Tree automata techniques and applications H Comon http://www. grappa. univ-lille3. fr/tata, 1997 | 1693 | 1997 |

Equational problems anddisunification H Comon, P Lescanne Journal of Symbolic Computation 7 (3-4), 371-425, 1989 | 297 | 1989 |

Multiple counters automata, safety analysis and Presburger arithmetic H Comon, Y Jurski International Conference on Computer Aided Verification, 268-279, 1998 | 266 | 1998 |

Intruder deductions, constraint solving and insecurity decision in presence of exclusive or H Comon-Lundh, V Shmatikov 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings …, 2003 | 239 | 2003 |

Disuni cation: a survey H Comon Computational Logic. Essays in honor of Alan Robinson, 322-359, 1991 | 198 | 1991 |

The finite variant property: How to get rid of some algebraic properties H Comon-Lundh, S Delaune International Conference on Rewriting Techniques and Applications, 294-307, 2005 | 181 | 2005 |

Diophantine equations, Presburger arithmetic and finite automata A Boudet, H Comon Colloquium on Trees in Algebra and Programming, 30-43, 1996 | 153 | 1996 |

New decidability results for fragments of first-order logic and application to cryptographic protocols H Comon-Lundh, V Cortier International Conference on Rewriting Techniques and Applications, 148-164, 2003 | 122 | 2003 |

Computational soundness of observational equivalence H Comon-Lundh, V Cortier Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 114 | 2008 |

Inductionless induction H Comon | 113 | 1994 |

Unification et disunification: Théorie et applications H Comon | 112 | 1988 |

Timed automata and the theory of real numbers H Comon, Y Jurski International Conference on Concurrency Theory, 242-257, 1999 | 110 | 1999 |

Is it possible to decide whether a cryptographic protocol is secure or not? H Comon, V Shmatikov Journal of Telecommunications and Information Technology, 5-15, 2002 | 109 | 2002 |

Tree automata techniques and applications (1997) H Comon, M Dauchet, R Gilleron, F Jacquemard, D Lugiez, S Tison, ... | 106 | 2002 |

Solving symbolic ordering constraints H Comon International Journal of Foundations of Computer Science 1 (04), 387-411, 1990 | 103 | 1990 |

Tree automata with one memory set constraints and cryptographic protocols H Comon, V Cortier Theoretical Computer Science 331 (1), 143-214, 2005 | 101 | 2005 |

Equational formulas with membership constraints H Comon, C Delor Information and Computation 112 (2), 167-216, 1994 | 100 | 1994 |

Trace equivalence decision: Negative tests and non-determinism V Cheval, H Comon-Lundh, S Delaune Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 86 | 2011 |

Security properties: two agents are sufficient H Comon-Lundh, V Cortier European Symposium On Programming, 99-113, 2003 | 81 | 2003 |

Models and proofs of protocol security: A progress report M Abadi, B Blanchet, H Comon-Lundh International Conference on Computer Aided Verification, 35-49, 2009 | 80 | 2009 |