Follow
Yannick Chevalier
Yannick Chevalier
Maître de Conférences en informatique, IRIT, Université Toulouse 3
Verified email at irit.fr - Homepage
Title
Cited by
Cited by
Year
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
16332005
An NP decision procedure for protocol insecurity with XOR
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Theoretical Computer Science 338 (1-3), 247-274, 2005
2682005
A high level protocol specification language for industrial security-sensitive protocols
Y Chevalier, L Compagna, J Cuellar, PH Drielsma, J Mantovani, ...
Workshop on Specification and Automated Processing of Security Requirements …, 2004
2172004
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
International Conference on Foundations of Software Technology and …, 2003
1672003
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1442012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002
1062002
Automated unbounded verification of security protocols
Y Chevalier, L Vigneron
Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002
952002
Combining intruder theories
Y Chevalier, M Rusinowitch
International Colloquium on Automata, Languages, and Programming, 639-651, 2005
702005
A tool for lazy verification of security protocols
Y Chevalier, L Vigneron
Proceedings 16th Annual International Conference on Automated Software …, 2001
612001
Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions
Y Chevalier, R Küsters, M Rusinowitch, M Turuani, L Vigneron
International Workshop on Computer Science Logic, 128-141, 2003
442003
Compiling and securing cryptographic protocols
Y Chevalier, M Rusinowitch
Information Processing Letters 110 (3), 116-122, 2010
382010
Deciding the security of protocols with commuting public key encryption
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Electronic Notes in Theoretical Computer Science 125 (1), 55-66, 2005
332005
A visual analytics approach for the cyber forensics based on different views of the network traffic.
IV Kotenko, M Kolomeets, A Chechulin, Y Chevalier
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (2), 57-73, 2018
312018
Automatic composition of services with security policies
Y Chevalier, MA Mekki, M Rusinowitch
2008 IEEE Congress on Services-Part I, 529-537, 2008
312008
Hierarchical combination of intruder theories
Y Chevalier, M Rusinowitch
International Conference on Rewriting Techniques and Applications, 108-122, 2006
312006
Towards an automatic analysis of web service security
Y Chevalier, D Lugiez, M Rusinowitch
Frontiers of Combining Systems: 6th International Symposium, FroCoS 2007 …, 2007
272007
Résolution de problèmes d'accessiblité pour la compilation et la validation de protocoles cryptographiques.
Y Chevalier
Henri Poincaré University, Nancy, France, 2003
262003
Decidability of equivalence of symbolic derivations
Y Chevalier, M Rusinowitch
Journal of Automated Reasoning 48, 263-292, 2012
222012
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures
Y Chevalier, M Rusinowitch
Theoretical Computer Science 411 (10), 1261-1282, 2010
202010
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
ACM Transactions on Computational Logic (TOCL) 9 (4), 1-52, 2008
202008
The system can't perform the operation now. Try again later.
Articles 1–20