BibTeX records: Mathieu Turuani

download as .bib file

@inproceedings{DBLP:conf/csfw/ChevalCT18,
  author    = {Vincent Cheval and
               V{\'{e}}ronique Cortier and
               Mathieu Turuani},
  title     = {A Little More Conversation, a Little Less Action, a Lot More Satisfaction:
               Global States in ProVerif},
  booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
               United Kingdom, July 9-12, 2018},
  pages     = {344--358},
  year      = {2018},
  crossref  = {DBLP:conf/csfw/2018},
  url       = {https://doi.org/10.1109/CSF.2018.00032},
  doi       = {10.1109/CSF.2018.00032},
  timestamp = {Wed, 15 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/ChevalCT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/CortierGT18,
  author    = {V{\'{e}}ronique Cortier and
               David Galindo and
               Mathieu Turuani},
  title     = {A Formal Analysis of the Neuchatel e-Voting Protocol},
  booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2018, London, United Kingdom, April 24-26, 2018},
  pages     = {430--442},
  year      = {2018},
  crossref  = {DBLP:conf/eurosp/2018},
  url       = {https://doi.org/10.1109/EuroSP.2018.00037},
  doi       = {10.1109/EuroSP.2018.00037},
  timestamp = {Wed, 11 Jul 2018 11:39:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/CortierGT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardCGTW18,
  author    = {David Bernhard and
               V{\'{e}}ronique Cortier and
               Pierrick Gaudry and
               Mathieu Turuani and
               Bogdan Warinschi},
  title     = {Verifiability Analysis of CHVote},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {1052},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1052},
  timestamp = {Tue, 13 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BernhardCGTW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/AvanesovCRT17,
  author    = {Tigran Avanesov and
               Yannick Chevalier and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Intruder deducibility constraints with negation. Decidability and
               application to secured service compositions},
  journal   = {J. Symb. Comput.},
  volume    = {80},
  pages     = {4--26},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.jsc.2016.07.008},
  doi       = {10.1016/j.jsc.2016.07.008},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jsc/AvanesovCRT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/AvanesovCRT17a,
  author    = {Tigran Avanesov and
               Yannick Chevalier and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Satisfiability of general intruder constraints with and without a
               set constructor},
  journal   = {J. Symb. Comput.},
  volume    = {80},
  pages     = {27--61},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.jsc.2016.07.009},
  doi       = {10.1016/j.jsc.2016.07.009},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jsc/AvanesovCRT17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TuruaniVR16,
  author    = {Mathieu Turuani and
               Thomas Voegtlin and
               Micha{\"{e}}l Rusinowitch},
  title     = {Automated Verification of Electrum Wallet},
  booktitle = {Financial Cryptography and Data Security - {FC} 2016 International
               Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
               26, 2016, Revised Selected Papers},
  pages     = {27--42},
  year      = {2016},
  crossref  = {DBLP:conf/fc/2016w},
  url       = {https://doi.org/10.1007/978-3-662-53357-4\_3},
  doi       = {10.1007/978-3-662-53357-4\_3},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/TuruaniVR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/MartinMMPT14,
  author    = {Jos{\'{e}} Antonio Mart{\'{\i}}n and
               Fabio Martinelli and
               Ilaria Matteucci and
               Ernesto Pimentel and
               Mathieu Turuani},
  title     = {On the Synthesis of Secure Services Composition},
  booktitle = {Engineering Secure Future Internet Services and Systems - Current
               Research},
  pages     = {140--159},
  year      = {2014},
  crossref  = {DBLP:series/lncs/8431},
  url       = {https://doi.org/10.1007/978-3-319-07452-8\_6},
  doi       = {10.1007/978-3-319-07452-8\_6},
  timestamp = {Thu, 29 Aug 2019 08:09:56 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/MartinMMPT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/AvanesovCRT12,
  author    = {Tigran Avanesov and
               Yannick Chevalier and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Towards the Orchestration of Secured Services under Non-disclosure
               Policies},
  booktitle = {Computer Network Security - 6th International Conference on Mathematical
               Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
               2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  pages     = {130--145},
  year      = {2012},
  crossref  = {DBLP:conf/mmmacns/2012},
  url       = {https://doi.org/10.1007/978-3-642-33704-8\_12},
  doi       = {10.1007/978-3-642-33704-8\_12},
