Name
Papers
Collaborators
YASSINE LAKHNECH
69
77
Citations 
PageRank 
Referers 
913
78.50
1211
Referees 
References 
922
1086
Search Limit
1001000
Title
Citations
PageRank
Year
On the existence and decidability of unique decompositions of processes in the applied π-calculus.00.342016
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols.100.522015
Formal Verification of e-Reputation Protocols.00.342014
Fully automated analysis of padding-based encryption in the computational model210.862013
Information flow control of component-based distributed systems40.452013
CIL Security Proof for a Password-Based Key Exchange00.342013
Automated Security Proofs for Almost-Universal Hash for MAC verification.20.362013
On unique decomposition of processes in the applied π-calculus40.492013
A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks00.342013
Formal verification of e-auction protocols140.572013
Defining Privacy for Weighted Votes, Single and Multi-voter Coercion.70.512012
Automation in computer-aided cryptography: proofs, attacks and designs00.342012
Automated Analysis and Synthesis of Padding-Based Encryption Schemes.00.342012
Sécuriser les systèmes distribués à base de composants par contrôle de flux d'information.00.342012
Generic Indifferentiability Proofs of Hash Designs30.382012
A computational indistinguishability logic for the bounded storage model20.372011
Vote-independence: a powerful privacy notion for voting protocols90.502011
Automated verification of block cipher modes of operation, an improved method40.462011
Certified security proofs of cryptographic protocols in the computational model: an application to intrusion resilience50.422011
Automating information flow control in component-based distributed systems60.442011
Computational Indistinguishability Logic180.712010
On the Equality of Probabilistic Terms70.442010
Automated security proof for symmetric encryption modes90.532009
Flat Parametric Counter Automata261.082009
Formal indistinguishability extended to the random oracle model10.362009
Towards automated proofs for asymmetric encryption schemes in the random oracle model240.862008
A generalization of DDH with applications to protocol analysis and computational soundness230.702007
Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions70.492007
Computationally sound typing for non-interference: the case of deterministic encryption80.542007
Pattern-Based Abstraction for Verifying Secrecy in Protocols180.782006
Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme50.432005
Completing the picture: soundness of formal encryption in the presence of active adversaries431.322005
A symbolic decision procedure for cryptographic protocols with time stamps160.702005
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation30.392005
Automatic Verification of Security Properties Based on Abstractions00.342005
A Symbolic Decision Procedure for Cryptographic Protocols with Time Stamps (Extended Abstract)20.382004
On Logics of Aliasing110.692004
On the Existence of an Effective and Complete Inference System for Cryptographic Protocols10.362004
Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems, Joint International Conferences on Formal Modelling and Analysis of Timed Systems, FORMATS 2004 and Formal Techniques in Real-Time and Fault-Tolerant Systems, FTRTFT 2004, Grenoble, France, September 22-24, 2004, Proceedings262.192004
Abstraction as the Key for Invariant Verification50.422003
Parameterized Verification of a Cache Coherence Protocol: Safety and Liveness271.252002
Incremental Verification by Abstraction432.932001
Analyzing Fair Parametric Extended Automata50.502001
Verifying Untimed and Timed Aspects of the Experimental Batch Plant20.432001
Discussion on: Modeling and Adaptive Control of Aerobic Continuous Stirred Tank Reactors by P. Georgieva, A. Ilchmann and M.-F. Weirig00.342001
Verification of Parameterized Protocols130.782001
Abstracting WS1S Systems to Verify Parameterized Networks271.092000
Verifying Universal Properties of Parameterized Networks100.642000
A Transformational Approach for Generating Non-linear Invariants80.792000
Basic Principles of a textbook on the compositional and noncompositional verification of concurrent programs00.342000
  • 1
  • 2