BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Australia
1 × Brazil
1 × Canada
1 × France
1 × Japan
1 × Poland
1 × Portugal
1 × United Kingdom
2 × Spain
2 × USA
Collaborated with:
V.Cortier S.Delaune S.Bursuc V.Shmatikov G.Scerri V.Cheval M.Abadi B.Blanchet F.Jacquemard N.Perrin
Talks about:
secur (6) protocol (4) properti (4) constraint (3) decis (3) algebra (2) system (2) result (2) intrud (2) model (2)

Person: Hubert Comon-Lundh

DBLP DBLP: Comon-Lundh:Hubert

Contributed to:

CADE 20132013
LICS 20132013
IJCAR 20102010
CAV 20092009
RTA 20092009
IJCAR 20082008
FoSSaCS 20072007
RTA 20052005
FoSSaCS 20042004
ESOP 20032003
LICS 20032003
RTA 20032003

Wrote 12 papers:

CADE-2013-Comon-LundhCS #deduction
Tractable Inference Systems: An Extension with a Deducibility Predicate (HCL, VC, GS), pp. 91–108.
LICS-2013-Comon-Lundh #logic #modelling #named #problem #security
LICS: Logic in Computer Security — Some Attacker’s Models and Related Decision Problems (HCL), p. 1.
IJCAR-2010-ChevalCD #analysis #automation #constraints #equivalence #security
Automating Security Analysis: Symbolic Equivalence of Constraint Systems (VC, HCL, SD), pp. 412–426.
CAV-2009-AbadiBC #modelling #protocol #proving #security
Models and Proofs of Protocol Security: A Progress Report (MA, BB, HCL), pp. 35–49.
RTA-2009-BursucC #algebra #bound #protocol #security
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions (SB, HCL), pp. 133–147.
IJCAR-2008-Comon-Lundh #automation #challenge #protocol #security #verification
Challenges in the Automated Verification of Security Protocols (HCL), pp. 396–409.
FoSSaCS-2007-Comon-LundhJP #automaton #constraints #memory management
Tree Automata with Memory, Visibility and Structural Constraints (HCL, FJ, NP), pp. 168–182.
RTA-2005-Comon-LundhD #algebra #finite #how
The Finite Variant Property: How to Get Rid of Some Algebraic Properties (HCL, SD), pp. 294–307.
FoSSaCS-2004-Comon-Lundh
Intruder Theories (Ongoing Work) (HCL), pp. 1–4.
ESOP-2003-Comon-LundhC #security
Security Properties: Two Agents Are Sufficient (HCL, VC), pp. 99–113.
LICS-2003-Comon-LundhS #constraints #deduction #theorem proving
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or (HCL, VS), p. 271–?.
RTA-2003-Comon-LundhC #decidability #encryption #first-order #logic #protocol
New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols (HCL, VC), pp. 148–164.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.