Yannick Chevalier

Orcid: 0000-0002-8617-4209

According to our database1, Yannick Chevalier authored at least 54 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Éléments d'état de l'art sur l'extraction et la modélisation de règles formelles à partir de textes légaux.
Proceedings of the 34es Journées francophones d'Ingénierie des Connaissances, 2023

2022
Deciding Whether two Codes Have the Same Ambiguities is in co-NP.
Proceedings of the 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2022

2021
Implementing Security Protocol Monitors.
Proceedings of the 9th International Symposium on Symbolic Computation in Software Science, 2021

2020
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems.
Simul. Model. Pract. Theory, 2020

Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models.
Simul. Model. Pract. Theory, 2020

Decidability of Deterministic Process Equivalence for Finitary Deduction Systems.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

2019
Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection.
Proceedings of the Intelligent Distributed Computing XIII, 2019

2018
A visual analytics approach for the cyber forensics based on different views of the network traffic.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

2017
Satisfiability of general intruder constraints with and without a set constructor.
J. Symb. Comput., 2017

Intruder deducibility constraints with negation. Decidability and application to secured service compositions.
J. Symb. Comput., 2017

Self-Correcting Unsound Reasoning Agents.
Proceedings of the 4th International Workshop on Defeasible and Ampliative Reasoning (DARe-17) co-located with the 14th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR 2017), 2017

2015
Parametrized automata simulation and application to service composition.
J. Symb. Comput., 2015

Expressive Equivalence and Succinctness of Parametrized Automata with Respect to Finite Memory Automata.
Proceedings of the Service-Oriented Computing - ICSOC 2015 Workshops, 2015

2014
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems.
J. Netw. Comput. Appl., 2014

An EXPTIME Algorithm for Data-Aware Service Simulation Using Parametrized Automata.
Proceedings of the Service-Oriented Computing - ICSOC 2014 Workshops, 2014

2013
Guarded Variable Automata over Infinite Alphabets
CoRR, 2013

Fresh-Variable Automata for Service Composition
CoRR, 2013

Fresh-Variable Automata: Application to Service Composition.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

2012
Decidability of Equivalence of Symbolic Derivations.
J. Autom. Reason., 2012

Automated Synthesis of a Finite Complexity Ordering for Saturation
CoRR, 2012

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Towards the Orchestration of Secured Services under Non-disclosure Policies.
Proceedings of the Computer Network Security, 2012

2011
Finitary Deduction Systems
CoRR, 2011

Distributed Orchestration of Web Services under Security Constraints.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Web Services Verification and Prudent Implementation.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures.
Theor. Comput. Sci., 2010

Compiling and securing cryptographic protocols.
Inf. Process. Lett., 2010

Orchestration under Security Constraints.
Proceedings of the Formal Methods for Components and Objects - 9th International Symposium, 2010

An intruder model for trust negotiation.
Proceedings of the CRiSIS 2010, 2010

Satisfiability of general intruder constraints with a set constructor.
Proceedings of the CRiSIS 2010, 2010

2009
On the Decidability of (ground) Reachability Problems for Cryptographic Protocols (extended version)
CoRR, 2009

A logical framework for reasoning about policies with trust negotiations and workflows in a distributed environment.
Proceedings of the CRiSIS 2009, 2009

2008
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption.
ACM Trans. Comput. Log., 2008

Hierarchical combination of intruder theories.
Inf. Comput., 2008

Automatic Composition of Services with Security Policies.
Proceedings of the 2008 IEEE Congress on Services, Part I, 2008

A Logical Approach to Dynamic Role-Based Access Control.
Proceedings of the Artificial Intelligence: Methodology, 2008

2007
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version)
CoRR, 2007

Verifying Cryptographic Protocols with Subterms Constraints.
Proceedings of the Logic for Programming, 2007

Key Substitution in the Symbolic Analysis of Cryptographic Protocols.
Proceedings of the FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, 2007

Towards an Automatic Analysis of Web Service Security.
Proceedings of the Frontiers of Combining Systems, 6th International Symposium, 2007

2006
A Symbolic Intruder Model for Hash-Collision Attacks.
Proceedings of the Advances in Computer Science, 2006

2005
An NP decision procedure for protocol insecurity with XOR.
Theor. Comput. Sci., 2005

Combining Intruder Theories.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2004
Rule-based Programs Describing Internet Security Protocols.
Proceedings of the 5th International Workshop on Rule-Based Programming, 2004

Deciding the Security of Protocols with Commuting Public Key Encryption.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

Strategy for Verifying Security Protocols with Unbounded Message Size.
Autom. Softw. Eng., 2004

2003
Résolution de problèmes d'accessiblité pour la compilation et la validation de protocoles cryptographiques.
PhD thesis, 2003

Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents.
Proceedings of the FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 2003

Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions.
Proceedings of the Computer Science Logic, 17th International Workshop, 2003

2002
Automated Unbounded Verification of Security Protocols.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

The AVISS Security Protocol Analysis Tool.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
A Tool for Lazy Verification of Security Protocols.
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001


  Loading...