  timestamp = {Tue, 14 May 2019 10:00:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmmacns/AvanesovCRT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12,
  author    = {Alessandro Armando and
               Wihem Arsac and
               Tigran Avanesov and
               Michele Barletta and
               Alberto Calvi and
               Alessandro Cappai and
               Roberto Carbone and
               Yannick Chevalier and
               Luca Compagna and
               Jorge Cu{\'{e}}llar and
               Gabriel Erzse and
               Simone Frau and
               Marius Minea and
               Sebastian M{\"{o}}dersheim and
               David von Oheimb and
               Giancarlo Pellegrino and
               Serena Elisa Ponta and
               Marco Rocchetto and
               Micha{\"{e}}l Rusinowitch and
               Mohammad Torabi Dashti and
               Mathieu Turuani and
               Luca Vigan{\`{o}}},
  title     = {The {AVANTSSAR} Platform for the Automated Validation of Trust and
               Security of Service-Oriented Architectures},
  booktitle = {Tools and Algorithms for the Construction and Analysis of Systems
               - 18th International Conference, {TACAS} 2012, Held as Part of the
               European Joint Conferences on Theory and Practice of Software, {ETAPS}
               2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings},
  pages     = {267--282},
  year      = {2012},
  crossref  = {DBLP:conf/tacas/2012},
  url       = {https://doi.org/10.1007/978-3-642-28756-5\_19},
  doi       = {10.1007/978-3-642-28756-5\_19},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-4871,
  author    = {Tigran Avanesov and
               Yannick Chevalier and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Intruder deducibility constraints with negation. Decidability and
               application to secured service compositions},
  journal   = {CoRR},
  volume    = {abs/1207.4871},
  year      = {2012},
  url       = {http://arxiv.org/abs/1207.4871},
  archivePrefix = {arXiv},
  eprint    = {1207.4871},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1207-4871},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AvanesovCMRT11,
  author    = {Tigran Avanesov and
               Yannick Chevalier and
               Mohammed Anis Mekki and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Distributed Orchestration of Web Services under Security Constraints},
  booktitle = {Data Privacy Management and Autonomous Spontaneus Security - 6th International
               Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,
               Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},
  pages     = {235--252},
  year      = {2011},
  crossref  = {DBLP:conf/esorics/2011-7122},
  url       = {https://doi.org/10.1007/978-3-642-28879-1\_16},
  doi       = {10.1007/978-3-642-28879-1\_16},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/AvanesovCMRT11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fia/CarboneMMPTV11,
  author    = {Roberto Carbone and
               Marius Minea and
               Sebastian M{\"{o}}dersheim and
               Serena Elisa Ponta and
               Mathieu Turuani and
               Luca Vigan{\`{o}}},
  title     = {Towards Formal Validation of Trust and Security in the Internet of
               Services},
  booktitle = {The Future Internet - Future Internet Assembly 2011: Achievements
               and Technological Promises},
  pages     = {193--208},
  year      = {2011},
  crossref  = {DBLP:conf/fia/2011},
  url       = {https://doi.org/10.1007/978-3-642-20898-0\_14},
  doi       = {10.1007/978-3-642-20898-0\_14},
  timestamp = {Wed, 25 Sep 2019 18:18:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fia/CarboneMMPTV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/CortierDGSTTZ11,
  author    = {V{\'{e}}ronique Cortier and
               J{\'{e}}r{\'{e}}mie Detrey and
               Pierrick Gaudry and
               Fr{\'{e}}d{\'{e}}ric Sur and
               Emmanuel Thom{\'{e}} and
               Mathieu Turuani and
               Paul Zimmermann},
  title     = {Ballot stuffing in a postal voting system},
  booktitle = {2011 International Workshop on Requirements Engineering for Electronic
               Voting Systems, {REVOTE} 2011, Trento, Italy, August 29, 2011},
  pages     = {27--36},
  year      = {2011},
  crossref  = {DBLP:conf/re/2011revote},
  url       = {https://doi.org/10.1109/REVOTE.2011.6045913},
  doi       = {10.1109/REVOTE.2011.6045913},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/re/CortierDGSTTZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-0220,
  author    = {Tigran Avanesov and
               Yannick Chevalier and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Satisfiability of General Intruder Constraints with and without a
               Set Constructor},
  journal   = {CoRR},
  volume    = {abs/1103.0220},
  year      = {2011},
  url       = {http://arxiv.org/abs/1103.0220},
  archivePrefix = {arXiv},
  eprint    = {1103.0220},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1103-0220},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/AvanesovCRT10,
  author    = {Tigran Avanesov and
               Yannick Chevalier and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Satisfiability of general intruder constraints with a set constructor},
  booktitle = {CRiSIS 2010, Proceedings of the Fifth International Conference on
               Risks and Security of Internet and Systems, Montreal, QC, Canada,
               October 10-13, 2010},
  pages     = {1--8},
  year      = {2010},
  crossref  = {DBLP:conf/crisis/2010},
  url       = {https://doi.org/10.1109/CRISIS.2010.5764919},
  doi       = {10.1109/CRISIS.2010.5764919},
  timestamp = {Wed, 06 Feb 2019 10:30:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crisis/AvanesovCRT10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChridiTR09,
  author    = {Najah Chridi and
               Mathieu Turuani and
               Micha{\"{e}}l Rusinowitch},
  title     = {Decidable Analysis for a Class of Cryptographic Group Protocols with
               Unbounded Lists},
  booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
               {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages     = {277--289},
  year      = {2009},
  crossref  = {DBLP:conf/csfw/2009},
  url       = {https://doi.org/10.1109/CSF.2009.10},
  doi       = {10.1109/CSF.2009.10},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/ChridiTR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/psec/AroraT09,
  author    = {Charu Arora and
               Mathieu Turuani},
  title     = {Validating Integrity for the Ephemerizer's Protocol with CL-Atse},
  booktitle = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese
               Collaboration},
  pages     = {21--32},
  year      = {2009},
  crossref  = {DBLP:conf/psec/2009},
  url       = {https://doi.org/10.1007/978-3-642-02002-5\_2},
  doi       = {10.1007/978-3-642-02002-5\_2},
  timestamp = {Tue, 14 May 2019 10:00:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/psec/AroraT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/ChevalierKRT08,
  author    = {Yannick Chevalier and
               Ralf K{\"{u}}sters and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Complexity results for security protocols with Diffie-Hellman exponentiation
               and commuting public key encryption},
  journal   = {{ACM} Trans. Comput. Log.},
  volume    = {9},
  number    = {4},
  pages     = {24:1--24:52},
  year      = {2008},
  url       = {https://doi.org/10.1145/1380572.1380573},
  doi       = {10.1145/1380572.1380573},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tocl/ChevalierKRT08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BackesDDMT06,
  author    = {Michael Backes and
               Anupam Datta and
               Ante Derek and
               John C. Mitchell and
               Mathieu Turuani},
  title     = {Compositional analysis of contract-signing protocols},
  journal   = {Theor. Comput. Sci.},
  volume    = {367},
  number    = {1-2},
  pages     = {33--56},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.tcs.2006.08.039},
  doi       = {10.1016/j.tcs.2006.08.039},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/BackesDDMT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/Turuani06,
  author    = {Mathieu Turuani},
  title     = {The CL-Atse Protocol Analyser},
  booktitle = {Term Rewriting and Applications, 17th International Conference, {RTA}
               2006, Seattle, WA, USA, August 12-14, 2006, Proceedings},
  pages     = {277--286},
  year      = {2006},
  crossref  = {DBLP:conf/rta/2006},
  url       = {https://doi.org/10.1007/11805618\_21},
  doi       = {10.1007/11805618\_21},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rta/Turuani06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0610014,
  author    = {Max Tuengerthal and
               Ralf K{\"{u}}sters and
               Mathieu Turuani},
  title     = {Implementing a Unification Algorithm for Protocol Analysis with {XOR}},
  journal   = {CoRR},
  volume    = {abs/cs/0610014},
  year      = {2006},
  url       = {http://arxiv.org/abs/cs/0610014},
  archivePrefix = {arXiv},
  eprint    = {cs/0610014},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-cs-0610014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entcs/ChevalierKRT05,
  author    = {Yannick Chevalier and
               Ralf K{\"{u}}sters and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Deciding the Security of Protocols with Commuting Public Key Encryption},
  journal   = {Electr. Notes Theor. Comput. Sci.},
  volume    = {125},
  number    = {1},
  pages     = {55--66},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.entcs.2004.05.019},
  doi       = {10.1016/j.entcs.2004.05.019},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/entcs/ChevalierKRT05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ChevalierKRT05,
  author    = {Yannick Chevalier and
               Ralf K{\"{u}}sters and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {An {NP} decision procedure for protocol insecurity with {XOR}},
  journal   = {Theor. Comput. Sci.},
  volume    = {338},
  number    = {1-3},
  pages     = {247--274},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.tcs.2005.01.015},
  doi       = {10.1016/j.tcs.2005.01.015},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/ChevalierKRT05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ArmandoBBCCCDHKMMORSTVV05,
  author    = {Alessandro Armando and
               David A. Basin and
               Yohan Boichut and
               Yannick Chevalier and
               Luca Compagna and
               Jorge Cu{\'{e}}llar and
               Paul Hankes Drielsma and
               Pierre{-}Cyrille H{\'{e}}am and
               Olga Kouchnarenko and
               Jacopo Mantovani and
               Sebastian M{\"{o}}dersheim and
               David von Oheimb and
               Micha{\"{e}}l Rusinowitch and
               Judson Santiago and
               Mathieu Turuani and
               Luca Vigan{\`{o}} and
               Laurent Vigneron},
  title     = {The {AVISPA} Tool for the Automated Validation of Internet Security
               Protocols and Applications},
  booktitle = {Computer Aided Verification, 17th International Conference, {CAV}
               2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings},
  pages     = {281--285},
  year      = {2005},
  crossref  = {DBLP:conf/cav/2005},
  url       = {https://doi.org/10.1007/11513988\_27},
  doi       = {10.1007/11513988\_27},
  timestamp = {Tue, 14 May 2019 10:00:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cav/ArmandoBBCCCDHKMMORSTVV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesDDMT05,
  author    = {Michael Backes and
               Anupam Datta and
               Ante Derek and
               John C. Mitchell and
               Mathieu Turuani},
  title     = {Compositional Analysis of Contract Signing Protocols},
  booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005),
               20-22 June 2005, Aix-en-Provence, France},
  pages     = {94--110},
  year      = {2005},
  crossref  = {DBLP:conf/csfw/2005},
  url       = {https://doi.org/10.1109/CSFW.2005.12},
  doi       = {10.1109/CSFW.2005.12},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/BackesDDMT05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/DattaDMST05,
  author    = {Anupam Datta and
               Ante Derek and
               John C. Mitchell and
               Vitaly Shmatikov and
               Mathieu Turuani},
  title     = {Probabilistic Polynomial-Time Semantics for a Protocol Security Logic},
  booktitle = {Automata, Languages and Programming, 32nd International Colloquium,
               {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  pages     = {16--29},
  year      = {2005},
  crossref  = {DBLP:conf/icalp/2005},
  url       = {https://doi.org/10.1007/11523468\_2},
  doi       = {10.1007/11523468\_2},
  timestamp = {Tue, 14 May 2019 10:00:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/DattaDMST05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LaroussinieST03,
  author    = {Fran{\c{c}}ois Laroussinie and
               Philippe Schnoebelen and
               Mathieu Turuani},
  title     = {On the expressivity and complexity of quantitative branching-time
               temporal logics},
  journal   = {Theor. Comput. Sci.},
  volume    = {297},
  number    = {1-3},
  pages     = {297--315},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0304-3975(02)00644-8},
  doi       = {10.1016/S0304-3975(02)00644-8},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/LaroussinieST03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/RusinowitchT03,
  author    = {Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Protocol insecurity with a finite number of sessions, composed keys
               is NP-complete},
  journal   = {Theor. Comput. Sci.},
  volume    = {299},
  number    = {1-3},
  pages     = {451--475},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0304-3975(02)00490-5},
  doi       = {10.1016/S0304-3975(02)00490-5},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/RusinowitchT03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/ChevalierKRTV03,
  author    = {Yannick Chevalier and
               Ralf K{\"{u}}sters and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani and
               Laurent Vigneron},
  title     = {Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number
               of Sessions},
  booktitle = {Computer Science Logic, 17th International Workshop, {CSL} 2003, 12th
               Annual Conference of the EACSL, and 8th Kurt G{\"{o}}del Colloquium,
               {KGC} 2003, Vienna, Austria, August 25-30, 2003, Proceedings},
  pages     = {128--141},
  year      = {2003},
  crossref  = {DBLP:conf/csl/2003},
  url       = {https://doi.org/10.1007/978-3-540-45220-1\_13},
  doi       = {10.1007/978-3-540-45220-1\_13},
  timestamp = {Tue, 14 May 2019 10:00:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csl/ChevalierKRTV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/ChevalierKRT03,
