Travelled to:
1 × Austria
1 × Canada
1 × Denmark
1 × Estonia
1 × Portugal
1 × United Kingdom
2 × USA
Collaborated with:
M.Rusinowitch L.Vigneron M.Turuani R.Küsters A.Armando L.Compagna S.Mödersheim L.Viganò D.A.Basin J.Cuéllar D.v.Oheimb M.Bouallagui Y.Boichut P.H.Drielsma P.Héam O.Kouchnarenko J.Mantovani J.Santiago W.Arsac T.Avanesov M.Barletta A.Calvi A.Cappai R.Carbone G.Erzse S.Frau M.Minea G.Pellegrino S.E.Ponta M.Rocchetto M.T.Dashti
Talks about:
protocol (5) secur (5) intrud (3) autom (3) tool (3) unbound (2) theori (2) combin (2) verif (2) valid (2)
Person: Yannick Chevalier
DBLP: Chevalier:Yannick
Contributed to:
Wrote 9 papers:
- TACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #platform #security #trust #validation
- The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
- RTA-2006-ChevalierR
- Hierarchical Combination of Intruder Theories (YC, MR), pp. 108–122.
- CAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #protocol #security #validation
- The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
- ICALP-2005-ChevalierR
- Combining Intruder Theories (YC, MR), pp. 639–651.
- CSL-2003-ChevalierKRTV #bound
- Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
- LICS-2003-ChevalierKRT #protocol
- An NP Decision Procedure for Protocol Insecurity with XOR (YC, RK, MR, MT), pp. 261–270.
- CAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
- The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
- CAV-2002-ChevalierV #automation #bound #protocol #security #verification
- Automated Unbounded Verification of Security Protocols (YC, LV), pp. 324–337.
- ASE-2001-ChevalierV #lazy evaluation #protocol #security #verification
- A Tool for Lazy Verification of Security Protocols (YC, LV), pp. 373–376.