Search

Your search keyword '"Pascal Lafourcade"' showing total 422 results

Search Constraints

Start Over You searched for: Author "Pascal Lafourcade" Remove constraint Author: "Pascal Lafourcade"
422 results on '"Pascal Lafourcade"'

Search Results

251. Formal analysis of a private access control protocol to a cloud storage

252. Verify-Your-Vote: A Verifiable Blockchain-based Online Voting Protocol

253. Revisiting AES Related-Key Differential Attacks with Constraint Programming

254. A Cryptographer's Conspiracy Santa

255. Les monnaies virtuelles décentralisées sont-elles des dispositifs d’avenir ?

256. Les monnaies virtuelles décentralisées sont-elles des dispositifs d’avenir ?

257. Formal Analysis of Combinations of Secure Protocols

258. Duck Attack on Accountable Distributed Systems

259. Dual Protocols for Private Multi-party Matrix Multiplication and Trust Computations

260. Verifiable Private Polynomial Evaluation

261. Vérifier la sécurité de nos communications

262. SR3: secure resilient reputation-based routing

263. Formal analysis and offline monitoring of electronic exams

264. LOCALPKI: A User-Centric Formally Proven Alternative to PKIX

265. Formally Verifying Flow Properties in Industrial Systems

266. Breaking and fixing the HB+DB protocol

267. SPADE : un protocole délimiteur de distance anonyme et résistant à la fraude terroriste

268. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

269. Bitcoin : une monnaie dématérialisée

270. Les monnaies virtuelles décentralisées sont-elles des outils d’avenir ?

271. Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks

272. Formal Analysis of Security Properties on the OPC-UA SCADA Protocol

273. k-Times Full Traceable Ring Signature

274. History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol

275. On the existence and decidability of unique decompositions of processes in the applied π-calculus

276. Two Secure Anonymous Proxy-based Data Storages

277. Formal Analysis of Key Management in mobile Wimax

278. Automated Verification of e-Cash Protocols

279. Automated Proofs for Asymmetric Encryption

280. Survey of Distance Bounding Protocols and Threats

281. Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties

282. Monitoring Electronic Exams

283. Key Management inWireless Sensor Networks

284. Formal Analysis of E-Cash Protocols

285. Architectures PKI et communications sécurisées

286. Les émulateurs pédagogiques: une source d’innovations qui se construit à l’Université Joseph Fourier de Grenoble

287. Comment s'exercer à apprendre ?

288. A Framework for Analyzing Verifiability in Traditional and Electronic Exams

289. Formal Security Analysis of Traditional and Electronic Exams

290. SLACK-MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks

291. Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen

292. Formal Verification of e-Reputation Protocols

293. Secure Multihop Key Establishment Protocols for Wireless Sensor Networks

294. A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks

295. Secure Auctions without Cryptography

296. Foundations and Practice of Security : 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers

297. Automated Security Proofs for Almost-Universal Hash for MAC Verification

298. Brandt's Fully Private Auction Protocol Revisited

299. Defining Verifiability in e-Auction Protocols

300. Verifiability in e-Auction Protocols

Catalog

Books, media, physical & digital resources