Michel Boyer

According to our database1, Michel Boyer authored at least 29 papers between 1984 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Simple and Rigorous Proof Method for Practical Security of Quantum Key Distribution in the Single-Qubit Regime Using Mismatched Basis Measurements.
CoRR, 2022

Composable Security of Generalized BB84 Protocols Against General Attacks.
CoRR, 2022

2020
Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis.
Theor. Comput. Sci., 2020

2018
Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol.
Entropy, 2018

2017
Extrapolated quantum states, void states and a huge novel class of distillable entangled states.
Soft Comput., 2017

A New and Feasible Protocol for Semi-quantum Key Distribution.
CoRR, 2017

Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis.
Proceedings of the COMPLEXIS 2016, 2017

2014
Extrapolated States, Void States, and a Huge Novel Class of Distillable Entangled States.
Proceedings of the Theory and Practice of Natural Computing, 2014

2012
Attacks on Fixed Apparatus Quantum Key Distribution Schemes.
Proceedings of the Theory and Practice of Natural Computing, 2012

Undesirable Aspect Interactions: A Prevention Policy for Three Aspect Fault Types.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
Undesirable Aspect Interactions: A Prevention Policy.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

A Categorical Modeling Approach of Aspect-Oriented Systems.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

2010
The impact of IT on the growth and development of insular firms.
J. Syst. Inf. Technol., 2010

2009
Security of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks.
Algorithms, 2009

2008
Semi-Quantum Key Distribution.
CoRR, 2008

2007
Quantum Key Distribution with Classical Bob.
Proceedings of the First International Conference on Quantum, Nano, and Micro Technologies, 2007

2006
A Proof of the Security of Quantum Key Distribution.
J. Cryptol., 2006

2002
Security of Quantum Key Distribution against All Collective Attacks.
Algorithmica, 2002

2001
Optimal design of synchronous circuits using software pipelining techniques.
ACM Trans. Design Autom. Electr. Syst., 2001

2000
A proof of the security of quantum key distribution (extended abstract).
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

1999
Reasoning about Solids Using Constraint Logic Programming.
J. Autom. Reason., 1999

1994
QUAD-CLP(R): Adding the Power of Quadratic Constraints.
Proceedings of the Principles and Practice of Constraint Programming, 1994

1993
Handling Quadratic Constraints through Geometry.
Proceedings of the Logic Programming, 1993

1992
Control-flow based testing of Prolog programs.
Proceedings of the Third International Symposium on Software Reliability Engineering, 1992

1991
Nonstandard Answers of Elementary Logic Programs.
Proceedings of the Constructing Logic Programs, 1991

1990
Elementary Logic Programs.
Proceedings of the Programming Language Implementation and Logic Programming, 1990

1988
Prolog Meta-Programming with Soft Databases.
Proceedings of the Meta-Programming in Logic Programming, 1988

1987
Towards Functional Logic Grammars.
Proceedings of the Natural Language Understanding and Logic Programming, 1987

1984
Generating Sentences from Semantic Networks.
Proceedings of the Natural Language Understanding and Logic Programming, 1984


  Loading...