default search action
Yannick Chevalier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c35]Jeremy Bouche-Pillon, Nathalie Aussenac-Gilles, Pascale Zaraté, Yannick Chevalier, Pierre-Yves Gicquel:
Éléments d'état de l'art sur l'extraction et la modélisation de règles formelles à partir de textes légaux. IC 2023: 79-84 - 2022
- [c34]Yannick Chevalier, Michaël Rusinowitch:
Deciding Whether two Codes Have the Same Ambiguities is in co-NP. SYNASC 2022: 84-91 - 2021
- [c33]Yannick Chevalier, Michaël Rusinowitch:
Implementing Security Protocol Monitors. SCSS 2021: 22-34 - 2020
- [j14]Florian Fenzl, Roland Rieke, Yannick Chevalier, Andreas Dominik, Igor V. Kotenko:
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models. Simul. Model. Pract. Theory 105: 102143 (2020) - [j13]Dmitry Levshun, Yannick Chevalier, Igor V. Kotenko, Andrey Chechulin:
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems. Simul. Model. Pract. Theory 105: 102151 (2020) - [c32]Yannick Chevalier, Fabian Romero:
Decidability of Deterministic Process Equivalence for Finitary Deduction Systems. PDP 2020: 441-444
2010 – 2019
- 2019
- [c31]Yannick Chevalier, Roland Rieke, Florian Fenzl, Andrey Chechulin, Igor V. Kotenko:
ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection. IDC 2019: 495-504 - [c30]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko, Yannick Chevalier:
Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems. NTMS 2019: 1-5 - 2018
- [j12]Igor V. Kotenko, Maxim Kolomeets, Andrey Chechulin, Yannick Chevalier:
A visual analytics approach for the cyber forensics based on different views of the network traffic. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(2): 57-73 (2018) - 2017
- [j11]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Intruder deducibility constraints with negation. Decidability and application to secured service compositions. J. Symb. Comput. 80: 4-26 (2017) - [j10]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of general intruder constraints with and without a set constructor. J. Symb. Comput. 80: 27-61 (2017) - [c29]Yannick Chevalier:
Self-Correcting Unsound Reasoning Agents. DARe@LPNMR 2017: 16-28 - 2015
- [j9]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Parametrized automata simulation and application to service composition. J. Symb. Comput. 69: 40-60 (2015) - [c28]Tushant Jha, Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Expressive Equivalence and Succinctness of Parametrized Automata with Respect to Finite Memory Automata. ICSOC Workshops 2015: 145-156 - 2014
- [j8]Wiem Tounsi, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Yannick Chevalier, Frédéric Cuppens:
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. J. Netw. Comput. Appl. 39: 152-166 (2014) - [c27]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
An EXPTIME Algorithm for Data-Aware Service Simulation Using Parametrized Automata. ICSOC Workshops 2014: 295-307 - 2013
- [c26]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Fresh-Variable Automata: Application to Service Composition. SYNASC 2013: 153-160 - [i10]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Fresh-Variable Automata for Service Composition. CoRR abs/1302.4205 (2013) - [i9]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Guarded Variable Automata over Infinite Alphabets. CoRR abs/1304.6297 (2013) - 2012
- [j7]Yannick Chevalier, Michaël Rusinowitch:
Decidability of Equivalence of Symbolic Derivations. J. Autom. Reason. 48(2): 263-292 (2012) - [c25]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Towards the Orchestration of Secured Services under Non-disclosure Policies. MMM-ACNS 2012: 130-145 - [c24]Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea, Sebastian Mödersheim, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - [i8]Yannick Chevalier, Mounira Kourjieh:
Automated Synthesis of a Finite Complexity Ordering for Saturation. CoRR abs/1203.2809 (2012) - [i7]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Intruder deducibility constraints with negation. Decidability and application to secured service compositions. CoRR abs/1207.4871 (2012) - 2011
- [c23]Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch:
Web Services Verification and Prudent Implementation. DPM/SETOP 2011: 173-189 - [c22]Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch, Mathieu Turuani:
Distributed Orchestration of Web Services under Security Constraints. DPM/SETOP 2011: 235-252 - [i6]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of General Intruder Constraints with and without a Set Constructor. CoRR abs/1103.0220 (2011) - [i5]Yannick Chevalier:
Finitary Deduction Systems. CoRR abs/1105.1376 (2011) - 2010
- [j6]Yannick Chevalier, Michaël Rusinowitch:
Compiling and securing cryptographic protocols. Inf. Process. Lett. 110(3): 116-122 (2010) - [j5]Yannick Chevalier, Michaël Rusinowitch:
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures. Theor. Comput. Sci. 411(10): 1261-1282 (2010) - [c21]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of general intruder constraints with a set constructor. CRiSIS 2010: 1-8 - [c20]Philippe Balbiani, Yannick Chevalier, Marwa El Houri:
An intruder model for trust negotiation. CRiSIS 2010: 1-8 - [c19]Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch:
Orchestration under Security Constraints. FMCO 2010: 23-44
2000 – 2009
- 2009
- [c18]Philippe Balbiani, Yannick Chevalier, Marwa El Houri:
A logical framework for reasoning about policies with trust negotiations and workflows in a distributed environment. CRiSIS 2009: 3-11 - [i4]Yannick Chevalier, Mounira Kourjieh:
On the Decidability of (ground) Reachability Problems for Cryptographic Protocols (extended version). CoRR abs/0906.1199 (2009) - [i3]Yannick Chevalier, Michaël Rusinowitch:
Compiling and securing cryptographic protocols. CoRR abs/0910.5099 (2009) - 2008
- [j4]Yannick Chevalier, Michaël Rusinowitch:
Hierarchical combination of intruder theories. Inf. Comput. 206(2-4): 352-377 (2008) - [j3]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ACM Trans. Comput. Log. 9(4): 24:1-24:52 (2008) - [c17]Philippe Balbiani, Yannick Chevalier, Marwa El Houri:
A Logical Approach to Dynamic Role-Based Access Control. AIMSA 2008: 194-208 - [c16]Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch:
Automatic Composition of Services with Security Policies. SERVICES I 2008: 529-537 - 2007
- [c15]Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch:
Towards an Automatic Analysis of Web Service Security. FroCoS 2007: 133-147 - [c14]Yannick Chevalier, Mounira Kourjieh:
Key Substitution in the Symbolic Analysis of Cryptographic Protocols. FSTTCS 2007: 121-132 - [c13]Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch:
Verifying Cryptographic Protocols with Subterms Constraints. LPAR 2007: 181-195 - [i2]Yannick Chevalier, Mounira Kourjieh:
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version). CoRR abs/0710.5674 (2007) - 2006
- [c12]Yannick Chevalier, Mounira Kourjieh:
A Symbolic Intruder Model for Hash-Collision Attacks. ASIAN 2006: 13-27 - [c11]Yannick Chevalier, Michaël Rusinowitch:
Hierarchical Combination of Intruder Theories. RTA 2006: 108-122 - [i1]Yannick Chevalier, Mounira Kourjieh:
A Symbolic Intruder Model for Hash-Collision Attacks. CoRR abs/cs/0611142 (2006) - 2005
- [j2]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
An NP decision procedure for protocol insecurity with XOR. Theor. Comput. Sci. 338(1-3): 247-274 (2005) - [c10]Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 - [c9]Yannick Chevalier, Michaël Rusinowitch:
Combining Intruder Theories. ICALP 2005: 639-651 - 2004
- [j1]Yannick Chevalier, Laurent Vigneron:
Strategy for Verifying Security Protocols with Unbounded Message Size. Autom. Softw. Eng. 11(2): 141-166 (2004) - [c8]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
Deciding the Security of Protocols with Commuting Public Key Encryption. ARSPA@IJCAR 2004: 55-66 - [c7]Yannick Chevalier, Laurent Vigneron:
Rule-based Programs Describing Internet Security Protocols. RULE@RDP 2004: 113-132 - 2003
- [b1]Yannick Chevalier:
Résolution de problèmes d'accessiblité pour la compilation et la validation de protocoles cryptographiques. Henri Poincaré University, Nancy, France, 2003 - [c6]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron:
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. CSL 2003: 128-141 - [c5]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. FSTTCS 2003: 124-135 - [c4]Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
An NP Decision Procedure for Protocol Insecurity with XOR. LICS 2003: 261-270 - 2002
- [c3]Yannick Chevalier, Laurent Vigneron:
Automated Unbounded Verification of Security Protocols. CAV 2002: 324-337 - [c2]Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISS Security Protocol Analysis Tool. CAV 2002: 349-353 - 2001
- [c1]Yannick Chevalier, Laurent Vigneron:
A Tool for Lazy Verification of Security Protocols. ASE 2001: 373-376
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint