140 results on '"Blanchet, Bruno"'
Search Results
2. The Security Protocol Verifier ProVerif and its Horn Clause Resolution Algorithm
3. Analysing the HPKE Standard
4. The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication
5. Automatic Verification of Correspondences for Security Protocols
6. A Static Analyzer for Large Safety-Critical Software
7. Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif
8. Proved Generation of Implementations from Computationally Secure Protocol Specifications
9. Proving More Observational Equivalences with ProVerif
10. Verification of Security Protocols with Lists: From Length One to Unbounded Length
11. Security Protocol Verification: Symbolic and Computational Models
12. The Security Protocol Verifier ProVerif and its Horn Clause Resolution Algorithm
13. Models and Proofs of Protocol Security: A Progress Report
14. Automated Security Proofs with Sequences of Games
15. Just Fast Keying in the Pi Calculus
16. Computer-Assisted Verification of a Protocol for Certified Email
17. A Calculus for Secure Mobility
18. Verification of Cryptographic Protocols: Tagging Enforces Termination
19. From Secrecy to Authenticity in Security Protocols
20. Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded Software
21. Abstracting Cryptographic Protocols by Prolog Rules
22. Secrecy Types for Asymmetric Communication
23. ProVerif with Lemmas, Induction, Fast Subsumption, and Much More
24. Automated verification of selected equivalences for security protocols
25. SoK: Computer-Aided Cryptography
26. Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif
27. The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication.
28. Analyzing security protocols with secrecy types and logic programs
29. Escape analysis for Java[TM]: theory and practice
30. Models and Proofs of Protocol Security: A Progress Report
31. Verification of cryptographic protocols: tagging enforces termination
32. Computer-assisted verification of a protocol for certified email
33. Just Fast Keying in the Pi Calculus
34. A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
35. Computer-Assisted Verification of a Protocol for Certified Email
36. A Calculus for Secure Mobility
37. From Secrecy to Authenticity in Security Protocols
38. Abstracting Cryptographic Protocols by Prolog Rules
39. Secrecy types for asymmetric communication
40. A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
41. Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate
42. Composition Theorems for CryptoVerif and Application to TLS 1.3
43. Automated reasoning for equivalences in the applied pi calculus with barriers
44. Automated reasoning for equivalences in the applied pi calculus with barriers
45. Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
46. Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols
47. Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate
48. Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach
49. Du pi calcul appliqué aux clauses de Horn pour les protocoles qui utilisent des listes
50. From the Applied Pi Calculus to Horn Clauses for Protocols with Lists
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.