Travelled to:
1 × Brazil
1 × Canada
1 × Italy
1 × Japan
1 × Latvia
1 × Poland
2 × United Kingdom
Collaborated with:
V.Cortier H.Comon-Lundh S.Kremer R.Chrétien D.Pasaila M.Arnaud V.Cheval S.Ciobaca M.Baudet P.Lafourcade D.Lugiez R.Treinen
Talks about:
protocol (5) secur (5) constraint (2) properti (2) knowledg (2) analysi (2) theori (2) system (2) symbol (2) comput (2)
Person: Stéphanie Delaune
DBLP: Delaune:St=eacute=phanie
Contributed to:
Wrote 8 papers:
- ICALP-v2-2013-ChretienCD #automaton #protocol #security
- From Security Protocols to Pushdown Automata (RC, VC, SD), pp. 137–149.
- IJCAR-2012-DelauneKP #constraints #protocol #security
- Security Protocols, Constraint Systems, and Group Theories (SD, SK, DP), pp. 164–178.
- CADE-2011-ArnaudCD #protocol #recursion #security #testing
- Deciding Security for Protocols with Recursive Tests (MA, VC, SD), pp. 49–63.
- IJCAR-2010-ChevalCD #analysis #automation #constraints #equivalence #security
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems (VC, HCL, SD), pp. 412–426.
- CADE-2009-CiobacaDK #convergence #equation #protocol #security
- Computing Knowledge in Security Protocols under Convergent Equational Theories (SC, SD, SK), pp. 355–370.
- RTA-2009-BaudetCD #named
- YAPA: A Generic Tool for Computing Intruder Knowledge (MB, VC, SD), pp. 148–163.
- ICALP-v2-2006-DelauneLLT #analysis #morphism #protocol
- Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or (SD, PL, DL, RT), pp. 132–143.
- RTA-2005-Comon-LundhD #algebra #finite #how
- The Finite Variant Property: How to Get Rid of Some Algebraic Properties (HCL, SD), pp. 294–307.