  author    = {Yannick Chevalier and
               Ralf K{\"{u}}sters and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Deciding the Security of Protocols with Diffie-Hellman Exponentiation
               and Products in Exponents},
  booktitle = {{FST} {TCS} 2003: Foundations of Software Technology and Theoretical
               Computer Science, 23rd Conference, Mumbai, India, December 15-17,
               2003, Proceedings},
  pages     = {124--135},
  year      = {2003},
  crossref  = {DBLP:conf/fsttcs/2003},
  url       = {https://doi.org/10.1007/978-3-540-24597-1\_11},
  doi       = {10.1007/978-3-540-24597-1\_11},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fsttcs/ChevalierKRT03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/ChevalierKRT03,
  author    = {Yannick Chevalier and
               Ralf K{\"{u}}sters and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {An {NP} Decision Procedure for Protocol Insecurity with {XOR}},
  booktitle = {18th {IEEE} Symposium on Logic in Computer Science {(LICS} 2003),
               22-25 June 2003, Ottawa, Canada, Proceedings},
  pages     = {261--270},
  year      = {2003},
  crossref  = {DBLP:conf/lics/2003},
  url       = {https://doi.org/10.1109/LICS.2003.1210066},
  doi       = {10.1109/LICS.2003.1210066},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lics/ChevalierKRT03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ArmandoBBCCMRTVV02,
  author    = {Alessandro Armando and
               David A. Basin and
               Mehdi Bouallagui and
               Yannick Chevalier and
               Luca Compagna and
               Sebastian M{\"{o}}dersheim and
               Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani and
               Luca Vigan{\`{o}} and
               Laurent Vigneron},
  title     = {The {AVISS} Security Protocol Analysis Tool},
  booktitle = {Computer Aided Verification, 14th International Conference, {CAV}
               2002,Copenhagen, Denmark, July 27-31, 2002, Proceedings},
  pages     = {349--353},
  year      = {2002},
  crossref  = {DBLP:conf/cav/2002},
  url       = {https://doi.org/10.1007/3-540-45657-0\_27},
  doi       = {10.1007/3-540-45657-0\_27},
  timestamp = {Tue, 14 May 2019 10:00:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cav/ArmandoBBCCMRTVV02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RusinowitchT01,
  author    = {Micha{\"{e}}l Rusinowitch and
               Mathieu Turuani},
  title     = {Protocol Insecurity with Finite Number of Sessions is NP-Complete},
  booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
               11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages     = {174--187},
  year      = {2001},
  crossref  = {DBLP:conf/csfw/2001},
  url       = {https://doi.org/10.1109/CSFW.2001.930145},
  doi       = {10.1109/CSFW.2001.930145},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/RusinowitchT01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latin/LaroussinieST00,
  author    = {Fran{\c{c}}ois Laroussinie and
               Philippe Schnoebelen and
               Mathieu Turuani},
  title     = {On the Expressivity and Complexity of Quantitative Branching-Time
               Temporal Logics},
  booktitle = {{LATIN} 2000: Theoretical Informatics, 4th Latin American Symposium,
               Punta del Este, Uruguay, April 10-14, 2000, Proceedings},
  pages     = {437--446},
  year      = {2000},
  crossref  = {DBLP:conf/latin/2000},
  url       = {https://doi.org/10.1007/10719839\_43},
  doi       = {10.1007/10719839\_43},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/latin/LaroussinieST00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2018,
  title     = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
               United Kingdom, July 9-12, 2018},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8428826},
  isbn      = {978-1-5386-6680-7},
  timestamp = {Tue, 14 Aug 2018 12:24:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2018,
  title     = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2018, London, United Kingdom, April 24-26, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8405665},
  isbn      = {978-1-5386-4228-3},
  timestamp = {Wed, 11 Jul 2018 11:39:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2016w,
  editor    = {Jeremy Clark and
               Sarah Meiklejohn and
               Peter Y. A. Ryan and
               Dan S. Wallach and
               Michael Brenner and
               Kurt Rohloff},
  title     = {Financial Cryptography and Data Security - {FC} 2016 International
               Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
               26, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9604},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53357-4},
  doi       = {10.1007/978-3-662-53357-4},
  isbn      = {978-3-662-53356-7},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2016w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/8431,
  editor    = {Maritta Heisel and
               Wouter Joosen and
               Javier L{\'{o}}pez and
               Fabio Martinelli},
  title     = {Engineering Secure Future Internet Services and Systems - Current
               Research},
  series    = {Lecture Notes in Computer Science},
  volume    = {8431},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-07452-8},
  doi       = {10.1007/978-3-319-07452-8},
  isbn      = {978-3-319-07451-1},
  timestamp = {Thu, 29 Aug 2019 08:09:56 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/8431},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2012,
  editor    = {Igor V. Kotenko and
               Victor A. Skormin},
  title     = {Computer Network Security - 6th International Conference on Mathematical
               Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
               2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7531},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33704-8},
  doi       = {10.1007/978-3-642-33704-8},
  isbn      = {978-3-642-33703-1},
  timestamp = {Tue, 14 May 2019 10:00:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmmacns/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tacas/2012,
  editor    = {Cormac Flanagan and
               Barbara K{\"{o}}nig},
  title     = {Tools and Algorithms for the Construction and Analysis of Systems
               - 18th International Conference, {TACAS} 2012, Held as Part of the
               European Joint Conferences on Theory and Practice of Software, {ETAPS}
               2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7214},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28756-5},
  doi       = {10.1007/978-3-642-28756-5},
  isbn      = {978-3-642-28755-8},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tacas/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2011-7122,
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Guillermo Navarro{-}Arribas and
               Nora Cuppens{-}Boulahia and
               Sabrina De Capitani di Vimercati},
  title     = {Data Privacy Management and Autonomous Spontaneus Security - 6th International
               Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,
               Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7122},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28879-1},
  doi       = {10.1007/978-3-642-28879-1},
  isbn      = {978-3-642-28878-4},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2011-7122},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fia/2011,
  editor    = {John Domingue and
               Alex Galis and
               Anastasius Gavras and
               Theodore B. Zahariadis and
               Dave Lambert and
               Frances Cleary and
               Petros Daras and
               Srdjan Krco and
               Henning M{\"{u}}ller and
               Man{-}Sze Li and
               Hans Schaffers and
               Volkmar Lotz and
               Federico Alvarez and
               Burkhard Stiller and
               Stamatis Karnouskos and
               Susanna Avessta and
               Michael Nilsson},
  title     = {The Future Internet - Future Internet Assembly 2011: Achievements
               and Technological Promises},
  series    = {Lecture Notes in Computer Science},
  volume    = {6656},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20898-0},
  doi       = {10.1007/978-3-642-20898-0},
  isbn      = {978-3-642-20897-3},
  timestamp = {Wed, 25 Sep 2019 18:18:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fia/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2011revote,
  title     = {2011 International Workshop on Requirements Engineering for Electronic
               Voting Systems, {REVOTE} 2011, Trento, Italy, August 29, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6036120},
  isbn      = {978-1-4577-0951-7},
  timestamp = {Thu, 14 Feb 2019 15:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/re/2011revote},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2010,
  title     = {CRiSIS 2010, Proceedings of the Fifth International Conference on
               Risks and Security of Internet and Systems, Montreal, QC, Canada,
               October 10-13, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5759761},
  isbn      = {978-1-4244-8641-0},
  timestamp = {Wed, 06 Feb 2019 10:30:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crisis/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2009,
  title     = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
               {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5230482},
  isbn      = {978-0-7695-3712-2},
  timestamp = {Fri, 13 May 2016 11:47:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/psec/2009,
  editor    = {V{\'{e}}ronique Cortier and
               Claude Kirchner and
               Mitsuhiro Okada and
               Hideki Sakurada},
  title     = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese
               Collaboration},
  series    = {Lecture Notes in Computer Science},
  volume    = {5458},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02002-5},
  doi       = {10.1007/978-3-642-02002-5},
