Travelled to:
1 × Australia
1 × Brazil
1 × Canada
1 × France
1 × Japan
1 × Poland
1 × Portugal
1 × United Kingdom
2 × Spain
2 × USA
Collaborated with:
∅ V.Cortier S.Delaune S.Bursuc V.Shmatikov G.Scerri V.Cheval M.Abadi B.Blanchet F.Jacquemard N.Perrin
Talks about:
secur (6) protocol (4) properti (4) constraint (3) decis (3) algebra (2) system (2) result (2) intrud (2) model (2)
Person: Hubert Comon-Lundh
DBLP: Comon-Lundh:Hubert
Contributed to:
Wrote 12 papers:
- CADE-2013-Comon-LundhCS #deduction
- Tractable Inference Systems: An Extension with a Deducibility Predicate (HCL, VC, GS), pp. 91–108.
- LICS-2013-Comon-Lundh #logic #modelling #named #problem #security
- LICS: Logic in Computer Security — Some Attacker’s Models and Related Decision Problems (HCL), p. 1.
- IJCAR-2010-ChevalCD #analysis #automation #constraints #equivalence #security
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems (VC, HCL, SD), pp. 412–426.
- CAV-2009-AbadiBC #modelling #protocol #proving #security
- Models and Proofs of Protocol Security: A Progress Report (MA, BB, HCL), pp. 35–49.
- RTA-2009-BursucC #algebra #bound #protocol #security
- Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions (SB, HCL), pp. 133–147.
- IJCAR-2008-Comon-Lundh #automation #challenge #protocol #security #verification
- Challenges in the Automated Verification of Security Protocols (HCL), pp. 396–409.
- FoSSaCS-2007-Comon-LundhJP #automaton #constraints #memory management
- Tree Automata with Memory, Visibility and Structural Constraints (HCL, FJ, NP), pp. 168–182.
- RTA-2005-Comon-LundhD #algebra #finite #how
- The Finite Variant Property: How to Get Rid of Some Algebraic Properties (HCL, SD), pp. 294–307.
- FoSSaCS-2004-Comon-Lundh
- Intruder Theories (Ongoing Work) (HCL), pp. 1–4.
- ESOP-2003-Comon-LundhC #security
- Security Properties: Two Agents Are Sufficient (HCL, VC), pp. 99–113.
- LICS-2003-Comon-LundhS #constraints #deduction #theorem proving
- Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or (HCL, VS), p. 271–?.
- RTA-2003-Comon-LundhC #decidability #encryption #first-order #logic #protocol
- New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols (HCL, VC), pp. 148–164.