Loading...
Department 2: Formal methods
For all your questions or comments about this collection, please contact us at: publications@loria.fr
Latest deposits
-
-
Basavesh Ammanaghatta Shivakumar, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, et al.. Typing High-Speed Cryptography against Spectre v1. 2023 IEEE Symposium on Security and Privacy (SP), IEEE, May 2023, San Francisco, United States. pp.1592-1609, ⟨10.1109/SP46215.2023.00091⟩. ⟨hal-04106448⟩
-
-
-
-
Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, Peter Rønne, Gergei Bana, David Naccache, et al.. Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol. International Joint Conference on Electronic Voting 2022, Oct 2022, Bregenz, Austria. pp.19-35, ⟨10.1007/978-3-031-15911-4_2⟩. ⟨hal-03913581v2⟩
-
Mikaël Bougon, Hervé Chabanne, Véronique Cortier, Alexandre Debant, Emmanuelle Dottax, et al.. Themis: an On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability. CCS 2022 - The ACM Conference on Computer and Communications Security, Nov 2022, Los Angeles, United States. ⟨10.1145/3548606.3560563⟩. ⟨hal-03763294v2⟩
Number of full text documents
1 156
Submissions distribution by document type
Keywords
Cryptography
Parametric timed automata
Symbolic model
Decision procedure
Deducibility constraints
Algorithm
Intrusion detection
Semantics
IMITATOR
Réécriture
Automatic theorem provers
Distributed systems
Cryptographic protocols
Narrowing
Satisfiability Modulo Theories
Parameter synthesis
Tilings
Social networks
Protocols
Machine
Theorem proving
Security
Formal Verification
Modelling
Constraint solving
Proof-based development
Static analysis
Composition
Refinement
Privacy
Formal verification
Reachability
Algorithmic randomness
Sines
Formal Methods
Formal language
Automated verification
Symbolic animation
E-voting
Rewriting
Calculating machine
Collaborative editors
Operational transformation
Online Social Networks OSN
Protocoles cryptographiques
Vérification
Combination
Implicit computational complexity
Verification
Validation
Unification
Automated reasoning
Schwilgué
Tree automata
Edward Sang
Détection d'intrusions
Abstraction
Liveness
Protocol
Automated deduction
Authentication
Combination of decision procedures
Simulation
Applied π-Calculus
TLA+
Cellular automata
Malware
Coq
Distributed algorithms
Secrecy
Sécurité
Satisfiability
Completeness
Web services
Proof assistants
Term rewriting
Model checking
Formal methods
Security protocols
Decision procedures
Raffinement
Event-B
Optimistic replication
Complexity
Pattern matching
Equational theories
Méthodes formelles
Operational Transformation
Termination
Computability
First-order logic
Logarithms
Behavioral detection
Computable analysis
Decidability
Linear arithmetic
Protocoles
Déduction automatique
SMT
Model-checking