Véronique Cortier
Affiliations:- CNRS, France
According to our database1,
Véronique Cortier
authored at least 113 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on loria.fr
On csauthors.net:
Bibliography
2024
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
2022
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols.
J. Comput. Secur., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
A Decidable Class of Security Protocols for Both Reachability and Equivalence Properties.
J. Autom. Reason., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Protocols, Strands, and Logic, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the 28th EACSL Annual Conference on Computer Science Logic, 2020
2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
2018
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Computer Security, 2018
Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Implementation and Application of Automata, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Dependable Software Systems Engineering, 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
Proceedings of the 35th IARCS Annual Conference on Foundation of Software Technology and Theoretical Computer Science, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
Inf. Comput., 2014
Found. Trends Program. Lang., 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the CONCUR 2014 - Concurrency Theory - 25th International Conference, 2014
2013
Theor. Comput. Sci., 2013
A generic construction for voting correctness at minimum cost - Application to Helios.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the E-Voting and Identify - 4th International Conference, 2013
Proceedings of the Principles of Security and Trust - Second International Conference, 2013
Proceedings of the Computer Aided Verification - 25th International Conference, 2013
Proceedings of the Automated Deduction - CADE-24, 2013
2012
Decidability and Combination Results for Two Notions of Knowledge in Security Protocols.
J. Autom. Reason., 2012
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
J. Autom. Reason., 2011
RAIRO Theor. Informatics Appl., 2011
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011
How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.
Proceedings of the 28th International Symposium on Theoretical Aspects of Computer Science, 2011
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
ACM Trans. Comput. Log., 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Analyse des protocoles cryptographiques: des modèles symboliques aux modèles calculatoires. (Analysis of cryptographic protocols: from symbolic to computational models).
, 2009
2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
A Cryptographic Model for Branching Time Security Properties - the Case of Contract Signing Protocols.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2007
Proceedings of the Logic for Programming, 2007
Proceedings of the FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, 2007
Proceedings of the Frontiers of Combining Systems, 6th International Symposium, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
2006
Theor. Comput. Sci., 2006
J. Comput. Secur., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the First Workshop in Information and Computer Security, 2006
Proceedings of the Logic for Programming, 2006
2005
Theor. Comput. Sci., 2005
Computationally sound implementations of equational theories against passive adversaries.
IACR Cryptol. ePrint Arch., 2005
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures.
Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2005
Proceedings of the Programming Languages and Systems, 2005
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
2004
2003
New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols.
Proceedings of the Rewriting Techniques and Applications, 14th International Conference, 2003
2002
RAIRO Theor. Informatics Appl., 2002
2001
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
1999
Proceedings of the Automata, 1999