Yannick Chevalier
Yannick Chevalier
Maître de Conférences en informatique, Université Toulouse 3
Verified email at irit.fr
TitleCited byYear
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
10042005
An NP decision procedure for protocol insecurity with XOR
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Theoretical Computer Science 338 (1-3), 247-274, 2005
2412005
A high level protocol specification language for industrial security-sensitive protocols
Y Chevalier, L Compagna, J Cuellar, PH Drielsma, J Mantovani, ...
1662004
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
International Conference on Foundations of Software Technology and …, 2003
1572003
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
1072012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
982002
Automated unbounded verification of security protocols
Y Chevalier, L Vigneron
International conference on computer aided verification, 324-337, 2002
852002
Combining intruder theories
Y Chevalier, M Rusinowitch
International Colloquium on Automata, Languages, and Programming, 639-651, 2005
672005
A tool for lazy verification of security protocols
Y Chevalier, L Vigneron
Proceedings 16th Annual International Conference on Automated Software …, 2001
542001
Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions
Y Chevalier, R Küsters, M Rusinowitch, M Turuani, L Vigneron
International Workshop on Computer Science Logic, 128-141, 2003
392003
Compiling and securing cryptographic protocols
Y Chevalier, M Rusinowitch
arXiv preprint arXiv:0910.5099, 2009
322009
Hierarchical combination of intruder theories
Y Chevalier, M Rusinowitch
International Conference on Rewriting Techniques and Applications, 108-122, 2006
312006
Automatic composition of services with security policies
Y Chevalier, MA Mekki, M Rusinowitch
2008 IEEE Congress on Services-Part I, 529-537, 2008
292008
Deciding the security of protocols with commuting public key encryption
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Electronic Notes in Theoretical Computer Science 125 (1), 55-66, 2005
292005
Résolution de problemes d’accessibilité pour la compilation et la validation de protocoles cryptographiques
Y Chevalier
These de doctorat, Université Henri Poincaré, Nancy, 2003
282003
Towards an automatic analysis of web service security
Y Chevalier, D Lugiez, M Rusinowitch
International Symposium on Frontiers of Combining Systems, 133-147, 2007
232007
Decidability of equivalence of symbolic derivations
Y Chevalier, M Rusinowitch
Journal of Automated Reasoning 48 (2), 263-292, 2012
222012
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
ACM Transactions on Computational Logic (TOCL) 9 (4), 24, 2008
182008
Hierarchical combination of intruder theories
Y Chevalier, M Rusinowitch
Information and Computation 206 (2-4), 352-377, 2008
172008
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures
Y Chevalier, M Rusinowitch
Theoretical Computer Science 411 (10), 1261-1282, 2010
152010
The system can't perform the operation now. Try again later.
Articles 1–20