  isbn      = {978-3-642-02001-8},
  timestamp = {Tue, 14 May 2019 10:00:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/psec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rta/2006,
  editor    = {Frank Pfenning},
  title     = {Term Rewriting and Applications, 17th International Conference, {RTA}
               2006, Seattle, WA, USA, August 12-14, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4098},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11805618},
  doi       = {10.1007/11805618},
  isbn      = {3-540-36834-5},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rta/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cav/2005,
  editor    = {Kousha Etessami and
               Sriram K. Rajamani},
  title     = {Computer Aided Verification, 17th International Conference, {CAV}
               2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3576},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b138445},
  doi       = {10.1007/b138445},
  isbn      = {3-540-27231-3},
  timestamp = {Tue, 14 May 2019 10:00:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cav/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2005,
  title     = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005),
               20-22 June 2005, Aix-en-Provence, France},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9853},
  isbn      = {0-7695-2340-4},
  timestamp = {Fri, 13 May 2016 11:50:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2005,
  editor    = {Lu{\'{\i}}s Caires and
               Giuseppe F. Italiano and
               Lu{\'{\i}}s Monteiro and
               Catuscia Palamidessi and
               Moti Yung},
  title     = {Automata, Languages and Programming, 32nd International Colloquium,
               {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3580},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11523468},
  doi       = {10.1007/11523468},
  isbn      = {3-540-27580-0},
  timestamp = {Tue, 14 May 2019 10:00:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csl/2003,
  editor    = {Matthias Baaz and
               Johann A. Makowsky},
  title     = {Computer Science Logic, 17th International Workshop, {CSL} 2003, 12th
               Annual Conference of the EACSL, and 8th Kurt G{\"{o}}del Colloquium,
               {KGC} 2003, Vienna, Austria, August 25-30, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2803},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13224},
  doi       = {10.1007/b13224},
  isbn      = {3-540-40801-0},
  timestamp = {Tue, 14 May 2019 10:00:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csl/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fsttcs/2003,
  editor    = {Paritosh K. Pandya and
               Jaikumar Radhakrishnan},
  title     = {{FST} {TCS} 2003: Foundations of Software Technology and Theoretical
               Computer Science, 23rd Conference, Mumbai, India, December 15-17,
               2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2914},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b94618},
  doi       = {10.1007/b94618},
  isbn      = {3-540-20680-9},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fsttcs/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lics/2003,
  title     = {18th {IEEE} Symposium on Logic in Computer Science {(LICS} 2003),
               22-25 June 2003, Ottawa, Canada, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8592},
  isbn      = {0-7695-1884-2},
  timestamp = {Fri, 21 Nov 2014 14:08:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lics/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cav/2002,
  editor    = {Ed Brinksma and
               Kim Guldstrand Larsen},
  title     = {Computer Aided Verification, 14th International Conference, {CAV}
               2002,Copenhagen, Denmark, July 27-31, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2404},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45657-0},
  doi       = {10.1007/3-540-45657-0},
  isbn      = {3-540-43997-8},
  timestamp = {Tue, 14 May 2019 10:00:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cav/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2001,
  title     = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
               11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  publisher = {{IEEE} Computer Society},
  year      = {2001},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7408},
  isbn      = {0-7695-1146-5},
  timestamp = {Fri, 13 May 2016 11:52:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/latin/2000,
  editor    = {Gaston H. Gonnet and
               Daniel Panario and
               Alfredo Viola},
  title     = {{LATIN} 2000: Theoretical Informatics, 4th Latin American Symposium,
               Punta del Este, Uruguay, April 10-14, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1776},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/10719839},
  doi       = {10.1007/10719839},
  isbn      = {3-540-67306-7},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/latin/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics