Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 4.

Article

Cheval, Vincent and Cortier, Véronique and Delaune, Stéphanie (2013) Deciding equivalence-based properties using constraint solving. Theoretical Computer Science, 492 . pp. 1-39. ISSN 0304-3975. (doi:https://doi.org/10.1016/j.tcs.2013.04.016) (Full text available)
[img]
Preview

Conference or workshop item

Cheval, Vincent and Cortier, Véronique (2015) Timing attacks: symbolic framework and proof techniques. In: Focardi, Riccardo and Myers, Andrew, eds. Lecture Notes in Computer Science. Principles of Security and Trust. Springer Berlin Heidelberg, London, UK pp. 280-299. ISBN 978-3-662-46665-0. E-ISBN 978-3-662-46666-7. (doi:https://doi.org/10.1007/978-3-662-46666-7_15) (Full text available)
[img]
Preview
[img]
Preview

Cheval, Vincent and Cortier, Véronique and Plet, Antoine (2013) Lengths May Break Privacy – Or How to Check for Equivalences with Length. In: 25th International Conference on Computer Aided Verification (CAV'13), July 2013, St Petersburg, Russia. (doi:https://doi.org/10.1007/978-3-642-39799-8_50) (Full text available)
[img]
Preview
[img]
Preview

Arapinis, Myrto and Cheval, Vincent and Delaune, Stéphanie (2012) Verifying Privacy-Type Properties in a Modular Way. In: 25th IEEE Computer Security Foundations Symposium (CSF'12), June 2012, Cambridge Massachusetts, USA. (doi:https://doi.org/10.1109/CSF.2012.16) (Full text available)
[img]
Preview
[img]
Preview

This list was generated on Fri May 24 03:12:25 2019 BST.