Yannick Chevalier
Yannick Chevalier
Maître de Conférences en informatique, IRIT, Université Toulouse 3
Verified email at irit.fr - Homepage
Title
Cited by
Cited by
Year
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
12622005
An NP decision procedure for protocol insecurity with XOR
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Theoretical Computer Science 338 (1-3), 247-274, 2005
2532005
A high level protocol specification language for industrial security-sensitive protocols
Y Chevalier, L Compagna, J Cuellar, PH Drielsma, J Mantovani, ...
Workshop on Specification and Automated Processing of Security Requirements …, 2004
1892004
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
International Conference on Foundations of Software Technology and …, 2003
1622003
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
1262012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
992002
Automated unbounded verification of security protocols
Y Chevalier, L Vigneron
International conference on computer aided verification, 324-337, 2002
912002
Combining intruder theories
Y Chevalier, M Rusinowitch
International Colloquium on Automata, Languages, and Programming, 639-651, 2005
682005
A tool for lazy verification of security protocols
Y Chevalier, L Vigneron
Proceedings 16th Annual International Conference on Automated Software …, 2001
552001
Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions
Y Chevalier, R Küsters, M Rusinowitch, M Turuani, L Vigneron
International Workshop on Computer Science Logic, 128-141, 2003
402003
Compiling and securing cryptographic protocols
Y Chevalier, M Rusinowitch
Information Processing Letters 110 (3), 116-122, 2010
362010
Automatic composition of services with security policies
Y Chevalier, MA Mekki, M Rusinowitch
2008 IEEE Congress on Services-Part I, 529-537, 2008
332008
Hierarchical combination of intruder theories
Y Chevalier, M Rusinowitch
International Conference on Rewriting Techniques and Applications, 108-122, 2006
332006
Deciding the security of protocols with commuting public key encryption
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Electronic Notes in Theoretical Computer Science 125 (1), 55-66, 2005
312005
Towards an automatic analysis of web service security
Y Chevalier, D Lugiez, M Rusinowitch
International Symposium on Frontiers of Combining Systems, 133-147, 2007
272007
Résolution de problèmes d'accessiblité pour la compilation et la validation de protocoles cryptographiques.
Y Chevalier
Henri Poincaré University, Nancy, France, 2003
272003
Decidability of equivalence of symbolic derivations
Y Chevalier, M Rusinowitch
Journal of Automated Reasoning 48 (2), 263-292, 2012
212012
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures
Y Chevalier, M Rusinowitch
Theoretical Computer Science 411 (10), 1261-1282, 2010
202010
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
ACM Transactions on Computational Logic (TOCL) 9 (4), 1-52, 2008
192008
Hierarchical combination of intruder theories
Y Chevalier, M Rusinowitch
Information and Computation 206 (2-4), 352-377, 2008
172008
The system can't perform the operation now. Try again later.
Articles 1–20