Travelled to:
1 × Austria
1 × Denmark
1 × France
1 × United Kingdom
2 × USA
Collaborated with:
Y.Chevalier M.Rusinowitch ∅ M.Turuani F.Jacquemard R.Küsters A.Armando D.A.Basin L.Compagna S.Mödersheim L.Viganò M.Bouallagui Y.Boichut J.Cuéllar P.H.Drielsma P.Héam O.Kouchnarenko J.Mantovani D.v.Oheimb J.Santiago
Talks about:
protocol (4) secur (4) tool (3) constraint (2) unbound (2) verif (2) autom (2) internet (1) automata (1) session (1)
Person: Laurent Vigneron
DBLP: Vigneron:Laurent
Contributed to:
Wrote 7 papers:
- IJCAR-2006-JacquemardRV #automaton #constraints #equation #similarity
- Tree Automata with Equality Constraints Modulo Equational Theories (FJ, MR, LV), pp. 557–571.
- CAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #protocol #security #validation
- The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
- CSL-2003-ChevalierKRTV #bound
- Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
- CAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
- The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
- CAV-2002-ChevalierV #automation #bound #protocol #security #verification
- Automated Unbounded Verification of Security Protocols (YC, LV), pp. 324–337.
- ASE-2001-ChevalierV #lazy evaluation #protocol #security #verification
- A Tool for Lazy Verification of Security Protocols (YC, LV), pp. 373–376.
- CADE-1994-Vigneron #commutative #constraints #deduction
- Associative-Commutative Deduction with Constraints (LV), pp. 530–544.