Double Mask: An Efficient Rule Encoding for Software Defined Networking | 0 | 0.34 | 2020 |
Gender Inference for Facebook Picture Owners. | 0 | 0.34 | 2019 |
One-variable context-free hedge automata | 0 | 0.34 | 2019 |
Online Testing of User Profile Resilience Against Inference Attacks in Social Networks. | 0 | 0.34 | 2018 |
Private Link Exchange over Social Graphs. | 0 | 0.34 | 2016 |
A Model-Based Testing Approach for Security Protocols. | 0 | 0.34 | 2016 |
Network Structure Release under Differential Privacy. | 0 | 0.34 | 2016 |
Analyse d'activité et exposition de la vie privée sur les médias sociaux. | 0 | 0.34 | 2016 |
Detecting Communities under Differential Privacy. | 2 | 0.36 | 2016 |
Online Link Disclosure Strategies for Social Networks. | 0 | 0.34 | 2016 |
Model‐based mutation testing from security protocols in HLPSL | 4 | 0.41 | 2015 |
Parametrized automata simulation and application to service composition. | 2 | 0.39 | 2015 |
Expressive Equivalence and Succinctness of Parametrized Automata with Respect to Finite Memory Automata. | 0 | 0.34 | 2015 |
Differentially Private Publication of Social Graphs at Linear Cost. | 1 | 0.35 | 2015 |
Practical access control management for distributed collaborative editors. | 6 | 0.43 | 2014 |
An EXPTIME Algorithm for Data-Aware Service Simulation Using Parametrized Automata. | 0 | 0.34 | 2014 |
Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining. | 1 | 0.37 | 2014 |
A Parametrized Propositional Dynamic Logic with Application to Service Synthesis. | 2 | 0.38 | 2014 |
Compiling Symbolic Attacks To Protocol Implementation Tests | 0 | 0.34 | 2013 |
SVMAX: a system for secure and valid manipulation of XML data | 1 | 0.35 | 2013 |
Fresh-Variable Automata for Service Composition | 1 | 0.37 | 2013 |
Secure Collaboration For Smartphones | 0 | 0.34 | 2013 |
Guarded Variable Automata over Infinite Alphabets | 3 | 0.42 | 2013 |
Rewrite Closure and CF Hedge Automata | 1 | 0.36 | 2013 |
Intruder deducibility constraints with negation. Decidability and application to secured service compositions | 1 | 0.35 | 2012 |
Towards the orchestration of secured services under non-disclosure policies | 1 | 0.36 | 2012 |
Decidability of Equivalence of Symbolic Derivations | 5 | 0.44 | 2012 |
Optimistic access control for distributed collaborative editors | 3 | 0.40 | 2011 |
Web services verification and prudent implementation | 4 | 0.40 | 2011 |
Distributed orchestration of web services under security constraints | 2 | 0.37 | 2011 |
String Rewriting and Security Analysis: An Extension of a Result of Book and Otto. | 1 | 0.48 | 2011 |
Safe and efficient strategies for updating firewall policies | 1 | 0.37 | 2010 |
Orchestration under security constraints | 2 | 0.38 | 2010 |
Combinable Extensions of Abelian Groups | 7 | 0.48 | 2009 |
A Flexible Access Control Model for Distributed Collaborative Editors | 4 | 0.40 | 2009 |
Satisfiability Procedures for Combination of Theories Sharing Integer Offsets | 8 | 0.50 | 2009 |
Data structures with arithmetic constraints: a non-disjoint combination | 6 | 0.43 | 2009 |
08171 Abstracts Collection - Beyond the Finite: New Challenges in Verification and Semistructured Data. | 0 | 0.34 | 2008 |
An inference system for detecting firewall filtering rules anomalies | 10 | 0.66 | 2008 |
Automatic Composition of Services with Security Policies | 15 | 0.70 | 2008 |
08171 Summary - Beyond the Finite: New Challenges in Verification and Semistructured Data. | 0 | 0.34 | 2008 |
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption | 7 | 0.45 | 2008 |
Intruders with Caps | 12 | 0.57 | 2007 |
Verifying cryptographic protocols with subterms constraints | 3 | 0.38 | 2007 |
Towards an Automatic Analysis of Web Service Security | 6 | 0.42 | 2007 |
Formal design and verification of operational transformation algorithms for copies convergence | 31 | 1.29 | 2006 |
Automated Reasoning for Security Protocol Analysis | 0 | 0.34 | 2006 |
Combining Intruder Theories | 27 | 1.01 | 2005 |
Towards synchronizing linear collaborative objects with operational transformation | 2 | 0.38 | 2005 |
Deciding the Security of Protocols with Commuting Public Key Encryption | 11 | 0.73 | 2005 |