DCSSI, France & INRIA Lorraine projet Cassis, France c LSV/ CNRS & INRIA

                    Add to Reading List

                    Source URL: www.lsv.ens-cachan.fr

                    Language: English - Date: 2009-01-07 04:37:08
                      UPDATE