Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 259* | 2006 |
A survey of algebraic properties used in cryptographic protocols V Cortier, S Delaune, P Lafourcade Journal of Computer Security 14 (1), 1-43, 2006 | 240 | 2006 |
Attacking and fixing Helios: An analysis of ballot secrecy V Cortier, B Smyth Journal of Computer Security 21 (1), 89-148, 2013 | 236 | 2013 |
Deciding knowledge in security protocols under equational theories M Abadi, V Cortier Theoretical Computer Science 367 (1-2), 2-32, 2006 | 215 | 2006 |
Computationally sound, automated proofs for security protocols V Cortier, B Warinschi European Symposium on Programming, 157-171, 2005 | 195 | 2005 |
SoK: A comprehensive analysis of game-based ballot privacy definitions D Bernhard, V Cortier, D Galindo, O Pereira, B Warinschi 2015 IEEE Symposium on Security and Privacy, 499-516, 2015 | 173 | 2015 |
Sok: Verifiability notions for e-voting protocols V Cortier, D Galindo, R Küsters, J Müller, T Truderung 2016 IEEE Symposium on Security and Privacy (SP), 779-798, 2016 | 166 | 2016 |
Election verifiability for helios under weaker trust assumptions V Cortier, D Galindo, S Glondu, M Izabachene Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 161 | 2014 |
A survey of symbolic methods in computational analysis of cryptographic systems V Cortier, S Kremer, B Warinschi Journal of Automated Reasoning 46, 225-259, 2011 | 149 | 2011 |
Computational soundness of observational equivalence H Comon-Lundh, V Cortier Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 130 | 2008 |
New decidability results for fragments of first-order logic and application to cryptographic protocols H Comon-Lundh, V Cortier International Conference on Rewriting Techniques and Applications, 148-164, 2003 | 127 | 2003 |
Adapting Helios for provable ballot privacy D Bernhard, V Cortier, O Pereira, B Smyth, B Warinschi Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 119 | 2011 |
BeleniosRF: A non-interactive receipt-free electronic voting scheme P Chaidos, V Cortier, G Fuchsbauer, D Galindo Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 112 | 2016 |
Tree automata with one memory set constraints and cryptographic protocols H Comon, V Cortier Theoretical Computer Science 331 (1), 143-214, 2005 | 106 | 2005 |
Security properties: two agents are sufficient H Comon-Lundh, V Cortier European Symposium On Programming, 99-113, 2003 | 96 | 2003 |
A method for proving observational equivalence V Cortier, S Delaune 2009 22nd IEEE Computer Security Foundations Symposium, 266-276, 2009 | 94 | 2009 |
Belenios: a simple private and verifiable electronic voting system V Cortier, P Gaudry, S Glondu Foundations of Security, Protocols, and Equational Reasoning: Essays …, 2019 | 90 | 2019 |
Safely composing security protocols V Cortier, S Delaune Formal Methods in System Design 34, 1-36, 2009 | 87 | 2009 |
Flatness is not a weakness H Comon, V Cortier International workshop on computer science logic, 262-276, 2000 | 86 | 2000 |
Deciding knowledge in security protocols under equational theories M Abadi, V Cortier Automata, Languages and Programming: 31st International Colloquium, ICALP …, 2004 | 84 | 2004 |