Laurent Vigneron

Affiliations:
  • INRIA, France


According to our database1, Laurent Vigneron authored at least 25 papers between 1994 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2011
Déduction automatique appliquée à l'analyse et la vérification de systèmes infinis. (Automated Deduction applied to the Analysis and Verification of Infinite State Systems).
, 2011

2010
Formal verification of secure group communication protocols modelled in UML.
Innov. Syst. Softw. Eng., 2010

Design and verification of a non-repudiation protocol based on receiver-side smart card.
IET Inf. Secur., 2010

2008
Tree automata with equality constraints modulo equational theories.
J. Log. Algebraic Methods Program., 2008

Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

2007
Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder
CoRR, 2007

Automated verification of a key management architecture for hierarchical group protocols.
Ann. des Télécommunications, 2007

Optimistic Non-repudiation Protocol Analysis.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

2005
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2004
Preface.
J. Autom. Reason., 2004

Rule-based Programs Describing Internet Security Protocols.
Proceedings of the 5th International Workshop on Rule-Based Programming, 2004

Strategy for Verifying Security Protocols with Unbounded Message Size.
Autom. Softw. Eng., 2004

2003
Abstract Congruence Closure.
J. Autom. Reason., 2003

Preface.
Proceedings of the 4th International Workshop on First-Order Theorem Proving, 2003

Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions.
Proceedings of the Computer Science Logic, 17th International Workshop, 2003

2002
Automated Unbounded Verification of Security Protocols.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

The AVISS Security Protocol Analysis Tool.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
A Tool for Lazy Verification of Security Protocols.
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001

2000
Compiling and Verifying Security Protocols.
Proceedings of the Logic for Programming and Automated Reasoning, 2000

Congruence Closure Modulo Associativity and Commutativity.
Proceedings of the Frontiers of Combining Systems, 2000

1998
Automated Deduction Techniques for Studying Rough Algebras.
Fundam. Informaticae, 1998

1995
Automated deduction with associative-commutative operators.
Appl. Algebra Eng. Commun. Comput., 1995

Positive Deduction modulo Regular Theories.
Proceedings of the Computer Science Logic, 9th International Workshop, 1995

1994
Déduction automatique avec contraintes symboliques dans les théories équationnelles. (Automated deduction with symbolic constraints in equational theories).
PhD thesis, 1994

Associative-Commutative Deduction with Constraints.
Proceedings of the Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26, 1994


  Loading...