BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Austria
1 × Canada
1 × Denmark
1 × Estonia
1 × Portugal
1 × United Kingdom
2 × USA
Collaborated with:
M.Rusinowitch L.Vigneron M.Turuani R.Küsters A.Armando L.Compagna S.Mödersheim L.Viganò D.A.Basin J.Cuéllar D.v.Oheimb M.Bouallagui Y.Boichut P.H.Drielsma P.Héam O.Kouchnarenko J.Mantovani J.Santiago W.Arsac T.Avanesov M.Barletta A.Calvi A.Cappai R.Carbone G.Erzse S.Frau M.Minea G.Pellegrino S.E.Ponta M.Rocchetto M.T.Dashti
Talks about:
protocol (5) secur (5) intrud (3) autom (3) tool (3) unbound (2) theori (2) combin (2) verif (2) valid (2)

Person: Yannick Chevalier

DBLP DBLP: Chevalier:Yannick

Contributed to:

TACAS 20122012
RTA 20062006
CAV 20052005
ICALP 20052005
CSL 20032003
LICS 20032003
CAV 20022002
ASE 20012001

Wrote 9 papers:

TACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #platform #security #trust #validation
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
Hierarchical Combination of Intruder Theories (YC, MR), pp. 108–122.
CAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #protocol #security #validation
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
Combining Intruder Theories (YC, MR), pp. 639–651.
CSL-2003-ChevalierKRTV #bound
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
LICS-2003-ChevalierKRT #protocol
An NP Decision Procedure for Protocol Insecurity with XOR (YC, RK, MR, MT), pp. 261–270.
CAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
CAV-2002-ChevalierV #automation #bound #protocol #security #verification
Automated Unbounded Verification of Security Protocols (YC, LV), pp. 324–337.
ASE-2001-ChevalierV #lazy evaluation #protocol #security #verification
A Tool for Lazy Verification of Security Protocols (YC, LV), pp. 373–376.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.