The AVISPA tool for the automated validation of internet security protocols and applications A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ... Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005 | 1593 | 2005 |
An NP decision procedure for protocol insecurity with XOR Y Chevalier, R Küsters, M Rusinowitch, M Turuani Theoretical Computer Science 338 (1-3), 247-274, 2005 | 267 | 2005 |
A high level protocol specification language for industrial security-sensitive protocols Y Chevalier, L Compagna, J Cuellar, PH Drielsma, J Mantovani, ... Workshop on Specification and Automated Processing of Security Requirements …, 2004 | 213 | 2004 |
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents Y Chevalier, R Küsters, M Rusinowitch, M Turuani International Conference on Foundations of Software Technology and …, 2003 | 166 | 2003 |
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ... Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012 | 141 | 2012 |
The AVISS security protocol analysis tool A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ... Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002 | 105 | 2002 |
Automated unbounded verification of security protocols Y Chevalier, L Vigneron Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002 | 94 | 2002 |
Combining intruder theories Y Chevalier, M Rusinowitch International Colloquium on Automata, Languages, and Programming, 639-651, 2005 | 69 | 2005 |
A tool for lazy verification of security protocols Y Chevalier, L Vigneron Proceedings 16th Annual International Conference on Automated Software …, 2001 | 61 | 2001 |
Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions Y Chevalier, R Küsters, M Rusinowitch, M Turuani, L Vigneron International Workshop on Computer Science Logic, 128-141, 2003 | 43 | 2003 |
Compiling and securing cryptographic protocols Y Chevalier, M Rusinowitch Information Processing Letters 110 (3), 116-122, 2010 | 37 | 2010 |
Deciding the security of protocols with commuting public key encryption Y Chevalier, R Küsters, M Rusinowitch, M Turuani Electronic Notes in Theoretical Computer Science 125 (1), 55-66, 2005 | 32 | 2005 |
A visual analytics approach for the cyber forensics based on different views of the network traffic. IV Kotenko, M Kolomeets, A Chechulin, Y Chevalier J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (2), 57-73, 2018 | 31 | 2018 |
Automatic composition of services with security policies Y Chevalier, MA Mekki, M Rusinowitch 2008 IEEE Congress on Services-Part I, 529-537, 2008 | 31 | 2008 |
Hierarchical combination of intruder theories Y Chevalier, M Rusinowitch International Conference on Rewriting Techniques and Applications, 108-122, 2006 | 31 | 2006 |
Towards an automatic analysis of web service security Y Chevalier, D Lugiez, M Rusinowitch Frontiers of Combining Systems: 6th International Symposium, FroCoS 2007 …, 2007 | 27 | 2007 |
Résolution de problèmes d'accessiblité pour la compilation et la validation de protocoles cryptographiques. Y Chevalier Henri Poincaré University, Nancy, France, 2003 | 26 | 2003 |
Decidability of equivalence of symbolic derivations Y Chevalier, M Rusinowitch Journal of Automated Reasoning 48, 263-292, 2012 | 22 | 2012 |
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures Y Chevalier, M Rusinowitch Theoretical Computer Science 411 (10), 1261-1282, 2010 | 20 | 2010 |
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption Y Chevalier, R Küsters, M Rusinowitch, M Turuani ACM Transactions on Computational Logic (TOCL) 9 (4), 1-52, 2008 | 20 | 2008 |