<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE raweb PUBLIC "-//INRIA//DTD" "raweb2.dtd">
<raweb xmlns:html="http://www.w3.org/1999/xhtml" xmlns:xlink="http://www.w3.org/1999/xlink" xml:lang="en" year="2005">
  <identification id="secsi" isproject="true">
    <shortname>SECSI</shortname>
    <projectName>Sécurité des systèmes d'information</projectName>
    <theme>SYM</theme>
    <team id="uid1">
      <participants category="Team_Leader">
        <person key="secsi-2005-id18078">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
          <moreinfo>Professor, ENS Cachan</moreinfo>
        </person>
      </participants>
      <participants category="Team_Vice-Leader">
        <person key="secsi-2005-id18098">
          <firstname>Florent</firstname>
          <lastname>Jacquemard</lastname>
          <moreinfo>INRIA Research Scientist</moreinfo>
        </person>
      </participants>
      <participants category="Staff_member,_INRIA">
        <person key="secsi-2005-id18118">
          <firstname>Steve</firstname>
          <lastname>Kremer</lastname>
          <moreinfo>Research Scientist</moreinfo>
        </person>
        <person key="secsi-2005-id18132">
          <firstname>Julien</firstname>
          <lastname>Olivain</lastname>
          <moreinfo>Junior technical staff</moreinfo>
        </person>
        <person key="secsi-2005-id18146">
          <firstname>Ralf</firstname>
          <lastname>Treinen</lastname>
          <moreinfo>Associate Professor, Research Scientist in ``délégation'' INRIA</moreinfo>
        </person>
      </participants>
      <participants category="Staff_member,_CNRS">
        <person key="secsi-2005-id18167">
          <firstname>Stéphane</firstname>
          <lastname>Demri</lastname>
          <moreinfo>Research Scientist</moreinfo>
        </person>
      </participants>
      <participants category="Staff_member,_ENS_Cachan">
        <person key="secsi-2005-id18187">
          <firstname>Hubert</firstname>
          <lastname>Comon-Lundh</lastname>
          <moreinfo>Professor</moreinfo>
        </person>
      </participants>
      <participants category="PhD_students">
        <person key="secsi-2005-id18206">
          <firstname>Mathieu</firstname>
          <lastname>Baudet</lastname>
          <moreinfo>Corps des Télécoms INRIA grant</moreinfo>
        </person>
        <person key="secsi-2005-id18221">
          <firstname>Vincent</firstname>
          <lastname>Bernat</lastname>
          <moreinfo>Student at ENS Cachan</moreinfo>
        </person>
        <person key="secsi-2005-id18234">
          <firstname>Élie</firstname>
          <lastname>Bursztein</lastname>
          <moreinfo>MENRT grant, École Doctorale Sciences Pratiques (Cachan), since Oct. 01</moreinfo>
        </person>
        <person key="secsi-2005-id18250">
          <firstname>Stéphanie</firstname>
          <lastname>Delaune</lastname>
          <moreinfo>CIFRE grant with France Télécom R&amp;D, École Doctorale Sciences Pratiques (Cachan)</moreinfo>
        </person>
        <person key="secsi-2005-id18270">
          <firstname>Pascal</firstname>
          <lastname>Lafourcade</lastname>
          <moreinfo>MENRT grant on ACI ``sécurité'' Rossignol, École Doctorale Sciences Pratiques (Cachan) &amp; Université de Provence (Marseilles), since Oct. 01</moreinfo>
        </person>
        <person key="secsi-2005-id18285">
          <firstname>Benjamin</firstname>
          <lastname>Ratti</lastname>
          <moreinfo>MENRT grant, École Doctorale Sciences Pratiques (Cachan)</moreinfo>
        </person>
        <person key="secsi-2005-id18301">
          <firstname>Yu</firstname>
          <lastname>Zhang</lastname>
          <moreinfo>MENRT grant on ACI ``cryptologie'' funding, École Doctorale Sciences Pratiques (Cachan)</moreinfo>
        </person>
      </participants>
    </team>
    <UR name="Futurs"/>
    <moreinfo>
      <p>SECSI is a project common to INRIA and the Laboratoire Spécification et Vérification (LSV), itself a common lab between CNRS (UMR 8643) and the École Normale Supérieure (ENS) de Cachan.</p>
    </moreinfo>
  </identification>
  <presentation id="uid3">
    <bodyTitle>Overall Objectives</bodyTitle>
    <subsection level="1" id="uid4">
      <bodyTitle>Overall Objectives</bodyTitle>
      <moreinfo>
        <p>This section is unchanged from the SECSI 2004 report.</p>
      </moreinfo>
      <p>SECSI is a common project between INRIA Futurs and the LSV (Laboratoire Spécification et Vérification), itself a common research unit of CNRS (UMR 8643) and the ENS (École Normale Supérieure) de Cachan.</p>
      <p>The SECSI project is a research project on the security of information systems. It is organized around three main themes, and their mutual relationships:</p>
      <simplelist>
        <li id="uid5">
          <p>Automated verification of cryptographic protocols;</p>
        </li>
        <li id="uid6">
          <p>Intrusion detection;</p>
        </li>
        <li id="uid7">
          <p>Static analysis of programs, in order to detect security holes and vulnerabilities at the protocol level.</p>
        </li>
      </simplelist>
      <p>The objectives of the SECSI project are:</p>
      <simplelist>
        <li id="uid8">
          <p>to design new models and new logics for describing security properties: secrecy, authentication, anonymity, privacy, fair exchange, resistance to dictionary attacks, etc;</p>
        </li>
        <li id="uid9">
          <p>to design and implement new automated cryptographic protocol verification algorithms;</p>
        </li>
        <li id="uid10">
          <p>to invent, improve, implement and experiment with new model-checking techniques, particularly on-line model-checking techniques, with application to intrusion detection;</p>
        </li>
        <li id="uid11">
          <p>to design and implement new static analysis techniques to evaluate the level of assurance of actual cryptographic code;</p>
        </li>
        <li id="uid12">
          <p>to integrate static analysis techniques and dynamic monitoring techniques (intrusion detection).</p>
        </li>
      </simplelist>
    </subsection>
  </presentation>
  <fondements id="uid13">
    <bodyTitle>Scientific Foundations</bodyTitle>
    <subsection level="1" id="uid14">
      <bodyTitle>What is computer security? Do we need some?</bodyTitle>
      <keyword>computer security</keyword>
      <keyword>verification</keyword>
      <keyword>cryptographic protocol</keyword>
      <keyword>static analysis</keyword>
      <keyword>intrusion detection</keyword>
      <keyword>model-checking</keyword>
      <moreinfo>
        <p>This section is unchanged from the SECSI 2004 report.</p>
      </moreinfo>
      <glosslist>
        <label>verification</label>
        <li>
          <p>see model-checking.</p>
        </li>
        <label>model-checking</label>
        <li>
          <p>a set of automated techniques aiming at ensuring that a formal model of some given computer system satisfies a given specification, typically written as a formula in some adequate logic.</p>
        </li>
        <label>protocol</label>
        <li>
          <p>a sequence of messages defining an interaction between two or more machines, programs, or people.</p>
        </li>
        <label>cryptographic protocol</label>
        <li>
          <p>a protocol using cryptographic means, in particular encryption, that attempts to satisfy properties of secrecy, authentication, or other security properties.</p>
        </li>
        <label>static analysis</label>
        <li>
          <p>set of automated techniques that determine some properties satisfied by given programs, without having to execute them; based on analyzing source code, sometimes object code; essentially identical to abstract interpretation of programs.</p>
        </li>
        <label>intrusion detection</label>
        <li>
          <p>set of methods attempting to detect attacks, intrusions, or anomalies in computer systems, by real-time monitoring networks and systems.</p>
        </li>
      </glosslist>
      <p>Security has been getting more and more attention recently, as attacks against even personal computers (viruses, worms, spam), or banking cards, or mobile phones, etc., are becoming more and more frequent, and more and more well-known to the general public.</p>
      <p>The first and foremost property that one would like to enforce is 
      <i>secrecy</i>, or 
      <i>confidentiality</i>. You certainly would not like to be robbed by somebody who got hold of all the necessary information on your banking card; you would not like your health record to be public either; and you would not like your next (hopefully) big-selling software project to be known by
      your competitors in advance. This problem, ensuring that some given data are concealed to external, non-authorized people (or machines), is not new. Encryption has been used as a means of ensuring confidentiality in every armed forces around the world for ages. The new factor here is that
      computers and networks make it so easy to access any kind of information: in modern computer networks, reading data from your computer for an intruder may be just as easy as connecting a wire to an outlet on the wall.</p>
      <p>A second property of interest is 
      <i>authentication</i>. Maybe you'd like to communicate with trusted parties. But how can you be sure you're really talking to the right person? A long time ago, when you met face to face, it was easy enough to recognize whom you were talking to. Nowadays, computers talk through digital lines.
      Even payphones talk to smartcards (see 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid0" location="biblio" xyref="2159452058011"/>for an authentication attack on second-generation pay-phone cards), and mobile phones talk to servers and back, using
      encrypted channels. Each of these appliances need to check that they are really talking to the right appliance or computer. Otherwise you could spy on someone else's conversation on the phone, or you could intercept an encrypted email between two competitors, for example.</p>
      <p>There are many other properties to be checked, in practice. 
      <i>Denial of service</i>attacks do not steal valuable information from your hard disk (secrecy does not fail), they do not attempt at making you believe you're receiving an email from your old friend Joa (authentication), rather they just make your machine unusable: suddenly your machine
      freezes, reboots, your network is overloaded: you may be victim of a denial of service attack.</p>
      <p>Another one is 
      <i>fair exchange</i>: when you sign a contract over Internet—and you do, as soon as you buy a train ticket or the latest Harry Potter book on the Internet—, you would like to be sure that you agree to buy and the reseller agrees to sell, or none of you agrees to the transaction, but that
      nothing else may happen. In particular, you would like to be sure that nobody can get a competitive advantage by first having the other agree to the transaction, then reporting the sales condition you obtained to a competitor, to eventually resign the transaction and make a deal with the
      competitor.</p>
      <p>There would be many other properties that are worth considering. The goal of the SECSI project is, foremost, to design algorithms and tools to check such 
      <i>security properties</i>. First, on abstract and idealized versions of what actually runs on your computer, banking card, or mobile phone: namely, on 
      <i>cryptographic protocols</i>. This is important: one can cite dozens of published cryptographic protocols which nonetheless have been found faulty later on—the award certainly going to the Needham-Schroeder public-key protocol 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid1" location="biblio" xyref="2159452058011"/>, which was believed to be correct for 17 years before an attack was found, and the protocol fixed, by G. Lowe 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid2" location="biblio" xyref="2159452058011"/>.</p>
      <p>Second, it would be desirable to check the same security properties on more and more concrete algorithms, until a level is reached where actual code can be analyzed. This is a technical challenge, involving the design of new static analysis techniques that mix reasoning on cryptographic
      protocols (only at a larger scale) and reasoning on pointers, functions, and other features of standard programming languages.</p>
      <p>Third, once various more or less abstract versions of some piece of software have been proved correct, it may still be the case that some attacks remain. This may sound like a paradox, but look at it this way. When we reason on an abstract version of the given piece of software, we may
      have forgotten some important aspects of reality in the model. For instance, we may have modeled possible intruders on our system as being dishonest, all other participants being honest; but Lowe's attack on Needham-Schroeder's public-key protocol involves an intruder that is both honest 
      <i>and</i>dishonest at the same time (in different sessions). It is all too easy to overlook the fact that anybody might be both good and evil. Another example is the fact that, to be able to say anything at all on a protocol, or some piece of code, simplifying assumptions have to be made.
      For example, a very convenient assumption until now was that of 
      <i>perfect cryptography</i>, where the only way to get the plaintext from the ciphertext is to decipher the latter, using the right key. But many cryptographic primitives are not perfect, and A. Joux 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid3" location="biblio" xyref="2159452058011"/>has shown that Lowe's corrected version of the Needham-Schroeder public-key protocol was in fact flawed again, if you
      used the El Gamal encryption scheme to encrypt messages.</p>
      <p>One of our efforts in the themes of cryptographic protocol verification, and also static code analysis to a lesser extent, is to take into account such weaknesses in the models, and repair them. This will provide us with more and more reliable security assessment tools.</p>
      <p>However, there will always remain something that the models overlook. To take a last example, consider static analysis of code. When one analyzes actual programs, it is useful to simplify the semantics of the analyzed programming language, and e.g., assume that no pointer runs wild;
      otherwise, basically the analyzer must assume that anything may happen, and will more often than not that the analyzed program is probably vulnerable—even when it is not (in the given model, of course!). It is then fair to assume that some other means is used to ensure that no pointer indeed
      goes wild (
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid4" location="biblio" xyref="2159452058011"/>is a good start), and voila, we don't have to care about out-of-bounds access to arrays and records. In the present
      case, ignoring out-of-bounds accesses through pointers is precisely what makes the so-called 
      <i>buffer-overflow attacks</i>so easy 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid5" location="biblio" xyref="2159452058011"/>. Let us say right away that the great majority of viruses, worms, and trojans propagate through such buffer-overflow
      vulnerabilities. It is therefore definitely relevant to monitor system activity 
      <i>in real time</i>to detect and counter such attacks. The SECSI project team has had some preliminary success in doing so as part in 2003, using a new intrusion detection tool developed at LSV/SECSI and based on a novel approach to 
      <i>on-line model-checking</i>: the attack is detected and reported in real-time, the sessions of the offender are killed and his account closed, in a jiffy. This is just an example of what can be achieved through intrusion detection, and this technology has already been applied to other
      system-level, and network-level security issues.</p>
      <p>While SECSI is interested in many aspects of computer security, no cryptology per se is being done at SECSI. This is better left to cryptologists. SECSI does not guarantee either that your system can be made absolutely secure. After all, one of the most reliable source of unauthorized
      access to information is through 
      <i>social engineering</i>(more or less subtle uses of the gullibility of people), against which science is impotent: see Mitnick and Simon's book 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid6" location="biblio" xyref="2159452058011"/>.</p>
      <p>To sum up, the focus of SECSI is on making small (PC) to large (mainframe) systems more secure, by checking once and for all (statically) security properties at a fairly abstract level, and going all the way to the concrete by monitoring (dynamically) security properties on actual
      computers and networks.</p>
      <p>Scientifically, all themes are united by our reliance on rigorous approaches and logic: automated deduction, tree automata, abstract interpretation, model-checking.</p>
    </subsection>
    <subsection level="1" id="uid15">
      <bodyTitle>Logic as a tool for assessing computer security</bodyTitle>
      <moreinfo>
        <p>This section is unchanged from the SECSI 2003 report.</p>
      </moreinfo>
      <p>The various efforts of the SECSI team are united by the reliance on 
      <i>logic</i>and rigorous methods. As already said in Section 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid14" location="intern" xyref="2159452058011"/>, SECSI does not do any cryptology per se.</p>
      <p>As far as cryptographic protocol verification is concerned, one popular kind of model is that of Dolev and Yao (after 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid7" location="biblio" xyref="2159452058011"/>, see 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid8" location="biblio" xyref="2159452058011"/>for a survey), where: the intruder can read and write on every communication channel, and in effect has full control
      over the network; the intruder may encrypt, decrypt, build and destruct pairs, as many times as it wishes; and, finally, cryptographic means are assumed to be 
      <i>perfect</i>. The latter in particular means that the only way to compute the plaintext 
      <hi rend="italic">M</hi>from the ciphertext 
      <span class="math" align="left">{
      <hi rend="it">M</hi>}
      <sub><hi rend="it">K</hi></sub></span>is to decrypt the latter using the inverse key 
      <span class="math" align="left"><hi rend="it">K</hi><sup>-1</sup></span>. It also means that no ciphertext can be confused with any message that is not a ciphertext, and that 
      <span class="math" align="left"><img align="middle" width="109" height="28" src="math_image_1.png" xylemeAttach="1" border="0" alt="Im1 ${{M}_K={M^\#8242 }_K^\#8242 }$"/></span>implies 
      <span class="math" align="left"><img align="bottom" width="56" height="12" src="math_image_2.png" xylemeAttach="2" border="0" alt="Im2 ${M=M^\#8242 }$"/></span>and 
      <span class="math" align="left"><img align="bottom" width="52" height="12" src="math_image_3.png" xylemeAttach="3" border="0" alt="Im3 ${K=K^\#8242 }$"/></span>. Thus, messages can be simply encoded as first-order terms, a fact which has been used by many authors.</p>
      <p>This observation may be seen as the foundations for encoding cryptographic protocols in first-order logic 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid9" location="biblio" xyref="2159452058011"/>, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid10" location="biblio" xyref="2159452058011"/>. Cryptographic protocols can also be analyzed using tree automata 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid11" location="biblio" xyref="2159452058011"/>, as shown in 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid12" location="biblio" xyref="2159452058011"/>, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid13" location="biblio" xyref="2159452058011"/>, or using set constraints 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid14" location="biblio" xyref="2159452058011"/>, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid15" location="biblio" xyref="2159452058011"/>. All these tools can be seen from an automated deduction perspective, as shown in 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid16" location="biblio" xyref="2159452058011"/>and 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid17" location="biblio" xyref="2159452058011"/>. Extensions to encryption primitives obeying algebraic laws are now being considered in the SECSI project, using
      deduction techniques modulo equational theories, as well as direct proof-theoretic techniques 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid18" location="biblio" xyref="2159452058011"/>. This is one of the themes of the RNTL project PROUVÉ.</p>
      <p>Our work on intrusion detection also relies on logic. The crux of our method is a fast implementation of a fast algorithm for 
      <i>on-line</i>model-checking of an application-specific temporal logic to 
      <i>linear</i>Kripke models 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid19" location="biblio" xyref="2159452058011"/>. It also relies on specific 
      <i>abstract interpretation</i>techniques to dramatically improve the speed of detection, by showing that certains threads waiting for specific sequences of events cannot succeed and therefore can be killed safely 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid20" location="biblio" xyref="2159452058011"/>, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid21" location="biblio" xyref="2159452058011"/>. Of course, abstract interpretation is at the heart of our static analysis of C code project, too. In this
      framework, SECSI designs static analyses that generation sets of Horn clauses as constraints, which are then solved by automated deduction techniques... and this loops the loop.</p>
      <p>Finally, it should be mentioned that SECSI also looks at alternative techniques. The most prominent is research conducted at LSV/SECSI on 
      <i>logical relations</i>for 
      <span class="math" align="left"><img width="11" height="13" align="bottom" border="0" src="../../images/img_lambda.png" alt="$ \lambda$"/></span>-calculi enriched with primitives for fresh name creation, encryption and decryption, following Sumii and Pierce 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid22" location="biblio" xyref="2159452058011"/>. This is continuous work, started in 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid23" location="biblio" xyref="2159452058011"/>and pursued in 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid24" location="biblio" xyref="2159452058011"/>. The puzzling thing here is that the logical relations obtained there generalize the notion of 
      <i>bisimulations</i>used in process algebra to a richer, higher-order framework.</p>
    </subsection>
  </fondements>
  <domaine id="uid16">
    <bodyTitle>Application Domains</bodyTitle>
    <subsection level="1" id="uid17">
      <bodyTitle>Introduction</bodyTitle>
      <keyword>smartcards</keyword>
      <keyword>mobile phones</keyword>
      <keyword>secure distributed architectures</keyword>
      <keyword>SSL</keyword>
      <keyword>TLS</keyword>
      <keyword>security</keyword>
      <keyword>intrusion detection</keyword>
      <moreinfo>
        <p>This section is unchanged from the SECSI 2004 report.</p>
      </moreinfo>
      <p>The application domains of SECSI cover a large part of computer security.</p>
    </subsection>
    <subsection level="1" id="uid18">
      <bodyTitle>Cryptographic Protocols</bodyTitle>
      <p>Cryptographic protocols are used in more and more domains today, including smart card protocols, enterprise servers, railroad network architectures, secured distributed graphic user interfaces, mobile telephony, on-line banking, on-line merchant sites, pay-per-view video, etc. The SECSI
      project is not tied to any specific domain as far as cryptographic protocols are concerned. Our industrial partners in this domain are Trusted Logic S.A., France Télécom R&amp;D, and CRIL Technology.</p>
    </subsection>
    <subsection level="1" id="uid19">
      <bodyTitle>Static Analysis</bodyTitle>
      <p>Analyzing cryptographic protocols per se is fine, but a more realistic approach consists in analyzing actual code implementing specific roles of cryptographic protocols, such as 
      <tt>ssh</tt>or 
      <tt>slogin</tt>, which implement the SSL/TLS protocols 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid25" location="biblio" xyref="2159452058011"/>are are used on every personal computer running Unix today. SSL and TLS are, more widely, used in every Web browser
      today: as soon as you connect to a secured server, you are running SSL or TLS. Being able to analyze actual C implementations of these or similar protocols is a concrete application we would like to be able to deal with in the long term.</p>
    </subsection>
    <subsection level="1" id="uid20">
      <bodyTitle>Intrusion Detection</bodyTitle>
      <p>Making sure that cryptographic protocols are secure is not enough to guarantee that your system is secure. In all these domains, and in general in every domain where you need to set up a computer or a computer network, intrusion detection is needed. A new application domain for intrusion
      detection is smartcard security. While intrusion detection, and in particular the kind addressed in SECSI, used to be impractical on smartcards, the amount of available memory has soared on modern smartcards, making our intrusion detection techniques attractive on small devices: banking cards
      perhaps, SIM cards in GSM mobile phones certainly.</p>
      <p>Standard application domains include securing enterprise-wide networks, and telephony servers. Our industrial partners in this domain today are France Télécom R&amp;D and Calyx/NetSecure, a small company specialized in intrusion detection solutions.</p>
      <p>A slightly less standard application of our intrusion detection techniques is tracking, where the intrusion detection system is not used to detect attacks, but to sort clients' activities per client type/user preferences (e.g., in GSM user tracking, as done by GSM operators), or to sort
      hardware and software failures according to client, hardware type or brand in remote maintenance applications.</p>
    </subsection>
  </domaine>
  <logiciels id="uid21">
    <bodyTitle>Software</bodyTitle>
    <subsection level="1" id="uid22">
      <bodyTitle>Software Packages and Prototypes</bodyTitle>
      <p>The SECSI project started in 2002 with a relatively large software basis: tools to parse, translate, and verify cryptographic protocols which are part of the RNTL project EVA (including 
      <i>CPV</i>, 
      <i>CPV2</i>, 
      <i>Securify</i>), a static analysis tool (
      <i>CSur</i>), an intrusion detection tool (
      <i>logWeaver</i>). These programs were started before SECSI was created.</p>
      <p>The SPORE Web page was new in 2002. It is a public and open repository of cryptographic protocols. Its purpose is to collect information on cryptographic protocols, their design, proofs, attacks, at the international level.</p>
      <p>2003 and 2004 brought new developments. In intrusion detection, a completely new project has started, which benefited from the lessons learned in the DICO project: faster, more versatile, the ORCHIDS intrusion detection system promises to become the most powerful intrusion detection system
      around.</p>
      <p>In 2005, the development of ORCHIDS reached maturity. ORCHIDS works reliably in practice, and has been used so at the level of the local network of LSV, ENS Cachan. Several additional sensors have been added, including one based on comparing statistical entropy of network packets to detect
      corruption attacks on cryptographic protocols. A tool paper on ORCHIDS was presented at the CAV'2005 international conference, Edinburgh, Scotland.</p>
      <p>The CSur project consisted in developing a static analysis tool able to detect leakage of confidential data from programs written in C. Its design and development covered the period 2002-2004. The main challenge was to properly integrate Dolev-Yao style cryptographic protocol analysis with
      pointer alias analysis. Now that development is over, a paper 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid26" location="biblio" xyref="2159452058011"/>has been presented at VMCAI'05 on the techniques used, and a journal version has been submitted.</p>
      <p>The 
      <tt>h1</tt>tool suite was created in 2004 to support the discovery for security proofs, to output corresponding formal proofs in the Coq proof assistant, and also to provide a suite of tools allowing one to manipulate tree automata automatically 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid17" location="biblio" xyref="2159452058011"/>.</p>
      <p>The protocol analyser ISpi is a new project in 2005, built on the top of 
      <tt>h1</tt>for the verification of protocol specified in a variant of the spi-calculus.</p>
      <p>Finaly the PROUVÉ parser library is the analoguous of the above mentionned tools of the RNTL project EVA for the PROUVÉ specification language (see also 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid40" location="intern" xyref="2159452058011"/>).</p>
    </subsection>
    <subsection level="1" id="uid23">
      <bodyTitle>Orchids</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18078">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
        </person>
        <person key="secsi-2005-id18132">
          <firstname>Julien</firstname>
          <lastname>Olivain</lastname>
        </person>
      </participants>
      <p>While the real-time, multi-event flow ORCHIDS Intrusion Detection tool developed by Julien Olivain is remarkably successful in practice, one must admit that publications on this theme have been lacking since the 2001 paper by Goubault-Larrecq and Roger at the Computer Security Foundations
      Workshop.</p>
      <p>This was repaired partly this year by the presentation of a tool demonstration at the Intl. Conference on Automated Verification (CAV 2005) in Edinburgh 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid27" location="biblio" xyref="2159452058011"/>.</p>
      <p>As far as industrial contacts, this year ORCHIDS got very positive feedback from people at SAP and at Mandriva. All negotiations eventually failed. ORCHIDS is now distributed under the Cecill 2 (GPL) license.</p>
    </subsection>
    <subsection level="1" id="uid24">
      <bodyTitle>Csur</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18078">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
        </person>
      </participants>
      <p>This is joint work with Fabrice Parrennes, former member of SECSI, today research engineer at RATP, Paris, France. Parrennes was the person who implemented the 
      <tt>csur</tt>static code analyzer for C, whose purpose is to verify the absence of leaks of sensitive data from C code that uses cryptographic primitives. The 
      <tt>csur</tt>tool analyzes C, and produces first-order clauses that can be tested for satisfiability with the 
      <tt>h1</tt>tool.</p>
      <p>The development of 
      <tt>csur</tt>was essentially complete by May 2004, when Parrennes left for RATP. Some more time was needed to write the paper explaining the principles behind it 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid26" location="biblio" xyref="2159452058011"/>. The idea is elegant: you can model both Dolev-Yao intruder rules and points-to analysis (to detect side-effects
      done through pointers, the main challenge in analyzing C programs) as Horn clauses that are in the decidable class 
      <span class="math" align="left"><img align="middle" width="22" height="26" src="math_image_4.png" xylemeAttach="4" border="0" alt="Im4 $\#8459 _1$"/></span>, up to a few sporadic exceptions.</p>
    </subsection>
    <subsection level="1" id="uid25">
      <bodyTitle>The H1 Tool Suite: 
      <tt>h1</tt>, 
      <tt>pl2tptp</tt>, 
      <tt>auto2pl</tt>, 
      <tt>pldet</tt>, 
      <tt>plpurge</tt>, 
      <tt>pl2gastex</tt>, 
      <tt>tptpmorph</tt>, 
      <tt>linauto</tt>, 
      <tt>h1trace</tt>, 
      <tt>h1logstrip</tt>, 
      <tt>h1mc</tt>, 
      <tt>h1mon</tt>, 
      <tt>h1getlog</tt></bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18078">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
          <moreinfo>in charge</moreinfo>
        </person>
      </participants>
      <p>The initial purpose of the 
      <tt>h1</tt>tool is to decide Nielson, Nielson and Seidl's class 
      <span class="math" align="left"><img align="middle" width="22" height="26" src="math_image_4.png" xylemeAttach="4" border="0" alt="Im4 $\#8459 _1$"/></span>
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid28" location="biblio" xyref="2159452058011"/>, as well as an automated abstraction engine that converts any clause set to one in 
      <span class="math" align="left"><img align="middle" width="22" height="26" src="math_image_4.png" xylemeAttach="4" border="0" alt="Im4 $\#8459 _1$"/></span>.</p>
      <p>The main application of 
      <tt>h1</tt>is to verify sets of clauses representing cryptographic protocols. The 
      <span class="math" align="left"><img align="middle" width="22" height="26" src="math_image_4.png" xylemeAttach="4" border="0" alt="Im4 $\#8459 _1$"/></span>class is decidable, and accordingly 
      <tt>h1</tt>always terminates. In case a contradiction is found, the 
      <tt>h1</tt>proof is an indication of a plausible attack on the input protocol. In case no contradiction is found, then the input protocol is secure.</p>
      <p>This effort was started in 2003, as part of the former RNTL EVA project, and continued as part of the RNTL PROUVÉ project.</p>
      <p>A few more utilities have been added. Notably, 
      <tt>pl2gastex</tt>allows one to represent alternating tree automata graphically by using the 
      <tt>dot</tt>, 
      <tt>neato</tt>, or 
      <tt>twopi</tt>graph layout engines, and then rendering them through Paul Gastin's 
      <tt>gas
      <TeX/></tt>package. The 
      <tt>plpurge</tt>tool purges an alternating tree automaton from its unreachable states.</p>
      <p>There is now a Web page on 
      <tt>h1</tt>, accessible from the 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/software/" location="extern" xyref="2236848657014">http://www.lsv.ens-cachan.fr/software/</ref>software page at LSV. The 
      <tt>h1</tt>tool suite is released under the GPL. This page includes links to the source and binary distributions, a yet unfinished tutorial, and a few links to papers laying out the theoretical and practical foundations of 
      <tt>h1</tt>, including 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid29" location="biblio" xyref="2159452058011"/>and two other submitted papers.</p>
    </subsection>
    <subsection level="1" id="uid26">
      <bodyTitle>The ISpi cryptographic protocol analyzer</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18078">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
          <moreinfo>in charge</moreinfo>
        </person>
      </participants>
      <p>ISpi is a cryptographic verification tool developed in the RNTL project PROUVÉ. By default, it takes files written in a variant of the spi-calculus, with a syntax that is compatible with Bruno Blanchet's ProVerif tool.</p>
      <p>The main difference with ProVerif is that ISpi translates the semantics of spi-calculus processes not to general clause sets, but to approximate 
      <span class="math" align="left"><img align="middle" width="22" height="26" src="math_image_4.png" xylemeAttach="4" border="0" alt="Im4 $\#8459 _1$"/></span>clause sets, which are then solved using the 
      <tt>h1</tt>toolset.</p>
      <p>This is work in progress. A Web page is accessible from the 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/software/" location="extern" xyref="2236848657014">http://www.lsv.ens-cachan.fr/software/</ref>software page at LSV, with a rough
      documentation on the various semantics used, notably the 
      <i>lean</i>semantics (a very crude semantics, akin to Nielson, Nielson and Seidl's treatment of the spi-calculus 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid28" location="biblio" xyref="2159452058011"/>), and the 
      <i>light</i>semantics, a more precise semantics which more fully exploits the expressive power of the 
      <span class="math" align="left"><img align="middle" width="22" height="26" src="math_image_4.png" xylemeAttach="4" border="0" alt="Im4 $\#8459 _1$"/></span>class. A proposal for dealing with equality and disequality predicates is also included in the documentation. ISpi is released under the GPL.</p>
    </subsection>
    <subsection level="1" id="uid27">
      <bodyTitle>The PROUVÉ Parser Library</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18146">
          <firstname>Ralf</firstname>
          <lastname>Treinen</lastname>
        </person>
      </participants>
      <p>The PROUVÉ parser library is the first piece of software published by the project RNTL PROUVÉ (see 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid53" location="intern" xyref="2159452058011"/>). The library provides functionality to parse cryptographic protocol specifications written in the PROUVÉ
      specification language (see also 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid40" location="intern" xyref="2159452058011"/>) as well as protocol security assertions written in the PROUVÉ assertion language, to verify typing and to perform
      some other static analysis checks, and to construct an internal representation of their abstract syntax. This library is intended for use by the input modules of various verification tools employed in the PROUVÉ project. These input modules are currently under development.</p>
      <p>The library is written in the programming language 
      <span align="left" class="smallcap">Objective CAML</span>and comprises approximately 4000 lines of code. The library is licensed under the 
      <i>GNU Lesser General Public License</i>(LGPL). The distribution comes with a parser application program which serves to validate the syntax and static semantics of protocol specifications and security assertions.</p>
      <p>The library and the parser application are available via the project web page 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/prouve" location="extern" xyref="3644004998014">http://www.lsv.ens-cachan.fr/prouve</ref>.</p>
    </subsection>
    <subsection level="1" id="uid28">
      <bodyTitle>SPORE: the Security Protocols Open Repository</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18098">
          <firstname>Florent</firstname>
          <lastname>Jacquemard</lastname>
          <moreinfo>in charge</moreinfo>
        </person>
        <person key="PASUSERID">
          <firstname>Delaune</firstname>
          <lastname>Stéphanie</lastname>
        </person>
        <person key="PASUSERID">
          <firstname>Lafourcade</firstname>
          <lastname>Pascal</lastname>
        </person>
        <person key="PASUSERID">
          <firstname/>
          <lastname>(non-exclusive list)</lastname>
        </person>
      </participants>
      <p>SPORE is a publicly accessible Web page (
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/spore/" location="extern" xyref="365141289025">http://www.lsv.ens-cachan.fr/spore/</ref>). Its purpose is to provide a public repository
      of cryptographic protocols, with for each protocol the description of its various versions, the security properties that it is claimed to satisfy, those that it genuinely satisfy and under which assumptions, and the known attacks against the protocol.</p>
      <p>The page SPORE aims at being used as a source of case studies for the designers of formal methods and tools for automated cryptographic protocol verification, continuing the endeavor of John Clark and Jeremy Jacob whose survey on protocol verification, published in 1997, has been widely
      distributed.</p>
      <p>The whole repository is accessible on line, so as to cater for some interactivity with users and to promote its reusability by tool designers. A dozen of new protocols have been submitted in 2005, in connection with the RNTL project PROUVÉ (see Section 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid52" location="intern" xyref="2159452058011"/>).</p>
    </subsection>
  </logiciels>
  <resultats id="uid29">
    <bodyTitle>New Results</bodyTitle>
    <subsection level="1" id="uid30">
      <bodyTitle>Towards a Generic Results</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18221">
          <firstname>Vincent</firstname>
          <lastname>Bernat</lastname>
        </person>
        <person key="secsi-2005-id18187">
          <firstname>Hubert</firstname>
          <lastname>Comon-Lundh</lastname>
        </person>
        <person key="secsi-2005-id18250">
          <firstname>Stéphanie</firstname>
          <lastname>Delaune</lastname>
        </person>
      </participants>
      <p>Recently, a lot of results have shown how to relax the perfect cryptography assumption for security protocol verification in a number of particular situations. The aim of this work is to bring together these results and to provide general conditions on the equational theory and the
      intruder deduction system under which one gets a decision procedure for the verification of security protocols for a bounded number of sessions. Hubert Comon-Lundh has introduced this line of research in 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid30" location="biblio" xyref="2159452058011"/>.</p>
      <p>The first part of this work consists of reducing the equational theory to a simpler one by using 
      <i>variants</i>. Hubert Comon-Lundh and Stéphanie Delaune have formally defined the finite variant property allowing to reduce the equational theory. They have given equivalent (resp. sufficient) conditions on the equational theory to ensure that the finite variant property holds. They have
      investigated this property for some equational theories which are relevant to security protocols verification. For instance, they have proved that the finite variant property holds for the Dolev-Yao theory with explicit destructors, exclusive or, Abelian Groups, etc. They have also shown that
      the finite variant property does not hold for the theory ACUNh (Associativity, Commutativity, Unit, Nilpotence, homomorphism). This work has been published at RTA 2005 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid31" location="biblio" xyref="2159452058011"/>.</p>
    </subsection>
    <subsection level="1" id="uid31">
      <bodyTitle>Verification of Protocols for AC-like Theories with Homomorphisms or Distributive Encryption</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18250">
          <firstname>Stéphanie</firstname>
          <lastname>Delaune</lastname>
        </person>
        <person key="secsi-2005-id18270">
          <firstname>Pascal</firstname>
          <lastname>Lafourcade</lastname>
        </person>
        <person key="secsi-2005-id18146">
          <firstname>Ralf</firstname>
          <lastname>Treinen</lastname>
        </person>
      </participants>
      <p>The perfect cryptography assumption widely adopted for the formal verification of security protocol is unrealistic for cryptographic primitives with visible algebraic properties. The classical Dolev-Yao model can be extended to deal with the fact that the intruder can exploit these
      properties. AC-like equational theories are those which involve an Associative and Commutative operator and are often used in cryptographic protocols.</p>
      <p>Pascal Lafourcade, Ralf Treinen and Denis Lugiez (University of Marseille) have investigated the intruder deduction problem, that is the vulnerability to passive attacks, in presence of several variants of AC-like axioms (from AC to Abelian groups, including the theory of exclusive or) and
      homomorphism, which are the most frequent axioms arising in cryptographic protocols. Solutions to this problem have been known for the cases of exclusive or, of Abelian groups, and of homomorphism alone. In 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid32" location="biblio" xyref="2159452058011"/>, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid33" location="biblio" xyref="2159452058011"/>the authors address the combination of these AC-like theories with the law of homomorphism which leads to much more
      complex decision problems. They prove decidability of the intruder deduction problem in all cases considered. Their decision procedure is in EXPTIME, except for a restricted case in which they have been able to obtain a PTIME decision procedure using a property of one-counter and pushdown
      automata.</p>
      <p>Pascal Lafourcade has also investigated this problem in presence of the equational theory of a commutative encryption operator which distributes over the exclusive or operator. These operators are frequently used in cryptographic protocols. For instance, the well-known RSA encryption is a
      commutative encryption, and the exclusive-or is used in several cryptographic protocols. The interaction between the commutative distributive law of the encryption and exclusive-or offers more possibilities to decrypt an encrypted message than in the non-commutative case. Pascal Lafourcade
      has shown that the intruder deduction problem is decidable and he has provided a 2-EXPTIME decision procedure. This work 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid34" location="biblio" xyref="2159452058011"/>has been submitted for publication.</p>
      <p>Stéphanie Delaune has shown that the problem is actually in PTIME for the case of an exclusive or (resp. Abelian Groups) operator in combination with the homomorphism axiom. The problem is addressed by solving a system of linear equations over 
      <span class="math" align="left"><hi rend="it">Z</hi>/2
      <hi rend="it">Z</hi>[
      <hi rend="it">h</hi>]</span>(resp. 
      <span class="math" align="left"><hi rend="it">Z</hi>[
      <hi rend="it">h</hi>]</span>). This work improves the EXPTIME complexity results previously obtained. It has been accepted for publication at IPL 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid35" location="biblio" xyref="2159452058011"/>.</p>
      <p>The works described above addressed the verification problem in presence of a passive attacker. Stéphanie Delaune, Pascal Lafourcade, Ralf Treinen and Denis Lugiez have also investigated the verification problem in presence of an active attacker who can not only listen to messages that
      pass over the network, but also intercept them and use them to fake messages. They have considered the theory of exclusive or in combination with the homomorphism axiom and they have shown that the problem is decidable. One main step of their proof consists in reducing the constraint system
      for deducibility into a constraint system for deducibility in one step and using one particular rule of the constraint system. This constraint system, in turn, can be expressed as a system of quadratic equations of a particular form over the ring of polynomials in one indeterminate over the
      finite field 
      <span class="math" align="left"><hi rend="it">Z</hi>/2
      <hi rend="it">Z</hi>[
      <hi rend="it">h</hi>]</span>. They show that satisfiability of these systems of equations is decidable in 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid36" location="biblio" xyref="2159452058011"/>.</p>
    </subsection>
    <subsection level="1" id="uid32">
      <bodyTitle>Security of protocols against guessing attacks</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18206">
          <firstname>Mathieu</firstname>
          <lastname>Baudet</lastname>
        </person>
      </participants>
      <p>Guessing attacks, also known as dictionary attacks, occurs when an attacker is able to recover the value of a secret data by searching the entire space of values. Passwords and, more generally, low-entropy secrets are especially vulnerable to guessing attacks, which gives a strong
      motivation for their study.</p>
      <p>Fortunately, not all low-entropy secrets can be broken: the attacker must still be able to test whether one of his guesses is correct or not, typically by exploiting redundancy between messages. Among guessing attacks, 
      <i>off-line</i>guessing attacks are those for which the attacker does not need to participate in any communication during the guessing phase.In practice, off-line guessing attacks are considered more crucial for security, as non-off-line ones may generate an important flow of messages on the
      network, and thus are either inefficient or easily detected.</p>
      <p>Amongst the numerous formal accounts of off-line guessing attacks that have been proposed in the litterature (for instance 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid37" location="biblio" xyref="2159452058011"/>, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid38" location="biblio" xyref="2159452058011"/>, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid39" location="biblio" xyref="2159452058011"/>, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid40" location="biblio" xyref="2159452058011"/>, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid41" location="biblio" xyref="2159452058011"/>, and 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid42" location="biblio" xyref="2159452058011"/>), the recent definition of Corin 
      <i>et al.</i> 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid40" location="biblio" xyref="2159452058011"/>appears attractive in several respects. Notably, based on the standard notion of static equivalence in the applied
      pi calculus, this definition is arguably natural and applies to an arbitrary set of cryptographic primitives parametrized by an equational theory.</p>
      <p>Unfortunately, it was not clear from the litterature before 2005 whether this definition could be addressed by an automatic procedure, nor whether some computational justification could be provided to it.</p>
      <p>Our first contribution in this area has been to show that the security of protocols against off-line guessing attacks, according to Corin 
      <i>et al.</i>'s definition, is decidable for a general class of equational theories, called 
      <i>subterm confluent</i>, in the case of a bounded number of sessions. This work was presented at CCS'05 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid43" location="biblio" xyref="2159452058011"/>. Independently, Blanchet 
      <i>et al.</i>presented at LICS'05 an approximate semi-procedure for an unbounded number of sessions.</p>
      <p>Our second contribution, in collaboration with Martín Abadi (University of California at Santa Cruz) and Bogdan Warinschi (LORIA), has been to establish the computational soundness of Corin 
      <i>et al.</i>'s criterion in the case of passive adversaries. In other words, we showed that in the case of passive adversaries, if the formal criterion holds, then the protocol is secure against guessing attacks in the computational model as well. This result has strong connexions with the
      one presented in Section 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid34" location="intern" xyref="2159452058011"/>. This work was submitted for publication at FOSSACS'06.</p>
    </subsection>
    <subsection level="1" id="uid33">
      <bodyTitle>Formal analysis of electronic voting protocols</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18250">
          <firstname>Stéphanie</firstname>
          <lastname>Delaune</lastname>
        </person>
        <person key="secsi-2005-id18118">
          <firstname>Steve</firstname>
          <lastname>Kremer</lastname>
        </person>
      </participants>
      <p>Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of implemented systems have demonstrated the importance of formally verifying the underlying voting protocols. The
      applied pi calculus is a formalism for modelling such protocols, and allows verifying properties by using automatic tools, and to rely on manual proof techniques for cases that automatic tools are unable to handle.</p>
      <p>Steve Kremer and Mark Ryan (University of Birmingham) have used the applied pi calculus to model a known protocol for elections known as FOO 92, and three of its expected properties, namely fairness, eligibility, and privacy are formalized. Blanchet's tool ProVerif is used to prove
      that the first two properties are satisfied. In the case of the third property, ProVerif is unable to prove it directly, because its ability to prove observational equivalence between processes is not complete. A manual proof is provided for the required equivalence. Moreover, the proof
      emphasizes the need to divide the protocol into three phases in order for privacy to hold. Although the original description of the protocol describes three phases, no explanation for this choice is given and therefore the proof might increase the understanding of this property.</p>
      <p>This result has been published at the European Symposium on Programming (ESOP '05).</p>
      <p>In an extension of this work Stéphanie Delaune, Steve Kremer and Mark Ryan have extended and generalized the previous work: they give a general definition of what is an electronic voting protocol in the applied pi calculus in order to formalize and study two other properties,
      coercion-resistance and receipt-freeness. Intuitively, an election protocol is coercion-resistant if a voter 
      <hi rend="italic">A</hi>cannot prove to a potential coercer 
      <hi rend="italic">C</hi>that she voted in a particular way. One assumes that 
      <hi rend="italic">A</hi>cooperates with 
      <hi rend="italic">C</hi>in an interactive way. Receipt-freeness is a weaker property, for which one assumes that 
      <hi rend="italic">A</hi>and 
      <hi rend="italic">C</hi>cannot interact during the protocol, but 
      <hi rend="italic">A</hi>later provides evidence (the receipt) of how she voted. While receipt-freeness can be expressed using observational equivalence from the applied pi calculus, they need to introduce a new relation to capture coercion-resistance. The formalization of coercion-resistance
      and receipt-freeness are quite different. Nevertheless, they show in accordance with intuition that coercion-resistance implies receipt-freeness, which implies privacy, the basic anonymity property of voting protocols, as defined in the previous work. Finally the definitions are illustrated
      on a simplified version of the Lee 
      <i>et al.</i>voting protocol.</p>
      <p>An extended abstract of this work has been published at the Frontiers in Electronic Elections (FEE 2005) workshop. A more complete version has been submitted.</p>
    </subsection>
    <subsection level="1" id="uid34">
      <bodyTitle>Link between the formal and computational views of cryptography</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18206">
          <firstname>Mathieu</firstname>
          <lastname>Baudet</lastname>
        </person>
        <person key="secsi-2005-id18118">
          <firstname>Steve</firstname>
          <lastname>Kremer</lastname>
        </person>
      </participants>
      <p>Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic
      polynomial-time attacks. However, proofs in this model are difficult and less successful for large, complex protocols. The other approach relies on a symbolic model of protocol executions in which cryptographic primitives are treated as black boxes. Since the seminal work of Dolev and Yao, it
      has been realized that this latter approach enables significantly simpler and often automated proofs of complex protocols. However, the guarantees that it offers with respect to a deployed protocol have been quite unclear.</p>
      <p>Mathieu Baudet, Véronique Cortier (LORIA) and Steve Kremer have studied the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, they do not consider a fixed set of primitives but aim at results for an
      arbitrary equational theory. They define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In particular, they concentrate on the computational soundness of static equivalence, a standard tool in cryptographic pi calculi.
      They present a soundness criterion, which for many theories is not only sufficient but also necessary. Finally, they establish new soundness results for the exclusive OR and a theory of ciphers and lists.</p>
      <p>This work has been published at the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05). A full version has been submitted for publication at Theoretical Computer Science.</p>
    </subsection>
    <subsection level="1" id="uid35">
      <bodyTitle>Karp-Miller trees for BVASS</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18078">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
        </person>
      </participants>
      <p>This is joint work with Kumar Neeraj Verma, TU München, and former student of Goubault-Larrecq 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid44" location="biblio" xyref="2159452058011"/>. In fact, this was a result obtained by Verma in 2003, while he was member of the SECSI project, in collaboration
      with Goubault-Larrecq.</p>
      <p>In his PhD thesis, Verma proposed to study BVASS (Branching VASS) which extend VASS (Vector Addition Systems with States) by allowing addition transitions that merge two configurations. These objects were then rediscovered by de Groote et al. (LICS 2004) under the name of VATA (Vector
      Addition Tree Automata). The latter showed that provability in the multiplicative-exponential fragment of linear logic (MELL), a still unsolved problem, is equivalent to reachability in VATA, a.k.a., BVASS. BVASS were discovered in the SECSI project as a convenient tool to study two-way tree
      automata modulo AC (associativity, commutativity), and the latter are useful to verify cryptographic protocols in the presence of AC operators—a theme that is now flourishing, as the RNTL PROUVÉ project certainly demonstrates.</p>
      <p>Runs in BVASS are tree-like structures instead of linear ones as for VASS. Verma showed in 2003 that the construction of Karp-Miller trees for VASS can be extended to BVASS, and this was published in 2005 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid44" location="biblio" xyref="2159452058011"/>. This entails that the coverability set for BVASS is computable. This allows one to obtain decidability results for
      certain classes of equational tree automata modulo AC. This is also a first towards answering the question of the decidability of MELL in the affirmative.</p>
    </subsection>
    <subsection level="1" id="uid36">
      <bodyTitle>Abstraction and Resolution Modulo AC</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18078">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
        </person>
      </participants>
      <p>This is joint work with Kumar Neeraj Verma, TU München, and Muriel Roger, LIST, CEA, both former students of Goubault-Larrecq 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid45" location="biblio" xyref="2159452058011"/>. In this paper, it is shown how one can approximate sets of clauses modulo an AC symbol using a sophisticated
      approximation scheme that supplements ordinary ordered resolution with selection. It is demonstrated that this applies to concrete cryptographic protocols such as those derived from the group Diffie-Hellman key generation protocols (GDH.2, IKA.1), and works efficiently in practice.</p>
    </subsection>
    <subsection level="1" id="uid37">
      <bodyTitle>Tree Automata with Equality Constraints Modulo Equational Theories</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18098">
          <firstname>Florent</firstname>
          <lastname>Jacquemard</lastname>
        </person>
      </participants>
      <p>Florent Jacquemard, Michael Rusinowitch and Laurent Vigneron (from the project CASSIS at UR Lorraine) have worked at introducing and studing new classes of tree automata combining automata with equality test and automata modulo equational theories. The main application at aim for such a
      formalism is the automated verification of reachability properties of infinite state systems, where the states of the system are represented by ground terms (terms without variables) and the set of reachable states, or an (lower or upper) approximation, is a tree automaton language. The
      transitions of the system can be be represented either by tree automata transitions or by rewrite rules. This approach for verification, adopted in many works concerned with security, raises two important issues in tree automata theory: how can we augment the expressivity of tree automata
      languages, while preserving good decidability properties (in particular the ability of testing the emptiness of recognized languages), and which classes of rewrite systems preserve the recognizability (by tree automata) of term languages? These issues have been adresses separately since more
      than 15 years, a major improvement being in particular the addition of equality and disequality constraints in tree automata transitions (see e.g. 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid11" location="biblio" xyref="2159452058011"/>), and this work is to our knowledge a first attempt of adressing both problems simultaneously.</p>
      <p>It is shown in 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid46" location="biblio" xyref="2159452058011"/>that the emptiness problem is undecidable for former classes of non-deterministic tree automata with equality
      constraints, contradicting a long-term claim of 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid47" location="biblio" xyref="2159452058011"/>(see also 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid11" location="biblio" xyref="2159452058011"/>). A decidable restriction is proposed for the application of constraints as well as an extension based the standard
      Horn clause representation for tree automata with equational conditions or rewrite systems or both. The 
      <i>generalized membership problem</i>(whether there exists a ground instance of a given term in a given tree automata language, this embeds the classical emptiness problem) is shown decidable for the various tree automata classes studied in 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid46" location="biblio" xyref="2159452058011"/>, with a uniform theorem-proving technique used to prove that the saturation of tree automata presentations with
      suitable paramodulation strategies terminates. It has been shown that these results can be applied to the verification of the reachability problem for security protocols described in a fragment of the applied pi-calculus.</p>
      <p>The main advantage of the choice of theorem-proving techniques for this works is that it permits a practical exploitation of the above results. Early experiments conducted on some examples of protocols with general purpose theorem provers like SPASS and DaTac have given encouraging
      results, and a specialized implementation is on course. It is the first known implementation of classes of tree automata with equality constraints.</p>
      <p>Moreover, the participants are currently working on numerous extensions like the addition of disequality constraints or other constraints like ordering constraints, the extension of the decision techniques to the recognizability modulo axioms for associativity and commutativity, and the
      recognition of binary relations on terms by automata.</p>
    </subsection>
    <subsection level="1" id="uid38">
      <bodyTitle>Proof by Induction in Conditional and Constrained Specifications</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18098">
          <firstname>Florent</firstname>
          <lastname>Jacquemard</lastname>
        </person>
      </participants>
      <p>Adel Bouhoula (École supérieure des communications de Tunis) and Florent Jacquemard have continued to work on their development of an approach for mechanizing induction on complex data structures (like bags, sets, sorted lists, trees,...) based on tree automata with constraints. In this
      approach, which combines techniques of explicit induction and implicit induction (aka proof by consistency), a tree automata with constraints characterizing the initial model of a given algebraic specifications is used both as an 
      <i>induction scheme</i>for the generation of subgoals and for checking consistency during the proof by induction (using classical tree automata algorithms).</p>
      <p>During this year, the method has been generalized to deal with inductive proofs for partial constructor specifications, in particular for the definition of powerlists (lists stored in balanced binary trees) and for the inductive verification of some cryptographic protocols specified with
      explicit destructors.</p>
      <p>Moreover, some extensions of this approch have been proposed to address the problem of the automatic verification of the properties sufficient completeness 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid48" location="biblio" xyref="2159452058011"/>and confluence of conditional and constrained specification.</p>
    </subsection>
    <subsection level="1" id="uid39">
      <bodyTitle>Extensions of valuations</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18078">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
        </person>
      </participants>
      <p>In a paper presented at the CSL conference in 2002, Goubault-Larrecq, together with David Nowak (former member of SECSI, today at Tokyo University) and Slawek Lasota (Warsaw University), laid out the foundations of logical relations for Moggi's computational 
      <span class="math" align="left"><img width="11" height="13" align="bottom" border="0" src="../../images/img_lambda.png" alt="$ \lambda$"/></span>-calculus. This was then used as a basis in Zhang Yu's PhD thesis, defended in 2005, on cryptographic logical relations, with an application to the verification of properties such as strong secrecy.</p>
      <p>The construction of logical relations above reduces to lifting strong monads to a so-called subscone category above the category where denotations take place. It can be applied to a hoist of monads, and one that was taken as an example in the above cited CSL paper was that of probabilistic
      choice. This is illustrated in the long version 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid49" location="biblio" xyref="2159452058011"/>, awaiting publication in a journal</p>
      <p>This prompted further studies of probabilities in the semantics of programming languages and with an eye towards security. The first result published in this line of research, which is admittedly a satellite of the main research themes of SECSI, is 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid50" location="biblio" xyref="2159452058011"/>, is that simple valuations on a topological space 
      <hi rend="italic">X</hi>, i.e., least upper bounds of finite linear combinations of point-mass valuations, which play a prominent role in the theory of continuous valuations, are exactly those that extend to continuous valuations to the Alexandroff topology of the underlying specialization
      ordering. This complements the exhaustive apparatus of theorems that show under which conditions continuous valuations extend to measures on the Borel subsets of 
      <hi rend="italic">X</hi>.</p>
      <p>The current line of research in this domain is now in finding reasonable notions of observational equivalence, bisimulation (and logical relations) for transition systems mixing probabilites and demonic non-determinism in a more general way than labelled Markov processes. This is required
      in subtle modern cryptographic protocols. The study of probabilistic models was started by Goubault-Larrecq in collaboration with Josée Desharnais and FranÃ§ois Laviolette (U. Laval, Québec) and Vincent Danos (PPS, U. Paris 7), informally during the summer 2003. Then Goubault-Larrecq was
      invited at Québec in summer 2004 to work on with. Goubault-Larrecq filed an ARC proposal, together with Catuscia Palamidessi (Comète, INRIA Futurs) and Vincent Danos in Fall 2005. Goubault-Larrecq will talk about his results at the GeoCal residential session, February 2006, Luminy,
      France.</p>
    </subsection>
    <subsection level="1" id="uid40">
      <bodyTitle>The PROUVÉ Manual</bodyTitle>
      <participants category="None">
        <person key="secsi-2005-id18118">
          <firstname>Steve</firstname>
          <lastname>Kremer</lastname>
        </person>
        <person key="secsi-2005-id18146">
          <firstname>Ralf</firstname>
          <lastname>Treinen</lastname>
        </person>
      </participants>
      <p>Yassine Lakhnech, Steve Kremer and Ralf Treinen describe in 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid51" location="biblio" xyref="2159452058011"/>the PROUVÉ specification language for cryptographic protocols. A main feature of the language is that it specifies
      protocols from the point of view of an agent executing the protocol, instead of describing correct protocol execution as seen by an outside observer. A protocol specification consists of five sections:</p>
      <orderedlist>
        <li id="uid41">
          <p>An optional user-defined 
          <i>signature</i>, extending the default signature.</p>
        </li>
        <li id="uid42">
          <p>An optional set of equational 
          <i>axioms</i>, giving a semantics to the user-defined signature.</p>
        </li>
        <li id="uid43">
          <p>A list of 
          <i>roles</i>which are the programs executed by the protocol participants. Programs are written in an imperative style. Essential elements of roles are send and receive instruction, sequential composition, assignment, generation of fresh nonces, and branching instructions.</p>
        </li>
        <li id="uid44">
          <p>A declaration of 
          <i>global variables</i>(which make take the form of multi-dimensional arrays). Global variables are used in the protocol scenario, and may be accessed by role invocations (processes) when passed as reference to the role.</p>
        </li>
        <li id="uid45">
          <p>A 
          <i>scenario</i>which specifies how roles are invoked. Elements of the scenario are parallel and sequential composition, non-deterministic choice, assignments, sequential loops and parallel spawning of processes.</p>
        </li>
      </orderedlist>
      <p>The manual defines the context-free syntax of protocol specifications and the static semantics conditions. The semantics of signatures and axioms is formally defined using concepts from algebraic specifications, and the semantics of roles, global variables and scenarios is given using a
      system of inference roles. The report gives syntax and semantics of a logics for safety assertions for traces. Finally, a sub-language of security assertions is given which allows to express usual security and authentication properties of protocols. The language of security assertions is
      designed with view to the proving capabilities of current verification tools.</p>
    </subsection>
  </resultats>
  <contrats id="uid46">
    <bodyTitle>Contracts and Grants with Industry</bodyTitle>
    <subsection level="1" id="uid47">
      <bodyTitle>Industrial Contracts</bodyTitle>
      <subsection level="2" id="uid48">
        <bodyTitle>Analysing the security of the LP7 file format</bodyTitle>
        <participants category="None">
          <person key="secsi-2005-id18118">
            <firstname>Steve</firstname>
            <lastname>Kremer</lastname>
          </person>
        </participants>
        <p>The SECSI project participated in the evaluation of the security of a new file format, called LP7, which aims at providing a convenient file format integrating (possibly several) digital signatures and information related to their life cycle. The work consisted in building a logical
        model of the file format specification and analysing it against logical flaws.</p>
      </subsection>
    </subsection>
  </contrats>
  <international id="uid49">
    <bodyTitle>Other Grants and Activities</bodyTitle>
    <subsection level="1" id="uid50">
      <bodyTitle>Regional initiatives</bodyTitle>
      <subsection level="2" id="uid51">
        <bodyTitle>SYSTEM@TIC Paris-Région competitiveness cluster</bodyTitle>
        <participants category="None">
          <person key="secsi-2005-id18187">
            <firstname>Hubert</firstname>
            <lastname>Comon-Lundh</lastname>
          </person>
          <person key="secsi-2005-id18270">
            <firstname>Pascal</firstname>
            <lastname>Lafourcade</lastname>
          </person>
          <person key="secsi-2005-id18221">
            <firstname>Vincent</firstname>
            <lastname>Bernat</lastname>
          </person>
          <person key="secsi-2005-id18250">
            <firstname>Stéphanie</firstname>
            <lastname>Delaune</lastname>
          </person>
          <person key="secsi-2005-id18078">
            <firstname>Jean</firstname>
            <lastname>Goubault-Larrecq</lastname>
            <moreinfo>in charge</moreinfo>
          </person>
          <person key="secsi-2005-id18098">
            <firstname>Florent</firstname>
            <lastname>Jacquemard</lastname>
            <moreinfo>co-supervisor</moreinfo>
          </person>
          <person key="secsi-2005-id18146">
            <firstname>Ralf</firstname>
            <lastname>Treinen</lastname>
          </person>
        </participants>
        <p>The LSV and SECSI are involved in the SYSTEM@TIC Paris-Région competitiveness cluster ("
        <i>pôle de competitivité</i>") which has been labellised as "worldwide cluster" in July see 
        <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.systematic-paris-region.org/" location="extern" xyref="3000382882015">http://www.systematic-paris-region.org/</ref>. This cluster aims to make the région
        of Paris one of the few regions with a worldwide profile in terms of designing, building and harnessing complex systems.</p>
        <p>SECSI has participated in particular to the proposal of a cluster's project called 
        <i>Trusted Platforms</i>("
        <i>Plates-Formes de Confiance</i>") which involes 17 compagnies and laboratories and should start in 2006 Q1. The goal of this project is to address the technological and social stakes of the current use of information technologies in critical applications (online payment, mobile
        communication, embedded calculators etc). In this project SECSI will be mostly involved in the development of techniques of static analysis of source code and of methods for the automated detection of attacks of communication protocols.</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid52">
      <bodyTitle>National Initiatives</bodyTitle>
      <subsection level="2" id="uid53">
        <bodyTitle>RNTL PROUVÉ</bodyTitle>
        <participants category="None">
          <person key="secsi-2005-id18250">
            <firstname>Stéphani</firstname>
            <lastname>Delaune</lastname>
          </person>
          <person key="secsi-2005-id18187">
            <firstname>Hubert</firstname>
            <lastname>Comon-Lundh</lastname>
          </person>
          <person key="secsi-2005-id18078">
            <firstname>Jean</firstname>
            <lastname>Goubault-Larrecq</lastname>
          </person>
          <person key="secsi-2005-id18098">
            <firstname>Florent</firstname>
            <lastname>Jacquemard</lastname>
          </person>
          <person key="secsi-2005-id18118">
            <firstname>Steve</firstname>
            <lastname>Kremer</lastname>
          </person>
          <person key="secsi-2005-id18270">
            <firstname>Pascal</firstname>
            <lastname>Lafourcade</lastname>
          </person>
          <person key="secsi-2005-id18146">
            <firstname>Ralf</firstname>
            <lastname>Treinen</lastname>
            <moreinfo>Scientific Leader</moreinfo>
          </person>
        </participants>
        <p>The exploratory project ``PROUVÉ'', funded by the national network for software technology (RNTL), is a collaboration between CRIL Technology, France Télécom R&amp;D (Lannion), the CASSIS project at LORIA, INRIA Lorraine (Nancy), LSV (Cachan), and Verimag (Grenoble). The notification of
        acceptance, dated November 2003, was received end of January 2004. The project will end May 24, 2007. All the participants at LSV are members of the SECSI project.</p>
        <p>The PROUVÉ project (for ``Protocoles cryptographiques: outils de vérification automatique'', i.e., cryptographic protocols: automated verification tools) is based on the foundations layed by the EVA project, which ended late 2003. In 2005, SECSI was mainly involved in four of the five
        tasks of the project PROUVÉ:</p>
        <descriptionlist>
          <label>Task 1: Semantics of protocols and of their properties</label>
          <li id="uid54">
            <p>One major goal of the project is to define a semantics of cryptographic protocols that would be independent of the particular security property under consideration, and to define a language of security properties which would allow one to express all properties of interest,
            independently of the protocol studied.</p>
            <p>The PROUVÉ language has been described in 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid51" location="biblio" xyref="2159452058011"/>(see also 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid40" location="intern" xyref="2159452058011"/>). This manual contains the formal definition of syntax and semantics of both the PROUVÉ protocol
            specification language, as of a logics for safety properties of traces and of an assertion language for the security properties of cryptographic protocols. (see 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid40" location="intern" xyref="2159452058011"/>).</p>
            <p>A first version of the PROUVÉ parser library has been released (see 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid27" location="intern" xyref="2159452058011"/>). This parser library implements the protocol specification and assertion language described in the PROUVÉ
            manual.</p>
          </li>
          <label>Task 3: Case Studies</label>
          <li id="uid55">
            <p>The techniques to be developed in this project will be validated in case studies provided by one of the industrial partners of the project, France Télécom R&amp;D. This work is carried out by a PhD student (Stéphanie Delaune, CIFRE grant) under the direction of Francis Klay (France
            Télécom R&amp;D).</p>
            <p>A comparison of various protocol verification tools at hand of the first case study of the project, an electronic payment protocol formally described in 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid52" location="biblio" xyref="2159452058011"/>, has been performed by Bozga, Delaune, Klay and Vigneron 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid53" location="biblio" xyref="2159452058011"/>. This study compares the three verification tools ProVerif, CASRUL, and Hermes. A major problem to the
            verification of this protocol is the rich equational theory describing the semantics of the operators used by this protocol. None of the verification tools was able to perform a verification of the protocol taking into account all of the algebraic properties of the operators, thus
            raising the necessity for further research in this direction (which is adressed by task 5 of the project). This case study makes also apparent the usefulness of the language elements introduced in the design of the PROUVÉ language.</p>
            <p>The second large case study to be performed by the PROUVÉ project was presented by Delaune, Klay and Kremer in 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid54" location="biblio" xyref="2159452058011"/>. Subject of this case study is an electronic voting protocol by Traoré which is based on a protocol
            originally proposed by Fujioka, Okamoto and Ohta. This protocol, based on the principle of blind signatures, is very complex both in its modelisation as in its security assertions.</p>
          </li>
          <label>Task 4: Realization and update of verification tools</label>
          <li id="uid56">
            <p>The project will produce an integrated platform for the verification of cryptographic protocols, comprising an input module, several verification tools, and a common output module featuring in particular a simulation tool for attacks found by the verification tools. LSV is
            contributing the verification tool H1 (see 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid25" location="intern" xyref="2159452058011"/>) to this platform. Work on a translator from the PROUVÉ specification language to the H1 verification tool
            has begun.</p>
          </li>
          <label>Task 5: Weakening of the perfect cryptography assumption</label>
          <li id="uid57">
            <p>Another goal of the project is to extend the known methods of protocol verification by weakening the so-called perfect cryptography assumption. In particular, it should be possible to verify cryptographic protocols while taking into consideration algebraic properties of cryptographic
            primitives (such as those of modular arithmetic, as frequently used in public key cryptography), and substitution of nonces by timestamps or counters.</p>
            <p>A completed and finalized version of a survey of algebraic properties used in cryptographic protocols by Cortier, Delaune and Lafourcade has been accepted for publication 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid55" location="biblio" xyref="2159452058011"/>. They give a list of some relevant algebraic properties of cryptographic operators, and for each of them,
            provide examples of protocols or attacks using these properties. They also give an overview of the existing methods in formal approaches for analyzing cryptographic protocols.</p>
            <p>Different results concerning the verification of security properties both against passive and active attacks under various equational theories involving homomorphic hash functions and distributive encryption operators have been obtained (see 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid31" location="intern" xyref="2159452058011"/>).</p>
          </li>
        </descriptionlist>
      </subsection>
      <subsection level="2" id="uid58">
        <bodyTitle>ACI Sécurité ``Rossignol''</bodyTitle>
        <participants category="None">
          <person key="secsi-2005-id18187">
            <firstname>Hubert</firstname>
            <lastname>Comon-Lundh</lastname>
          </person>
          <person key="secsi-2005-id18270">
            <firstname>Pascal</firstname>
            <lastname>Lafourcade</lastname>
          </person>
          <person key="secsi-2005-id18221">
            <firstname>Vincent</firstname>
            <lastname>Bernat</lastname>
          </person>
          <person key="secsi-2005-id18250">
            <firstname>Stéphanie</firstname>
            <lastname>Delaune</lastname>
          </person>
          <person key="secsi-2005-id18078">
            <firstname>Jean</firstname>
            <lastname>Goubault-Larrecq</lastname>
          </person>
          <person key="secsi-2005-id18098">
            <firstname>Florent</firstname>
            <lastname>Jacquemard</lastname>
          </person>
          <person key="secsi-2005-id18146">
            <firstname>Ralf</firstname>
            <lastname>Treinen</lastname>
          </person>
        </participants>
        <p>The ``Rossignol'' project, submitted and accepted as an ACI sécurité informatique, started in december 2003. The partners of the project are the LIF (Laboratoire d'Informatique Fondamentale de Marseille), the CoMeTe action of INRIA Futurs (Laboratoire d'Informatique de l'École
        Polytechnique, Saclay), the LSV (Cachan) and Verimag (Grenoble). All the participants at LSV are members of the SECSI project. This ACI funds in particular the PhD of Pascal Lafourcade, under the direction of Ralf Treinen and Denis Lugiez (LIF), on subjects of the project. The web page of
        the project is 
        <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.cmi.univ-mrs.fr/~lugiez/aci-rossignol.html" location="extern" xyref="2996375264009">http://www.cmi.univ-mrs.fr/~lugiez/aci-rossignol.html</ref></p>
        <p>The project aims at studying semantics issues related to the verification of cryptographic protocols. It has been proposed to investigate new frameworks especially to embed probablistic protocols, to go beyond the Dolev-Yao model, introducing different theories that defines attackers
        capabilities, and different semantics of the intended decurity properties.</p>
        <p>The members of SECSI were involved in several advances of the project Rossignol this year, in particular:</p>
        <simplelist>
          <li id="uid59">
            <p>the study of transformation, based on variants, of equational theories related to protocol verification, see Section 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid30" location="intern" xyref="2159452058011"/>,</p>
          </li>
          <li id="uid60">
            <p>the proof of the decidability of problems reated to the verification of protocol in presence of cryptographic operators following AC-like axioms (from Associativity and Commutativity to Abelian groups, including the theory of exclusive or) and homomorphism, both in the case of a
            passive attacker (intruder deduction problem) and an active attacker, see Section 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid31" location="intern" xyref="2159452058011"/>.</p>
          </li>
          <li id="uid61">
            <p>the study of the decidability of formal security of protocols against off-line guessing attacks, and the connexion between the formal and computational models in the context of this kind of attacks, see Section 
            <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid32" location="intern" xyref="2159452058011"/>.</p>
          </li>
        </simplelist>
      </subsection>
      <subsection level="2" id="uid62">
        <bodyTitle>ARA SSIA ``Formacrypt''</bodyTitle>
        <participants category="None">
          <person key="secsi-2005-id18206">
            <firstname>Mathieu</firstname>
            <lastname>Baudet</lastname>
          </person>
          <person key="secsi-2005-id18078">
            <firstname>Jean</firstname>
            <lastname>Goubault-Larrecq</lastname>
          </person>
          <person key="secsi-2005-id18118">
            <firstname>Steve</firstname>
            <lastname>Kremer</lastname>
          </person>
        </participants>
        <p>The ``Formacrypt'' project was submitted and accepted in the framework of the 2005 ARA SSIA ("Sécurité, Systèmes embarqués et Intelligence Ambiante") of the GIP ANR (Agence Nationale de la Recherche). Formally, it will start early 2006. The partners are Ecole Normale Supérieure de Paris
        (leader), SECSI, and INRIA project-team CASSIS (Nancy).</p>
        <p>Most efforts in cryptographic protocol verification use either the computational approach, in which messages are bitstrings, or the formal approach, in which messages are terms. The computational approach is more realistic but more difficult to automate. The goal of the Formacrypt
        project is to bridge the gap between these two approaches.</p>
        <p>Several works have already begun linking these approaches, but they all have limitations. They generally put too strong security requirements on these primitives, and they do not allow one to compute the probability of an attack explicitly. The Formacrypt project offers three approaches
        in order to overcome these limitations.</p>
        <simplelist>
          <li id="uid63">
            <p>In the 
            <i>direct</i>approach, the goal will be to design and implement a computationally sound, automated protocol prover. This prover will build computational proofs presented as sequences of so-called games: the first game corresponds to the real protocol, the next games are obtained by
            transformations so that the difference of probability between consecutive games is negligible, and the probability of success of an attack in the last game is obvious. The probability of success of an attack in the initial game can then be bounded.</p>
          </li>
          <li id="uid64">
            <p>The purpose of the 
            <i>intermediate</i>approach will be to design a computationally sound logic, by adapting and extending an existing modal logic (the Protocol Composition Logic), originally sound in the formal model. The definition of a new semantics for this logic and the addition of new predicates,
            specific to the computational model, will be necessary.</p>
          </li>
          <li id="uid65">
            <p>In the 
            <i>modular</i>approach, the idea is to extend theorems that prove the computational soundness of formal proofs of protocols. This should allow one to reuse existing tools. These extensions will concern both security properties (fairness, secrecy of keys, etc.) and cryptographic
            primitives (symmetric encryption, hash functions, etc.) Additionally, weaker security properties will be considered, for public-key encryption (resistance to chosen plaintext attacks) and for signatures (for electronic voting, for instance). This will also involved studying the
            computational soundness of formal models based on equational theories, which represent more precisely the properties of cryptographic primitives. Finally, the computational soundness of formal models for guessing attacks (for weak secrets, such as passwords) will be investigated,
            too.</p>
          </li>
        </simplelist>
      </subsection>
    </subsection>
    <subsection level="1" id="uid66">
      <bodyTitle>International initiatives</bodyTitle>
      <subsection level="2" id="uid67">
        <bodyTitle>STIC Tunisia</bodyTitle>
        <p>SECSI has been involved in the submition of project proposal for the french-Tunisia program between INRIA and tunisian universities. The goal of this project is the development of tools for automated induction theorem proving and their validation on problems for security of protocols and
        distributed systems. The partners are the research team of Adel Bouhoula at Sup'com Tunis, Mohamed Mosbah from LaBRI (Bordeaux) and SECSI.</p>
        <p>The project has been accepted and should start in 2006. This project will in particular partially support a PhD co-supervised by Adel Bouhoula and Mohamed Mosbah on "
        <i>formal methods and tools for the security in distributed systems</i>".</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid68">
      <bodyTitle>Visiting Scientists</bodyTitle>
      <p>Nadia Tawbi (U. Laval) has been invited from January, 20th to February, 20th to work with Jean Goubault-Larrecq on the subject of static analysis of code for verifying security properties. A few partial results were obtained on typing systems for script languages.</p>
      <p>Helmut Seidl (TU Munich) has been invited from March, 1st to March, 11th and from March, 21st to March, 30th to work with Jean Goubault-Larrecq on the subject of decidable classes of first-order Horn clauses, extending 
      <span class="math" align="left"><img align="middle" width="22" height="26" src="math_image_4.png" xylemeAttach="4" border="0" alt="Im4 $\#8459 _1$"/></span>or H. Seidl and K.N.Verma's ideas on mixes of flat and one-variable clauses.</p>
      <p>Mark Ryan (University of Birmingham) has been invited from May, 9th to May, 13th to work with Steve Kremer on the results presented in 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid33" location="intern" xyref="2159452058011"/>.</p>
      <p>Chris Lynch (Clarkson University) has been invited from june 6th to June 10th to work with Hubert Comon-Lundth, Stéphanie Delaune on topics related to 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid30" location="intern" xyref="2159452058011"/>.</p>
      <p>Adel Bouhoula has been invited from June, 1st to June, 18th, with the support of a grant 
      <i>SSHN</i>of the French Institute for Cooperation in the french embassy in Tunisia, to work with Florent Jacquemard on the problems described in Section 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#uid38" location="intern" xyref="2159452058011"/>.</p>
    </subsection>
  </international>
  <diffusion id="uid69">
    <bodyTitle>Dissemination</bodyTitle>
    <subsection level="1" id="uid70">
      <bodyTitle>Teaching</bodyTitle>
      <p>Mathieu Baudet gave a series of TDs (exercise sessions) in logics at the magistère STIC, ENS Cachan in january 2005. Total Amount: 12h.</p>
      <p>Hubert Comon-Lundh gave lectures at ENS Cachan on Logic (1rst year), Computability (1rst year), Concurrency and Operating Systems (1rst year).</p>
      <p>Hubert Comon-Lundh gave in Oct-Nov the first part of the course on Tree Automata Techniques and Applications (MPRI 2-28-1) at the Mastère Parisien de Recherche en Informatique (MPRI), second year. The second part was given by Florent Jacquemard in Nov-Dec. Total volume (for both parts): 36
      h. (TD equivalent).</p>
      <p>Stéphanie Delaune gave, as moniteur at University Paris 7, TPs (programming exercise sessions) on JAVA to students of Licence 1 (Volume 24h). She also gave TDs and TPs on finite automata to students of Licence 2 (Volume 52h).</p>
      <p>Stéphane Demri gave a series of lectures on temporal logics at the Master Parisien de Recherche en Informatique (MPRI), amount: 12h.</p>
      <p>Stéphane Demri gave a 3-hour lecture on tableaux methods and modal logics at the Master Parisien de Recherche en Informatique (MPRI).</p>
      <p>Jean Goubault-Larrecq gave the ``Complexité I'' course in Jan-Feb. 2005, and in 2005-2006 (November-January). ENS Cachan, magistère STIC, 1st year. Total volume: 30 h. (TD equivalent).</p>
      <p>Jean Goubault-Larrecq gave the ``Complexité II'' course in Apr-June 2005, at ENS Cachan, 1st year. Total volume: 33 h. (TD equivalent).</p>
      <p>Jean Goubault-Larrecq gave the first half of the module ``Programmation I''. ENS Cachan, magistère STIC, 1st year. Total volume: 30 h. (TD equivalent).</p>
      <p>Jean Goubault-Larrecq gave the course on logic and computer science (``logique et informatique''), second term of first year, common to the magistère STIC, ENS Cachan, and the magistère de mathématiques fondamentales et appliquées Ã l'informatique (MMFAI), ENS (rue d'Ulm). Amount: 36 h.
      (TD equivalent).</p>
      <p>Florent Jacquemard gave the TDs (exercise sessions) of the above course on logic and computer science. Amount: 24 h. (TD equivalent).</p>
      <p>Jean Goubault-Larrecq gave the first part of the course on Automated Deduction (MPRI 2-5) at the Mastère Parisien de Recherche en Informatique (MPRI), second year. The second part was given by Jean-Pierre Jouannaud. Total volume: 22 h. (TD equivalent).</p>
      <p>Jean Goubault-Larrecq gave an introduction to cryptography and cryptographic protocols to ENS Cachan economy students, March 2005. Total amount: 3 h.</p>
      <p>Jean Goubault-Larrecq gave a lecture on cryptography and cryptographic protocols in the ``Regards Croisés'' programme (series of lectures common to Math and Physics students), Oct. 25, 2005. This was the first of a series of three lectures, with Frédéric Grosshans, on quantum cryptography
      and information theory. Total amount: 4.5 h.</p>
      <p>Steve Kremer gave an invited lecture ``Blind, designated verifier and ring signatures'' in Mark Ryan's course ``Computer Security'' at the University of Birmingham. Amount: 1h.</p>
      <p>Steve Kremer gave 2 lectures on formal verification of security protocols in the course ``Méthodes de vérification de sécurité'' of the ``Master Sécurité des Systèmes Informatiques'' (University Paris XII). Total amount: 6 h.</p>
      <p>Steve Kremer gave exercise sessions on complexity, a module in the first term of the magistère STIC, ENS Cachan. Total volume: 10 h.</p>
    </subsection>
    <subsection level="1" id="uid71">
      <bodyTitle>Scientific and Administrative Charges</bodyTitle>
      <p>Hubert Comon-Lundh is chairing the Computer Science Teaching Department at ENS Cachan.</p>
      <p>Stéphane Demri served as an expert for the white program 2005 for the ANR and as an expert for the French Ministry of Research for the French-Australian Program FAST 2005.</p>
      <p>Stéphane Demri is supplementary member of the commission de spécialistes, Number 6 of ENS de Cachan, Section 27.</p>
      <p>Jean Goubault-Larrecq is member of the scientific committee of the Action Concertée Incitative (ACI) ``Sécurité Informatique'', and is a member of the bureau.</p>
      <p>Jean Goubault-Larrecq is member of the scientific committee of the Action de Recherche Amont (ARA) programme of the GIP ANR (Agence Nationale de la Recherche) on security, embedded systems, and ambiant intelligence (SSIA).</p>
      <p>Jean Goubault-Larrecq is member of the scientific committee of the Programme Blanc of the GIP ANR (Agence Nationale de la Recherche).</p>
      <p>Florent Jacquemard is member of the board (general secretary) of the French Association for Information and Communication Systems (ASTI).</p>
      <p>Florent Jacquemard is member of the board (treasurer) of the French Association for Theoretical Computer Science, French chapter of the European for Theoretical Computer Science (EATCS).</p>
      <p>Florent Jacquemard is supplementary member of the commission de spécialistes, Number 6 of ENS de Cachan, Section 27.</p>
      <p>Ralf Treinen is member of the commission de spécialistes of University Lille 1, Section 27 (Computer Science), and of the commission de spécialistes of ENS de Cachan, Number 6 (Computer Science).</p>
    </subsection>
    <subsection level="1" id="uid72">
      <bodyTitle>Supervision, Advisorship</bodyTitle>
      <p>Hubert Comon-Lundh is supervising two PhD theses:</p>
      <simplelist>
        <li id="uid73">
          <p>Vincent Bernat, fourth-year PhD student, working on the automatic verification of cryptographic protocols, more specifically on proof normalization and decidability results for a bounded number of sessions.</p>
        </li>
        <li id="uid74">
          <p>Stéphanie Delaune (co-supervised by Florent Jacquemard), third-year PhD student, working on the automatic verification of cryptographic protocols, more specifically on weakening the perfect cryptography assumption. This work is also supervised by Francis Klay (France Télécom R&amp;D).
          This is part of the PROUVÉ project, and is a supported by a CIFRE grant with France Télécom.</p>
        </li>
      </simplelist>
      <p>Stéphane Demri supervised Régis Gascon, second-year PhD student, working on the verification of qualitative and quantitative properties.</p>
      <p>Jean Goubault-Larrecq supervised the following students:</p>
      <simplelist>
        <li id="uid75">
          <p>Yu Zhang (together with David Nowak). Thesis defended, Oct. 21, 2005. Today postdoc at CEA. Title: ``Vérification des protocoles cryptographiques Ã l'aide de relations logiques'' (verification of cryptographic protocols using logical relations.)</p>
        </li>
        <li id="uid76">
          <p>Mathieu Baudet, third-year PhD student, working on cryptographic protocol verification, in particular off-line and on-line guessing attacks, and relationships between formal proofs and computational proofs of security.</p>
        </li>
        <li id="uid77">
          <p>Benjamin Ratti, second-year PhD student, working on extensions of tree automata to second-order situations, with applications to opacity properties in cryptographic protocols.</p>
        </li>
        <li id="uid78">
          <p>Elie Bursztein, first-year PhD student, working on intrusion detection: modeling network flows, explaining attacks, predicting attacks.</p>
        </li>
      </simplelist>
      <p>Ralf Treinen and Denis Lugiez (Marseilles) supervised since October 1, 2003, Pascal Lafourcade, a now third-year PhD student. The subject of his thesis is the verification of cryptographic protocols in an extension of the Dolev-Yao intruder model by algebraic properties of cryptographic
      primitives. His thesis is funded by a grant from the ACI Rossignol.</p>
    </subsection>
    <subsection level="1" id="uid79">
      <bodyTitle>Participation to PhD or habilitation juries</bodyTitle>
      <p>Hubert Comon-Lundh participated in 4 habilitation juries (including 2 as a reviewer): Irène Durand, U. Bordeaux, July 2005 (reviewer), Ralf Treinen, U. Paris 11, November 2005, David Janin, U. Bordeaux, December 2005, Jean-Marc Talbot, Lille, December 2005 (reviewer).</p>
      <p>Stéphane Demri was examinator of Denis Debarbieux's PhD thesis, Université des Sciences et Technologies de Lille.</p>
      <p>Jean Goubault-Larrecq was reviewer (rapporteur) of Benjamin Leperchey's PhD thesis in Paris (U. Paris 7), France, Dec. 9, 2005. He was examiner at JérÃ´me Féret's PhD thesis at Ecole Polytechnique, Palaiseau, France, Feb. 25, 2005, and at Olivier Hermant's PhD thesis at Ecole
      Polytechnique, Palaiseau, France, Dec. 6, 2005.</p>
    </subsection>
    <subsection level="1" id="uid80">
      <bodyTitle>Participation to conference program committees or journal editorial boards</bodyTitle>
      <p>Hubert Comon-Lundh was in the program committee of LICS 2005 (IEEE Symp. on Logic in Comp. Science, Chicago, June 2005) and CSFW 2005 (IEEE Computer Security Foundations Workshop, Aix-en Provence, June 2005).</p>
      <p>Stéphane Demri was a member of the program committee of the ``4nd Workshop on Methods for Modalities'', december 2005, Berlin</p>
      <p>Stéphane Demri was a member of the organizing committee of the Workshop on ``Perspectives in Verification'', november 2005, Cachan</p>
      <p>Jean Goubault-Larrecq is vice-president of the steering committee of the automated theorem proving with tableaux and related methods conference, from September 2003, for three years.</p>
      <p>Jean Goubault-Larrecq is member of the program committee of the 14th International Conference on Automated Theorem Proving with Analytic Tableaux and Related Methods (Tableaux), September 2005, Koblenz, Germany.</p>
      <p>Jean Goubault-Larrecq is vice-president of the steering committee of the automated theorem proving with tableaux and related methods conference, from September 2003, for three years.</p>
      <p>Florent Jacquemard was a member of the program commitee of the Colloquium ASTI 2005, october 2005, Clermont-Ferrand.</p>
      <p>Steve Kremer has been member of the program committee of the 4th International Workshop for Applied PKI (IWAP'05).</p>
      <p>Steve Kremer has been a co-organizer of the 1st Workshop on the Link between Formal and Computational Models.</p>
      <p>Ralf Treinen is member of the steering committee of the International Conference on Rewriting Techniques and Application (RTA), where he is publicity chair of RTA.</p>
      <p>Ralf Treinen was member of the program committee of the 11th International Conference on Logic for Programming Artificial Intelligence and Reasoning (LPAR), March 14-18, 2005, Montevideo, Uruguay.</p>
      <p>Ralf Treinen was member of the scientific committee of the Spring School on Security, Marseilles, France, April 25–29, 2005.</p>
      <p>Ralf Treinen is organizing, together with Xavier Urbain (CNAM), Antonio Bucciarelli, Vincent Padovani, and Juliusz Chroboczek (PPS, University Paris-7), the Federated Conference on Rewriting, Deduction and Programming (RDP'07). The conference is planned for the last week of June 2007 and
      will be held in Paris. RDP comprises the International Conference on Rewriting Techniques and Applications (RTA) and the International Conference on Typed Lambda Calculi and Applications (TLCA).</p>
    </subsection>
    <subsection level="1" id="uid81">
      <bodyTitle>Participation to symposia, seminars, invitations</bodyTitle>
      <p>Mathieu Baudet attented the 18th IEEE Computer Security Foundations Workshop (CSFW'05) in Aix-en-Provence, France, on June 20.–22.</p>
      <p>Mathieu Baudet gave a talk at the Workshop on the Link between Formal and Computational Models (Paris, June 23.–24) on ``Computationally Sound Implementations of Equational Theories against Passive Adversaries''.</p>
      <p>Mathieu Baudet gave a talk at the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05) in Lisboa, Portugal, July 11.–15 on the same topic (accepted paper 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid56" location="biblio" xyref="2159452058011"/>).</p>
      <p>Mathieu Baudet gave a talk at the 12th ACM Conference on Computer and Communications Security (CCS'05) in Alexandria, VA, USA, November 7.–11. on ``Deciding Security of Cryptographic Protocols against Off-line Guessing Attacks'' (accepted paper 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid43" location="biblio" xyref="2159452058011"/>).</p>
      <p>Mathieu Baudet was invited to work with Pr. Martín Abadi at the University of California at Santa Cruz from April 10. to June 10.</p>
      <p>Hubert Comon-Lundh was invited speaker at the GAMES workshop (Paris, september 2005).</p>
      <p>Hubert Comon-Lundh gave a series of lectures on cryptographic protocols verification at the CIMPA school (Bangalore, February 2005).</p>
      <p>Hubert-Comon Lundh participated in the Dagstuhl seminar on Automated Deduction (Dagstuhl, October 2005).</p>
      <p>Stéphanie Delaune gave a talk at RTA'05 at Nara, in Japan, in April 2005 (accepted paper 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid31" location="biblio" xyref="2159452058011"/>). She also presented this work in the poster session of the Spring School Secu'05 in Luminy, France, in April
      2005.</p>
      <p>Stéphanie Delaune participated in the workshop on the Link between Formal and Computational Models, in Paris, France, June 2005.</p>
      <p>Stéphanie Delaune spent one week at the University of Clarkson at Postdam, USA, in August 2005. During her stay she worked with Christopher Lynch and she gave a talk about Verification of Cryptographic Protocols in Presence of Algebraic Properties.</p>
      <p>Stéphanie Delaune spent one week at the University of Birmingham in October 2005. She has been working with Mark Ryan and Steve Kremer on electronic voting protocols (accepted paper 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid57" location="biblio" xyref="2159452058011"/>).</p>
      <p>Stéphane Demri was invited to talk at the seminar of LIAFA (Paris), May 2005, on "On the freeze quantifier in constraint LTL".</p>
      <p>Stéphane Demri was invited to talk at the Workshop on Logical and Algebraic Foundations of Rough Sets (Regina, Canada, September 2005) on "On the complexity of information logics".</p>
      <p>Jean Goubault-Larrecq gave a talk on ``Musings Around the Geometry of Interaction, and Coherence'', at the ACI NIM Geocal meeting of June 20-21, 2005, U. Paris 7, Paris, France.</p>
      <p>Jean Goubault-Larrecq was invited to give a talk on models and methods for verifying cryptographic protocols at the first Workshop on Classical and Quantum Information Theory, CalTech, San Diego, Dec. 15-18, 2005.</p>
      <p>Steve Kremer gave a talk ``Formal Analysis of Optimistic Fair Exchnage Protocols'' at the seminar of LACL, University Paris XII, January 2005.</p>
      <p>Steve Kremer gave a talk `` Analysis of an Electronic Voting Protocol in the Applied Pi-Calculus'' at the seminar of the computer science department of the Brussels Free University, Belgium, January 2005.</p>
      <p>Steve Kremer attended the 9th International Conference on Financial Cryptography and Data Security (FC'05), Roseau, The Commonwealth Of Dominica, March 2005 (accepted paper, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid58" location="biblio" xyref="2159452058011"/>).</p>
      <p>Steve Kremer gave a talk ``Beyond secrecy and authentication ...'' at the NATO Advanced Research Workshop Verification of Inifinite-State Systems with Applications to Security (VISSAS 2005), Timisaora, Romania, March 2005 (round table discussion : ``Verification of security protocols:
      state-of-the-art, open problems, future'').</p>
      <p>Steve Kremer gave a talk `` Analysis of an Electronic Voting Protocol in the Applied Pi-Calculus'' at the 14th European Symposium on Programming (ESOP'05), Edinburgh, U.K., April 2005 (accepted paper, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid59" location="biblio" xyref="2159452058011"/>).</p>
      <p>Steve Kremer attended the 18th IEEE Computer Security Foundations Workshop (CSFW 2005), Aix-en-Provence, France, June 2005.</p>
      <p>Steve Kremer attended the the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), Lisboa, Portugal, July 2005 (accepted paper, 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="#bid56" location="biblio" xyref="2159452058011"/>).</p>
      <p>Steve Kremer spent 1 month at the University of Birmingham (october 2005). He has been working with Mark Ryan on the analysis of electronic voting protocols.</p>
      <p>Steve Kremer gave a talk ``The ORCHIDS Intrusion detection systems'' at the workshop ``Sécurité@INRIA'', Grenoble, France, December 2005.</p>
      <p>Pascal Lafourcade participated in the SPRING SCHOOL ON SECURITY, Marseille, France, April 2005</p>
      <p>Ralf Treinen gave January 27, 2005 at IRISA, Rennes, a talk about the PROUVÉ project.</p>
    </subsection>
    <subsection level="1" id="uid82">
      <bodyTitle>Miscellaneous</bodyTitle>
      <p>Hubert Comon-Lundh was in the competition entrance jury of ENS (Paris/Lyon/Cachan), 2005.</p>
      <p>Pascal Lafourcade was in the organization of the RED in Cachan, 23-25 may 2005 (Rencontres Emplois Doctorant).</p>
      <p>Ralf Treinen obtained November 17, 2005, the habilitation (
      <i>habilitation à diriger des recherches</i>) from university Paris-11. His habilitation thesis, entitled 
      <i>Symbolic Constraint Solving</i>, was presented to a jury consisting of Serge Abiteboul, Hubert Comon, Jean-Pierre Jouannaud (president), Anca Muscholl, Michaël Rusinowitch (referee), and Wolfgang Thomas (referee); as well as to Hassan Aït Kaci (referee, not member of the jury).</p>
      <p>Ralf Treinen maintains, together with Nachum Dershowitz (Tel Aviv University, Israel), the list of open problems of the conference series Rewriting Techniques and Applications (RTA). The list contains currently 104 problems, 31 of which are solved. The list is online at the address 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/rtaloop/" location="extern" xyref="1488221902002">http://www.lsv.ens-cachan.fr/rtaloop/</ref>.</p>
      <p>Ralf Treinen moderates the mailing list Constraints in Computational Logics, which was created in the Esprit working group of the same name, and which continues to operate after the end of the working group. The mailing list currently has 108 subscribers in the field of computational
      logics and mainly carries announcements of interest to the community. Further information about the mailing list, including an archive of past messages, is available at 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/ccl/" location="extern" xyref="3800823732012">http://www.lsv.ens-cachan.fr/ccl/</ref>.</p>
      <p>Ralf Treinen maintains the home page of the International Workshop on Unification (UNIF), which provides detailed information about the past events in UNIF's 19-years history. The UNIF home page is available at 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/unif/" location="extern" xyref="1101103491030">http://www.lsv.ens-cachan.fr/unif/</ref>.</p>
      <p>Yu ZHANG maintains the home page of International Workshop on Formal Methods and Security (IWFMS), which is available at 
      <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/~zhang/workshop/" location="extern" xyref="2020327257029">http://www.lsv.ens-cachan.fr/~zhang/workshop/</ref>.</p>
    </subsection>
  </diffusion>
  <biblio id="bibliography" html="bibliography" numero="10" titre="Bibliography">
    <biblStruct titlekey="4220" rend="year" n="cite:treinen-hab2005" type="phdthesis" id="bid77">
      <monogr>
        <title level="m">Résolution symbolique de contraintes</title>
        <author>
          <persName key="secsi-2005-id18146">
            <foreName>Ralf</foreName>
            <surname>Treinen</surname>
            <initial>R.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="typdoc">Mémoire d'habilitation</note>
        <imprint>
          <publisher>
            <orgName type="school">Université Paris-Sud 11, Orsay, France</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/RT-habil.pdf" location="extern" xyref="882331235005">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/RT-habil.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4097" rend="year" n="cite:THESE-zhang05" type="phdthesis" id="bid79">
      <monogr>
        <title level="m">Cryptographic Logical Relations — What is the contextual equivalence for cryptographic protocols and how to prove it?</title>
        <author>
          <persName key="secsi-2005-id18301">
            <foreName>Yu</foreName>
            <surname>Zhang</surname>
            <initial>Y.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="typdoc">Thèse de doctorat</note>
        <imprint>
          <publisher>
            <orgName type="school">Laboratoire Spécification et Vérification, ENS Cachan, France</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/zy-thesis.pdf" location="extern" xyref="3791312312029">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/zy-thesis.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0937" rend="year" n="cite:Baudet05jalc" type="article" subtype="nonparu" id="bid62">
      <analytic>
        <title level="a">Random Polynomial-Time Attacks and Dolev-Yao Models</title>
        <author>
          <persName key="secsi-2005-id18206">
            <foreName>Mathieu</foreName>
            <surname>Baudet</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01144">
        <idno type="issn">1430-189X</idno>
        <title level="j">Journal of Automata, Languages and Combinatorics</title>
        <note anchored="yes" place="unspecified" type="bnote">To appear</note>
        <imprint>
          <dateStruct>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bau05-jalc.pdf" location="extern" xyref="3883555855001">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Bau05-jalc.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="1091" rend="year" n="cite:EB-phrack-TCP" type="article" id="bid63">
      <analytic>
        <title level="a">TCP Timestamp to count hosts behind NAT</title>
        <author>
          <persName key="secsi-2005-id18234">
            <foreName>Élie</foreName>
            <surname>Bursztein</surname>
            <initial>É.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01668">
        <idno type="issn">1068-1035</idno>
        <title level="j">Phrack Magazine</title>
        <imprint>
          <biblScope type="volume">63</biblScope>
          <biblScope type="number">3</biblScope>
          <dateStruct>
            <month>August</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">linenoise 0x03-2</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.phrack.org/phrack/63/p63-0x03_Linenoise.txt" location="extern" xyref="2083607944001">http://www.phrack.org/phrack/63/p63-0x03_Linenoise.txt</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0645" rend="year" n="cite:CardinalKremerLangerman2005" type="article" subtype="nonparu" id="bid74">
      <analytic>
        <title level="a">Juggling with Pattern Matching</title>
        <author>
          <persName>
            <foreName>Jean</foreName>
            <surname>Cardinal</surname>
            <initial>J.</initial>
          </persName>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Stefan</foreName>
            <surname>Langerman</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01955">
        <idno type="issn">1432-4350</idno>
        <title level="j">Theory of Computing Systems</title>
        <note anchored="yes" place="unspecified" type="bnote">To appear</note>
        <imprint>
          <dateStruct>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jwpm-journal.pdf" location="extern" xyref="3285808999017">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jwpm-journal.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0525" rend="year" n="cite:CKS-jar2005" type="article" subtype="nonparu" id="bid75">
      <analytic>
        <title level="a">Formal Analysis of Multi-Party Contract Signing</title>
        <author>
          <persName>
            <foreName>Rohit</foreName>
            <surname>Chadha</surname>
            <initial>R.</initial>
          </persName>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Andre</foreName>
            <surname>Scedrov</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01145">
        <idno type="issn">0168-7433</idno>
        <title level="j">Journal of Automated Reasoning</title>
        <note anchored="yes" place="unspecified" type="bnote">To appear</note>
        <imprint>
          <dateStruct>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/mpcs-CKS.pdf" location="extern" xyref="3149968639026">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/mpcs-CKS.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="1168" rend="year" n="cite:ComonCortier-TCS1" type="article" id="bid64">
      <analytic>
        <title level="a">Tree Automata with One Memory, Set Constraints and Cryptographic Protocols</title>
        <author>
          <persName key="secsi-2005-id18187">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01946">
        <idno type="issn">0304-3975</idno>
        <title level="j">Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">331</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <month>February</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">143-214</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortierTCS1.ps" location="extern" xyref="2429336255004">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortierTCS1.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0350" rend="year" n="cite:comon00tcs" type="article" subtype="nonparu" id="bid65">
      <analytic>
        <title level="a">Counter Automata, Fixed Points and Additive Theories</title>
        <author>
          <persName key="secsi-2005-id18187">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Yan</foreName>
            <surname>Jurski</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01946">
        <idno type="issn">0304-3975</idno>
        <title level="j">Theoretical Computer Science</title>
        <note anchored="yes" place="unspecified" type="bnote">To appear</note>
        <imprint>
          <dateStruct>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CJ-tcs.ps" location="extern" xyref="1465058823024">http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/CJ-tcs.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0207" rend="year" n="cite:CDL05-survey" type="article" subtype="nonparu" id="bid55">
      <analytic>
        <title level="a">A Survey of Algebraic Properties used in Cryptographic Protocols</title>
        <author>
          <persName>
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2005-id18250">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2005-id18270">
            <foreName>Pascal</foreName>
            <surname>Lafourcade</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01194">
        <idno type="issn">0926-227X</idno>
        <title level="j">Journal of Computer Security</title>
        <note anchored="yes" place="unspecified" type="bnote">To appear</note>
        <imprint>
          <dateStruct>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/surveyCDL.pdf" location="extern" xyref="2863452122021">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/surveyCDL.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0428" rend="year" n="cite:SD-ipl05" type="article" subtype="nonparu" id="bid35">
      <analytic>
        <title level="a">Easy Intruder Deduction Problems with Homomorphisms</title>
        <author>
          <persName key="secsi-2005-id18250">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00898">
        <idno type="issn">0020-0190</idno>
        <title level="j">Information Processing Letters</title>
        <note anchored="yes" place="unspecified" type="bnote">To appear</note>
        <imprint>
          <dateStruct>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/SD-ipl05.pdf" location="extern" xyref="1622061166015">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/SD-ipl05.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0371" rend="year" n="cite:dj-jar05" type="article" subtype="nonparu" id="bid42">
      <analytic>
        <title level="a">Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks</title>
        <author>
          <persName key="secsi-2005-id18250">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2005-id18098">
            <foreName>Florent</foreName>
            <surname>Jacquemard</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01145">
        <idno type="issn">0168-7433</idno>
        <title level="j">Journal of Automated Reasoning</title>
        <note anchored="yes" place="unspecified" type="bnote">To appear</note>
        <imprint>
          <dateStruct>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-jar05.ps" location="extern" xyref="135406386018">http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-jar05.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0370" rend="year" n="cite:ddn-jlli05" type="article" id="bid67">
      <analytic>
        <title level="a">Deciding Regular Grammar Logics with Converse through First-Order Logic</title>
        <author>
          <persName key="secsi-2005-id18167">
            <foreName>Stéphane</foreName>
            <surname>Demri</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Hans</foreName>
            <surname>de Nivelle</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01274">
        <idno type="issn">0925-8531</idno>
        <title level="j">Journal of Logic, Language and Information</title>
        <imprint>
          <biblScope type="volume">14</biblScope>
          <biblScope type="number">3</biblScope>
          <dateStruct>
            <month>June</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">289-319</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ddn-gf-issue.pdf" location="extern" xyref="3249465035009">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ddn-gf-issue.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0181" rend="year" n="cite:demri-JLC05" type="article" id="bid66">
      <analytic>
        <title level="a">A reduction from DLP to PDL</title>
        <author>
          <persName key="secsi-2005-id18167">
            <foreName>Stéphane</foreName>
            <surname>Demri</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01273">
        <idno type="issn">0955-792X</idno>
        <title level="j">Journal of Logic and Computation</title>
        <imprint>
          <biblScope type="volume">15</biblScope>
          <biblScope type="number">5</biblScope>
          <dateStruct>
            <month>October</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">767-785</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/demri-jlc05.pdf" location="extern" xyref="3648008010007">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/demri-jlc05.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0369" rend="year" n="cite:JGL-ipl2005" type="article" id="bid29">
      <analytic>
        <title level="a">Deciding 
        <span class="math" align="left"><hi rend="it">H</hi><sub>1</sub></span>by Resolution</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00898">
        <idno type="issn">0020-0190</idno>
        <title level="j">Information Processing Letters</title>
        <imprint>
          <biblScope type="volume">95</biblScope>
          <biblScope type="number">3</biblScope>
          <dateStruct>
            <month>August</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">401-408</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Goubault-h1.pdf" location="extern" xyref="3328409729003">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Goubault-h1.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0487" rend="year" n="cite:JGL:val:ext" type="article" id="bid50">
      <analytic>
        <title level="a">Extensions of Valuations</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01486">
        <idno type="issn">0960-1295</idno>
        <title level="j">Mathematical Structures in Computer Science</title>
        <imprint>
          <biblScope type="volume">15</biblScope>
          <biblScope type="number">2</biblScope>
          <dateStruct>
            <month>April</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">271-297</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-17.rr.ps" location="extern" xyref="4252358081002">
          http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-17.rr.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0005" rend="year" n="cite:GLRV:acm" type="article" id="bid45">
      <analytic>
        <title level="a">Abstraction and Resolution Modulo AC: How to Verify Diffie-Hellman-like Protocols Automatically</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Muriel</foreName>
            <surname>Roger</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Kumar N.</foreName>
            <surname>Verma</surname>
            <initial>K. N.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01272">
        <idno type="issn">1567-8326</idno>
        <title level="j">Journal of Logic and Algebraic Programming</title>
        <imprint>
          <biblScope type="volume">64</biblScope>
          <biblScope type="number">2</biblScope>
          <dateStruct>
            <month>August</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">219-251</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLRV-acm.ps" location="extern" xyref="3476744976012">http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/GLRV-acm.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="0648" rend="year" n="cite:VGL-dmtcs05" type="article" id="bid44">
      <analytic>
        <title level="a">Karp-Miller Trees for a Branching Extension of VASS</title>
        <author>
          <persName>
            <foreName>Kumar N.</foreName>
            <surname>Verma</surname>
            <initial>K. N.</initial>
          </persName>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00528">
        <idno type="issn">1462-7264</idno>
        <title level="j">Discrete Mathematics &amp; Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">7</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <month>November</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">217-230</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VGL-dmtcs05.pdf" location="extern" xyref="1237900115025">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/VGL-dmtcs05.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="2255" rend="year" n="cite:baudet-ccs2005" type="inproceedings" id="bid43">
      <analytic>
        <title level="a">Deciding Security of Protocols against Off-line Guessing Attacks</title>
        <author>
          <persName key="secsi-2005-id18206">
            <foreName>Mathieu</foreName>
            <surname>Baudet</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), Alexandria, Virginia, USA</title>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">16-25</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="2163" rend="year" n="cite:BCK-ICALP2005" type="inproceedings" id="bid56">
      <analytic>
        <title level="a">Computationally Sound Implementations of Equational Theories against Passive Adversaries</title>
        <author>
          <persName key="secsi-2005-id18206">
            <foreName>Mathieu</foreName>
            <surname>Baudet</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Luís</foreName>
            <surname>Caires</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Giuseppe F.</foreName>
            <surname>Italiano</surname>
            <initial>G. F.</initial>
          </persName>
          <persName>
            <foreName>Luís</foreName>
            <surname>Monteiro</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Catuscia</foreName>
            <surname>Palamidessi</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Moti</foreName>
            <surname>Yung</surname>
            <initial>M.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), Lisboa, Portugal</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3580</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">652-663</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCK-icalp05.pdf" location="extern" xyref="1906953544013">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCK-icalp05.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="3540" rend="year" n="cite:ComDel-rta2005" type="inproceedings" id="bid31">
      <analytic>
        <title level="a">The finite variant property: How to get rid of some algebraic properties</title>
        <author>
          <persName key="secsi-2005-id18187">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName key="secsi-2005-id18250">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Jürgen</foreName>
            <surname>Giesl</surname>
            <initial>J.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), Nara, Japan</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3467</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>April</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">294-307</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/rta05-CD.pdf" location="extern" xyref="2689976466019">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/rta05-CD.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="3261" rend="year" n="cite:DKR-FEE2005" type="inproceedings" id="bid57">
      <analytic>
        <title level="a">Receipt-Freeness: Formal Definition and Fault Attacks (Extended Abstract)</title>
        <author>
          <persName key="secsi-2005-id18250">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Mark D.</foreName>
            <surname>Ryan</surname>
            <initial>M. D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the Workshop Frontiers in Electronic Elections (FEE 2005), Milan, Italy</title>
        <imprint>
          <dateStruct>
            <month>September</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-fee05.pdf" location="extern" xyref="2599029372030">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-fee05.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="3737" rend="year" n="cite:DG-concur2005" type="inproceedings" id="bid68">
      <analytic>
        <title level="a">Verification of Qualitative Z-Constraints</title>
        <author>
          <persName key="secsi-2005-id18167">
            <foreName>Stéphane</foreName>
            <surname>Demri</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Régis</foreName>
            <surname>Gascon</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Martín</foreName>
            <surname>Abadi</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Luca</foreName>
            <surname>de Alfaro</surname>
            <initial>L.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 16th International Conference on Concurrency Theory (CONCUR'05), San Francisco, CA, USA</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3653</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">518-532</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-Concur05.pdf" location="extern" xyref="1915970776013">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DG-Concur05.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="3028" rend="year" n="cite:DLN-time05" type="inproceedings" id="bid69">
      <analytic>
        <title level="a">On the Freeze Quantifier in Constraint LTL: Decidability and Complexity</title>
        <author>
          <persName key="secsi-2005-id18167">
            <foreName>Stéphane</foreName>
            <surname>Demri</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Ranko</foreName>
            <surname>Lazić</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Nowak</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the 12th International Symposium on Temporal Representation and Reasoning (TIME'05), Burlington, Vermont, USA</title>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society Press</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">113-121</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-03.pdf" location="extern" xyref="3306514186004">
          http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-03.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="3257" rend="year" n="cite:DN-atva05" type="inproceedings" id="bid70">
      <analytic>
        <title level="a">Reasoning about transfinite sequences (extended abstract)</title>
        <author>
          <persName key="secsi-2005-id18167">
            <foreName>Stéphane</foreName>
            <surname>Demri</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Nowak</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Doron A.</foreName>
            <surname>Peled</surname>
            <initial>D. A.</initial>
          </persName>
          <persName>
            <foreName>Yih-Kuen</foreName>
            <surname>Tsay</surname>
            <initial>Y.-K.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 3rd International Symposium on Automated Technology for Verification and Analysis (ATVA'05), Taipei, Taiwan, ROC</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3707</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">248-262</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DN-atva2005.pdf" location="extern" xyref="2431019654027">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DN-atva2005.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="2238" rend="year" n="cite:GLP:VMCAI" type="inproceedings" id="bid26">
      <analytic>
        <title level="a">Cryptographic Protocol Analysis on Real C Code</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Fabrice</foreName>
            <surname>Parrennes</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Radhia</foreName>
            <surname>Cousot</surname>
            <initial>R.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), Paris, France</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3385</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>January</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">363-379</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GouPar-VMCAI2005.pdf" location="extern" xyref="3351106791004">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GouPar-VMCAI2005.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="1783" rend="year" n="cite:KremerMukhamedovRitter2005" type="inproceedings" subtype="nonparu" id="bid60">
      <analytic>
        <title level="a">Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model</title>
        <author>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Aybek</foreName>
            <surname>Mukhamedov</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Eike</foreName>
            <surname>Ritter</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the 9th International Conference on Financial Cryptography and Data Security (FC'05), Roseau, The Commonwealth Of Dominica</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <note anchored="yes" place="unspecified" type="bnote">To appear</note>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>February-March</month>
            <year>2005</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="1779" rend="year" n="cite:KremerRyan2004" type="inproceedings" id="bid73">
      <analytic>
        <title level="a">Analysing the Vulnerability of Protocols to produce known-pair and chosen-text attacks</title>
        <author>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Mark D.</foreName>
            <surname>Ryan</surname>
            <initial>M. D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Riccardo</foreName>
            <surname>Focardi</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Gianluigi</foreName>
            <surname>Zavattaro</surname>
            <initial>G.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, Languages and Systems (SecCo'04), London, UK</title>
        <title level="s">Electronic Notes in Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">128</biblScope>
          <biblScope type="number">5</biblScope>
          <publisher>
            <orgName>Elsevier Science Publishers</orgName>
          </publisher>
          <dateStruct>
            <month>May</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">84-107</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-secco04.pdf" location="extern" xyref="963068936027">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-secco04.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="1784" rend="year" n="cite:KremerRyan2005" type="inproceedings" id="bid59">
      <analytic>
        <title level="a">Analysis of an Electronic Voting Protocol in the Applied Pi-Calculus</title>
        <author>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Mark D.</foreName>
            <surname>Ryan</surname>
            <initial>M. D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Mooly</foreName>
            <surname>Sagiv</surname>
            <initial>M.</initial>
          </persName>
        </editor>
        <title level="m">Programming Languages and Systems — Proceedings of the 14th European Symposium on Programming (ESOP'05), Edinburgh, U.K.</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3444</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>April</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">186-200</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-esop05.pdf" location="extern" xyref="2599531269001">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Kremer-esop05.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="2713" rend="year" n="cite:LLT-rta2005" type="inproceedings" id="bid33">
      <analytic>
        <title level="a">Intruder Deduction for AC-like Equational Theories with Homomorphisms</title>
        <author>
          <persName key="secsi-2005-id18270">
            <foreName>Pascal</foreName>
            <surname>Lafourcade</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Denis</foreName>
            <surname>Lugiez</surname>
            <initial>D.</initial>
          </persName>
          <persName key="secsi-2005-id18146">
            <foreName>Ralf</foreName>
            <surname>Treinen</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Jürgen</foreName>
            <surname>Giesl</surname>
            <initial>J.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), Nara, Japan</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3467</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>April</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">308-322</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/rta05-LLT.pdf" location="extern" xyref="2763386054031">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/rta05-LLT.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="2994" rend="year" n="cite:LNZ-appsem05" type="inproceedings" id="bid78">
      <analytic>
        <title level="a">On completeness of logical relations for monadic types</title>
        <author>
          <persName>
            <foreName>Sławomir</foreName>
            <surname>Lasota</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Nowak</surname>
            <initial>D.</initial>
          </persName>
          <persName key="secsi-2005-id18301">
            <foreName>Yu</foreName>
            <surname>Zhang</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Martin</foreName>
            <surname>Hofmann</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Hans-Wolfgang</foreName>
            <surname>Loidl</surname>
            <initial>H.-W.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 3rd APPSEM II Workshop (APPSEM'05), Frauenchiemsee, Germany</title>
        <imprint>
          <dateStruct>
            <month>September</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LNZ-monad-complete.pdf" location="extern" xyref="1132026738015">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/LNZ-monad-complete.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="1783" rend="year" n="cite:MukhamedovKremerRitter2005" type="inproceedings" id="bid58">
      <analytic>
        <title level="a">Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model</title>
        <author>
          <persName>
            <foreName>Aybek</foreName>
            <surname>Mukhamedov</surname>
            <initial>A.</initial>
          </persName>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Eike</foreName>
            <surname>Ritter</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Andrew S.</foreName>
            <surname>Patrick</surname>
            <initial>A. S.</initial>
          </persName>
          <persName>
            <foreName>Moti</foreName>
            <surname>Yung</surname>
            <initial>M.</initial>
          </persName>
        </editor>
        <title level="m">Revised Papers from the 9th International Conference on Financial Cryptography and Data Security (FC'05), Roseau, The Commonwealth Of Dominica</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3570</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">255-269</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MKR-fcrypto05.pdf" location="extern" xyref="1052696677008">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/MKR-fcrypto05.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="3562" rend="year" n="cite:Orchids-cav05" type="inproceedings" id="bid27">
      <analytic>
        <title level="a">The Orchids Intrusion Detection Tool</title>
        <author>
          <persName key="secsi-2005-id18132">
            <foreName>Julien</foreName>
            <surname>Olivain</surname>
            <initial>J.</initial>
          </persName>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Kousha</foreName>
            <surname>Etessami</surname>
            <initial>K.</initial>
          </persName>
          <persName>
            <foreName>Sriram</foreName>
            <surname>Rajamani</surname>
            <initial>S.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05), Edinburgh, Scotland, UK</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3576</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">286-290</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/OG-cav05.pdf" location="extern" xyref="1456696246024">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/OG-cav05.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4442" rend="year" n="cite:cryptoeprint:2005:074" type="techreport" id="bid61">
      <monogr>
        <title level="m">Computationally Sound Implementations of Equational Theories Against Passive Adversaries</title>
        <author>
          <persName key="secsi-2005-id18206">
            <foreName>Mathieu</foreName>
            <surname>Baudet</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">28 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Research Report</note>
        <imprint>
          <biblScope type="number">2005/074</biblScope>
          <publisher>
            <orgName type="institution">Cryptology ePrint Archive</orgName>
          </publisher>
          <dateStruct>
            <month>March</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCK05-eprint.pdf" location="extern" xyref="1735171704023">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCK05-eprint.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4403" rend="year" n="cite:rr-LSV:05:11" type="techreport" id="bid71">
      <monogr>
        <title level="m">Automated Induction for Complex Data Structures</title>
        <author>
          <persName>
            <foreName>Adel</foreName>
            <surname>Bouhoula</surname>
            <initial>A.</initial>
          </persName>
          <persName key="secsi-2005-id18098">
            <foreName>Florent</foreName>
            <surname>Jacquemard</surname>
            <initial>F.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">24 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Research Report</note>
        <imprint>
          <biblScope type="number">LSV-05-11</biblScope>
          <publisher>
            <orgName type="institution">Laboratoire Spécification et Vérification, ENS Cachan, France</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-11.pdf" location="extern" xyref="2553441511001">
          http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-11.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4408" rend="year" n="cite:rr-LSV:05:17" type="techreport" id="bid48">
      <monogr>
        <title level="m">Automatic Verification of Sufficient Completeness for Specifications of Complex Data Structures</title>
        <author>
          <persName>
            <foreName>Adel</foreName>
            <surname>Bouhoula</surname>
            <initial>A.</initial>
          </persName>
          <persName key="secsi-2005-id18098">
            <foreName>Florent</foreName>
            <surname>Jacquemard</surname>
            <initial>F.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">14 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Research Report</note>
        <imprint>
          <biblScope type="number">LSV-05-17</biblScope>
          <publisher>
            <orgName type="institution">Laboratoire Spécification et Vérification, ENS Cachan, France</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-17.pdf" location="extern" xyref="2660846971001">
          http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-17.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4725" rend="year" n="cite:Prouve:rap5" type="techreport" id="bid53">
      <monogr>
        <title level="m">Retour d'expérience sur la validation du porte-monnaie électronique</title>
        <author>
          <persName>
            <foreName>Liana</foreName>
            <surname>Bozga</surname>
            <initial>L.</initial>
          </persName>
          <persName key="secsi-2005-id18250">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Francis</foreName>
            <surname>Klay</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Laurent</foreName>
            <surname>Vigneron</surname>
            <initial>L.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">29 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Technical Report</note>
        <imprint>
          <biblScope type="number">5</biblScope>
          <publisher>
            <orgName type="institution">projet RNTL PROUVÉ</orgName>
          </publisher>
          <dateStruct>
            <month>March</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap5.ps" location="extern" xyref="3409358784000">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/prouve-rap5.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4703" rend="year" n="cite:Prouve04fiche" type="techreport" id="bid76">
      <monogr>
        <title level="m">Projet RNTL PROUVÉ — Fiche d'étape 2004</title>
        <author>
          <persName>
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName>
            <foreName>Francis</foreName>
            <surname>Klay</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Yassine</foreName>
            <surname>Lakhnech</surname>
            <initial>Y.</initial>
          </persName>
          <persName>
            <foreName>Bertrand</foreName>
            <surname>Tavernier</surname>
            <initial>B.</initial>
          </persName>
          <persName key="secsi-2005-id18146">
            <foreName>Ralf</foreName>
            <surname>Treinen</surname>
            <initial>R.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">6 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Technical Report</note>
        <imprint>
          <publisher>
            <orgName type="institution">projet RNTL PROUVÉ</orgName>
          </publisher>
          <dateStruct>
            <month>March</month>
            <year>2005</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4748" rend="year" n="cite:Prouve:rap6" type="techreport" id="bid54">
      <monogr>
        <title level="m">Spécification du protocole de vote électronique</title>
        <author>
          <persName key="secsi-2005-id18250">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Francis</foreName>
            <surname>Klay</surname>
            <initial>F.</initial>
          </persName>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">19 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Technical Report</note>
        <imprint>
          <biblScope type="number">6</biblScope>
          <publisher>
            <orgName type="institution">projet RNTL PROUVÉ</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Prouve-rap6.pdf" location="extern" xyref="1379108896006">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Prouve-rap6.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4762" rend="year" n="cite:LSV:05:20" type="techreport" id="bid36">
      <monogr>
        <title level="m">Symbolic Protocol Analysis in Presence of a Homomorphism Operator and 
        <i>Exclusive Or</i></title>
        <author>
          <persName key="secsi-2005-id18250">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2005-id18270">
            <foreName>Pascal</foreName>
            <surname>Lafourcade</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Denis</foreName>
            <surname>Lugiez</surname>
            <initial>D.</initial>
          </persName>
          <persName key="secsi-2005-id18146">
            <foreName>Ralf</foreName>
            <surname>Treinen</surname>
            <initial>R.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">44 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Research Report</note>
        <imprint>
          <biblScope type="number">LSV-05-20</biblScope>
          <publisher>
            <orgName type="institution">Laboratoire Spécification et Vérification, ENS Cachan, France</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-20.pdf" location="extern" xyref="2223232411031">
          http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-20.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4598" rend="year" n="cite:GLLN-arXiv05" type="techreport" id="bid49">
      <monogr>
        <title level="m">Logical Relations for Monadic Types</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Sławomir</foreName>
            <surname>Lasota</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Nowak</surname>
            <initial>D.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">81 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Research Report</note>
        <imprint>
          <biblScope type="number">cs.LO/0511006</biblScope>
          <publisher>
            <orgName type="institution">Computing Research Repository</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://arxiv.org/abs/cs.LO/0511006" location="extern" xyref="2333859709031">http://arxiv.org/abs/cs.LO/0511006</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4801" rend="year" n="cite:JacquemardRusinowitchVigneron-RR5754" type="techreport" id="bid46">
      <monogr>
        <title level="m">Tree Automata with Equality Constraints Modulo Equational Theories</title>
        <author>
          <persName key="secsi-2005-id18098">
            <foreName>Florent</foreName>
            <surname>Jacquemard</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Michael</foreName>
            <surname>Rusinowitch</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Laurent</foreName>
            <surname>Vigneron</surname>
            <initial>L.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">27 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Technical report</note>
        <imprint>
          <biblScope type="number">RR-5754</biblScope>
          <publisher>
            <orgName type="institution">INRIA Futurs &amp; INRIA Lorraine</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://hal.inria.fr/inria-00000784" location="extern" xyref="3189101698011">http://hal.inria.fr/inria-00000784</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4801" rend="year" n="cite:rr-LSV:05:16" type="techreport" id="bid72">
      <monogr>
        <title level="m">Tree automata with equality constraints modulo equational theories</title>
        <author>
          <persName key="secsi-2005-id18098">
            <foreName>Florent</foreName>
            <surname>Jacquemard</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Michael</foreName>
            <surname>Rusinowitch</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Laurent</foreName>
            <surname>Vigneron</surname>
            <initial>L.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">34 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Research Report</note>
        <imprint>
          <biblScope type="number">LSV-05-16</biblScope>
          <publisher>
            <orgName type="institution">Laboratoire Spécification et Vérification, ENS Cachan, France</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-16.pdf" location="extern" xyref="1676331436017">
          http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-16.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4783" rend="year" n="cite:Prouve:rap7" type="techreport" id="bid51">
      <monogr>
        <title level="m">The P
        <span align="left" class="smallcap">rouvé</span>Manual: Specifications, Semantics, and Logics</title>
        <author>
          <persName key="secsi-2005-id18118">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Yassine</foreName>
            <surname>Lakhnech</surname>
            <initial>Y.</initial>
          </persName>
          <persName key="secsi-2005-id18146">
            <foreName>Ralf</foreName>
            <surname>Treinen</surname>
            <initial>R.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">49 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Technical Report</note>
        <imprint>
          <biblScope type="number">7</biblScope>
          <publisher>
            <orgName type="institution">projet RNTL PROUVÉ</orgName>
          </publisher>
          <dateStruct>
            <month>December</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Prouve-rap7.pdf" location="extern" xyref="2940210423022">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Prouve-rap7.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4576" rend="year" n="cite:LSV:05:21" type="techreport" id="bid34">
      <monogr>
        <title level="m">Intruder Deduction for the Equational Theory of 
        <i>Exclusive-or</i>with Commutative and Distributive Encryption</title>
        <author>
          <persName key="secsi-2005-id18270">
            <foreName>Pascal</foreName>
            <surname>Lafourcade</surname>
            <initial>P.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">20 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Research Report</note>
        <imprint>
          <biblScope type="number">LSV-05-21</biblScope>
          <publisher>
            <orgName type="institution">Laboratoire Spécification et Vérification, ENS Cachan, France</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-21.pdf" location="extern" xyref="2045792588015">
          http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-21.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct titlekey="4577" rend="year" n="cite:LSV:05:19" type="techreport" id="bid32">
      <monogr>
        <title level="m">Intruder Deduction for the Equational Theory of Exclusive-or with Distributive Encryption</title>
        <author>
          <persName key="secsi-2005-id18270">
            <foreName>Pascal</foreName>
            <surname>Lafourcade</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Denis</foreName>
            <surname>Lugiez</surname>
            <initial>D.</initial>
          </persName>
          <persName key="secsi-2005-id18146">
            <foreName>Ralf</foreName>
            <surname>Treinen</surname>
            <initial>R.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">39 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Research Report</note>
        <imprint>
          <biblScope type="number">LSV-05-19</biblScope>
          <publisher>
            <orgName type="institution">Laboratoire Spécification et Vérification, ENS Cachan, France</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2005</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-19.pdf" location="extern" xyref="1843993178000">
          http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2005-19.pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:Abadi_Warinschi_ICALP2005_password_encryption" type="inproceedings" id="bid41">
      <analytic>
        <title level="a">Password-Based Encryption Analyzed</title>
        <author>
          <persName>
            <foreName>Martín</foreName>
            <surname>Abadi</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Bogdan</foreName>
            <surname>Warinschi</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP'05)</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3580</biblScope>
          <dateStruct>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">664–676</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:AmadioCharatonik:Concur2002" type="incollection" id="bid15">
      <analytic>
        <title level="a">On Name Generation and Set-Based Analysis in the Dolev-Yao Model</title>
        <author>
          <persName>
            <foreName>Roberto</foreName>
            <surname>Amadio</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Witold</foreName>
            <surname>Charatonik</surname>
            <initial>W.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">CONCUR'02</title>
        <imprint>
          <publisher>
            <orgName>Springer-Verlag LNCS 2421</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2002</year>
          </dateStruct>
          <biblScope type="pages">499-514</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:Blanchet:prolog" type="incollection" id="bid10">
      <analytic>
        <title level="a">An Efficient Cryptographic Protocol Verifier Based on Prolog Rules</title>
        <author>
          <persName>
            <foreName>Bruno</foreName>
            <surname>Blanchet</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton, Nouvelle-Écosse, Canada</title>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society Press</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2001</year>
          </dateStruct>
          <biblScope type="pages">82–96</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:Prouve:rap1" type="techreport" id="bid52">
      <monogr>
        <title level="m">Spécification du protocole de porte-monnaie électronique</title>
        <author>
          <persName>
            <foreName>Liana</foreName>
            <surname>Bozga</surname>
            <initial>L.</initial>
          </persName>
          <persName key="secsi-2005-id18250">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Francis</foreName>
            <surname>Klay</surname>
            <initial>F.</initial>
          </persName>
          <persName key="secsi-2005-id18146">
            <foreName>Ralf</foreName>
            <surname>Treinen</surname>
            <initial>R.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">12 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Technical report</note>
        <imprint>
          <biblScope type="number">1</biblScope>
          <publisher>
            <orgName type="institution">projet RNTL PROUVÉ</orgName>
          </publisher>
          <dateStruct>
            <month>jun</month>
            <year>2004</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:Cohen_FCS02_proving_protocol_safe_from_guessing" type="inproceedings" id="bid38">
      <analytic>
        <title level="a">Proving Protocols Safe from Guessing</title>
        <author>
          <persName>
            <foreName>Ernie</foreName>
            <surname>Cohen</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. Foundations of Computer Security (FCS'02)</title>
        <imprint>
          <dateStruct>
            <year>2002</year>
          </dateStruct>
          <biblScope type="pages">85–92</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:comon04fossacs" type="inproceedings" id="bid30">
      <analytic>
        <title level="a">Intruder Theories (Ongoing Work)</title>
        <author>
          <persName key="secsi-2005-id18187">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 7th Int. Conf. Foundations of Software Science and Computation Structures (FOSSACS 2004), Barcelona, Spain, Apr. 2004</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">2987</biblScope>
          <publisher>
            <orgName>Springer Verlag</orgName>
          </publisher>
          <dateStruct>
            <year>2004</year>
          </dateStruct>
          <biblScope type="pages">1–4</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:CCM01" type="incollection" id="bid14">
      <analytic>
        <title level="a">Tree Automata with One Memory, Set Constraints and Ping-Pong Protocols</title>
        <author>
          <persName key="secsi-2005-id18187">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName>
            <foreName>John</foreName>
            <surname>Mitchell</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 28th International Conference on Automata, Languages and Programming (ICALP)</title>
        <imprint>
          <publisher>
            <orgName>Springer-Verlag LNCS 2076</orgName>
          </publisher>
          <dateStruct>
            <year>2001</year>
          </dateStruct>
          <biblScope type="pages">682–693</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:tata" type="misc" id="bid11">
      <monogr>
        <title level="m">Tree Automata Techniques and Applications</title>
        <author>
          <persName key="secsi-2005-id18187">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Max</foreName>
            <surname>Dauchet</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Remi</foreName>
            <surname>Gilleron</surname>
            <initial>R.</initial>
          </persName>
          <persName key="secsi-2005-id18098">
            <foreName>Florent</foreName>
            <surname>Jacquemard</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Denis</foreName>
            <surname>Lugiez</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Sophie</foreName>
            <surname>Tison</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Marc</foreName>
            <surname>Tommasi</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">release October, 1rst 2002</note>
        <imprint>
          <dateStruct>
            <year>1997</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.grappa.univ-lille3.fr/tata" location="extern" xyref="4085363346006">http://www.grappa.univ-lille3.fr/tata</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:CS:secure?" type="incollection" id="bid8">
      <analytic>
        <title level="a">Is it possible to decide whether a cryptographic protocol is secure or not ?</title>
        <author>
          <persName key="secsi-2005-id18187">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Vitaly</foreName>
            <surname>Shmatikov</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </editor>
        <title level="m">Journal of Telecommunications and Information Technology, Special Issue on Models and Methods for Cryptographic Protocol Verification</title>
        <imprint>
          <biblScope type="volume">4</biblScope>
          <publisher>
            <orgName>Instytut Łącsności (Institute of Telecommunications), Warsaw, Poland</orgName>
          </publisher>
          <dateStruct>
            <month>December</month>
            <year>2002</year>
          </dateStruct>
          <biblScope type="pages">3–13</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:ComTre-mann03" type="inproceedings" id="bid18">
      <analytic>
        <title level="a">Easy Intruder Deductions</title>
        <author>
          <persName key="secsi-2005-id18187">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName key="secsi-2005-id18146">
            <foreName>Ralf</foreName>
            <surname>Treinen</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. Int. Symp. Verification (Theory &amp; Practice). Celebrating Zohar Manna's 1000000 2 -th Birthday, Taormina, Italy</title>
        <imprint>
          <publisher>
            <orgName>Springer Verlag LNCS 2772</orgName>
          </publisher>
          <dateStruct>
            <month>June–July</month>
            <year>2003</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:Corin_Doumen_Etalle_WISP04_off_line_guessing_attacks" type="inproceedings" id="bid40">
      <analytic>
        <title level="a">Analysing Password Protocol Security Against Off-line Dictionary Attacks</title>
        <author>
          <persName>
            <foreName>Ricardo</foreName>
            <surname>Corin</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Jeroen</foreName>
            <surname>Doumen</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Sandro</foreName>
            <surname>Etalle</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP'04)</title>
        <title level="s">Electronic Notes in Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">121</biblScope>
          <dateStruct>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">47–63</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:DauchetCaronCoquide95" type="article" id="bid47">
      <analytic>
        <title level="a">Automata for Reduction Properties Solving</title>
        <author>
          <persName>
            <foreName>M.</foreName>
            <surname>Dauchet</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>A.-C.</foreName>
            <surname>Caron</surname>
            <initial>A.-C.</initial>
          </persName>
          <persName>
            <foreName>J.-L.</foreName>
            <surname>Coquidé</surname>
            <initial>J.-L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal of Symbolic Computation</title>
        <imprint>
          <biblScope type="volume">20</biblScope>
          <biblScope type="number">2</biblScope>
          <dateStruct>
            <year>1995</year>
          </dateStruct>
          <biblScope type="pages">215-233</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:dj-ccs-2004" type="inproceedings" subtype="nonparu" id="bid39">
      <analytic>
        <title level="a">A Decision Procedure for the Verification of Security Protocols with Explicit Destructors</title>
        <author>
          <persName key="secsi-2005-id18250">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2005-id18098">
            <foreName>Florent</foreName>
            <surname>Jacquemard</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 11th ACM Conf. on Computer and Communications Security (CCS 2004), Washington, DC, USA, Jan. 2004</title>
        <note anchored="yes" place="unspecified" type="bnote">To appear</note>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <year>2004</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-ccs-2004.ps" location="extern" xyref="1617351225026">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/DJ-ccs-2004.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:DolevYao:sec:pubkey" type="article" id="bid7">
      <analytic>
        <title level="a">On the Security of Pubic Key Protocols</title>
        <author>
          <persName>
            <foreName>Danny</foreName>
            <surname>Dolev</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Andrew C.</foreName>
            <surname>Yao</surname>
            <initial>A. C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">IEEE Transactions on Information Theory</title>
        <imprint>
          <biblScope type="volume">IT-29</biblScope>
          <biblScope type="number">2</biblScope>
          <dateStruct>
            <month>March</month>
            <year>1983</year>
          </dateStruct>
          <biblScope type="pages">198–208</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:Gay:bufovf" type="techreport" id="bid5">
      <monogr>
        <title level="m">Exploitation avancée de buffer overflows</title>
        <author>
          <persName>
            <foreName>Olivier</foreName>
            <surname>Gay</surname>
            <initial>O.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="typdoc">Technical report</note>
        <imprint>
          <publisher>
            <orgName type="institution">Security and Cryptography Laboratory (LASEC), École Polytechnique Fédérale de Lausanne</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2002</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:JGL:crypto:orPTA" type="incollection" id="bid13">
      <analytic>
        <title level="a">A Method for Automatic Cryptographic Protocol Verification (Extended Abstract)</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the Workshop on Formal Methods in Parallel Programming, Theory and Applications (FMPPTA'2000)</title>
        <title level="s">Lecture Notes in Computer Science LNCS 1800</title>
        <imprint>
          <publisher>
            <orgName>Springer Verlag</orgName>
          </publisher>
          <dateStruct>
            <year>2000</year>
          </dateStruct>
          <biblScope type="pages">977–984</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:LSV:02:18" type="techreport" id="bid21">
      <monogr>
        <title level="m">Un Algorithme pour l'Analyse de Logs</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">33 pages</note>
        <note anchored="yes" place="unspecified" type="typdoc">Research Report</note>
        <imprint>
          <biblScope type="number">LSV-02-18</biblScope>
          <publisher>
            <orgName type="institution">Lab. Specification and Verification, ENS de Cachan
            <address><address><addrLine>Cachan, France</addrLine></address></address></orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2002</year>
          </dateStruct>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-18.rr.ps" location="extern" xyref="2926282913011">
          http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PS/rr-lsv-2002-18.rr.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:JGL:SECI:pirates" type="inproceedings" id="bid16">
      <analytic>
        <title level="a">Vérification de protocoles cryptographiques : la logique à la rescousse !</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </editor>
        <title level="m">Actes du 1er workshop international sur la sécurité des communications sur Internet (SECI'02)</title>
        <imprint>
          <publisher>
            <orgName>INRIA, collection didactique</orgName>
          </publisher>
          <dateStruct>
            <year>2002</year>
          </dateStruct>
          <biblScope type="pages">119–152</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/~goubault/SECI-02/Final/JGL/jgl.ps" location="extern" xyref="96473991015">
          http://www.lsv.ens-cachan.fr/~goubault/SECI-02/Final/JGL/jgl.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:JGL:JFLA04" type="inproceedings" id="bid17">
      <analytic>
        <title level="a">Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve ?</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Actes 15emes journées francophones sur les langages applicatifs (JFLA 2004), Sainte-Marie-de-Ré, France, Jan 2004</title>
        <imprint>
          <publisher>
            <orgName>INRIA, collection didactique</orgName>
          </publisher>
          <dateStruct>
            <year>2004</year>
          </dateStruct>
          <biblScope type="pages">1–40</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/JGL-JFLA2004.ps" location="extern" xyref="3864340389027">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/JGL-JFLA2004.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:GLN02b" type="inproceedings" id="bid23">
      <analytic>
        <title level="a">Logical Relations for Monadic Types</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Slawomir</foreName>
            <surname>Lasota</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Nowak</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 16th Int. Workshop Computer Science Logic (CSL'2002), Edinburgh, Scotland</title>
        <imprint>
          <publisher>
            <orgName>Springer-Verlag LNCS 2471</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2002</year>
          </dateStruct>
          <biblScope type="pages">553–568</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:JGL:dico:3.1" type="misc" id="bid20">
      <monogr>
        <title level="m">Langages de Détection d'Attaques par Signatures</title>
        <author>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Jean-Philippe</foreName>
            <surname>Pouzol</surname>
            <initial>J.-P.</initial>
          </persName>
          <persName key="secsi-2005-id18167">
            <foreName>Stéphane</foreName>
            <surname>Demri</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Ludovic</foreName>
            <surname>Mé</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Patrice</foreName>
            <surname>Carle</surname>
            <initial>P.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">30 pages</note>
        <imprint>
          <dateStruct>
            <month>June</month>
            <year>2002</year>
          </dateStruct>
        </imprint>
      </monogr>
      <note anchored="yes" place="unspecified" type="howpublished">Sous-projet 3, livrable 1 du projet RNTL DICO. Version 1</note>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:Joux:NSL:ElGamal" type="misc" id="bid3">
      <monogr>
        <title level="m">Qu'est-ce que la sécurité d'un algorithme de chiffrement?</title>
        <author>
          <persName>
            <foreName>Antoine</foreName>
            <surname>Joux</surname>
            <initial>A.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">Talk at the DCSSI-LogiCal-SECSI meeting, Rocquencourt</note>
        <imprint>
          <dateStruct>
            <month>18 September</month>
            <year>2002</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:Lowe04guessing" type="article" id="bid37">
      <analytic>
        <title level="a">Analysing Protocols Subject to Guessing Attacks</title>
        <author>
          <persName>
            <foreName>Gavin</foreName>
            <surname>Lowe</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal of Computer Security</title>
        <imprint>
          <biblScope type="volume">12</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year>2004</year>
          </dateStruct>
          <biblScope type="pages">83–98</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:lowe96ipl" type="article" id="bid2">
      <analytic>
        <title level="a">An Attack on the Needham-Schroeder Public-Key Authentication Protocol</title>
        <author>
          <persName>
            <foreName>Gavin</foreName>
            <surname>Lowe</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Information Processing Letters</title>
        <imprint>
          <biblScope type="volume">56</biblScope>
          <biblScope type="number">3</biblScope>
          <dateStruct>
            <year>1996</year>
          </dateStruct>
          <biblScope type="pages">131–133</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:MitnickSimon:deception" type="book" id="bid6">
      <monogr>
        <title level="m">The Art of Deception: Controlling the Human Element of Security</title>
        <author>
          <persName>
            <foreName>Kevin D.</foreName>
            <surname>Mitnick</surname>
            <initial>K. D.</initial>
          </persName>
          <persName>
            <foreName>William L.</foreName>
            <surname>Simon</surname>
            <initial>W. L.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">ISBN 0471237124</note>
        <imprint>
          <publisher>
            <orgName>Wiley Publishing Company</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2002</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:Monniaux:SAS99" type="incollection" id="bid12">
      <analytic>
        <title level="a">Abstracting Cryptographic Protocols with Tree Automata</title>
        <author>
          <persName>
            <foreName>David</foreName>
            <surname>Monniaux</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">6th International Static Analysis Symposium (SAS'99)</title>
        <imprint>
          <publisher>
            <orgName>Springer-Verlag LNCS 1694</orgName>
          </publisher>
          <dateStruct>
            <year>1999</year>
          </dateStruct>
          <biblScope type="pages">149–163</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.di.ens.fr/~monniaux/biblio/Monniaux_SAS99.ps.gz" location="extern" xyref="1804358116012">
          http://www.di.ens.fr/~monniaux/biblio/Monniaux_SAS99.ps.gz</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:NS1" type="article" id="bid1">
      <analytic>
        <title level="a">Using Encryption for Authentication in Large Networks of Computers</title>
        <author>
          <persName>
            <foreName>Roger M.</foreName>
            <surname>Needham</surname>
            <initial>R. M.</initial>
          </persName>
          <persName>
            <foreName>M. D.</foreName>
            <surname>Schroeder</surname>
            <initial>M. D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Communications of the ACM</title>
        <imprint>
          <biblScope type="volume">21</biblScope>
          <biblScope type="number">12</biblScope>
          <dateStruct>
            <year>1978</year>
          </dateStruct>
          <biblScope type="pages">993–999</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:NNS:H1" type="inproceedings" id="bid28">
      <analytic>
        <title level="a">Normalizable Horn Clauses, Strongly Recognizable Relations and Spi</title>
        <author>
          <persName>
            <foreName>Flemming</foreName>
            <surname>Nielson</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Hanne Riis</foreName>
            <surname>Nielson</surname>
            <initial>H. R.</initial>
          </persName>
          <persName>
            <foreName>Helmut</foreName>
            <surname>Seidl</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">9th Static Analysis Symposium (SAS)</title>
        <imprint>
          <publisher>
            <orgName>Springer Verlag LNCS 2477</orgName>
          </publisher>
          <dateStruct>
            <year>2002</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:RGL:log-art" type="inproceedings" id="bid19">
      <analytic>
        <title level="a">Log Auditing through Model Checking</title>
        <author>
          <persName>
            <foreName>Muriel</foreName>
            <surname>Roger</surname>
            <initial>M.</initial>
          </persName>
          <persName key="secsi-2005-id18078">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01), Cape Breton, Nova Scotia, Canada, June 2001</title>
        <imprint>
          <publisher>
            <orgName>IEEE Comp. Soc. Press</orgName>
          </publisher>
          <dateStruct>
            <year>2001</year>
          </dateStruct>
          <biblScope type="pages">220–236</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RogGou-csfw01.ps" location="extern" xyref="2747046319004">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/RogGou-csfw01.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:SimonKing:bufovf" type="inproceedings" id="bid4">
      <analytic>
        <title level="a">Analyzing String Buffers in C</title>
        <author>
          <persName>
            <foreName>Axel</foreName>
            <surname>Simon</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Andy</foreName>
            <surname>King</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Intl. Conf. on Algebraic Methods and Software Methodology (AMAST'2002)</title>
        <imprint>
          <dateStruct>
            <year>2002</year>
          </dateStruct>
          <biblScope type="pages">365–379</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:SP01" type="inproceedings" id="bid22">
      <analytic>
        <title level="a">Logical Relations for Encryption</title>
        <author>
          <persName>
            <foreName>Eijiro</foreName>
            <surname>Sumii</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Benjamin C.</foreName>
            <surname>Pierce</surname>
            <initial>B. C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 14th Computer Security Foundations Workshop</title>
        <imprint>
          <dateStruct>
            <year>2001</year>
          </dateStruct>
          <biblScope type="pages">256–272</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:SSL_TLS" type="book" id="bid25">
      <monogr>
        <title level="m">SSL &amp; TLS Essentials: Securing the Web</title>
        <author>
          <persName>
            <foreName>Stephen A.</foreName>
            <surname>Thomas</surname>
            <initial>S. A.</initial>
          </persName>
        </author>
        <note anchored="yes" place="unspecified" type="bnote">ISBN 0471383546</note>
        <imprint>
          <publisher>
            <orgName>Wiley</orgName>
          </publisher>
          <dateStruct>
            <year>2000</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:Weidenbach:crypto" type="inproceedings" id="bid9">
      <analytic>
        <title level="a">Towards an Automatic Analysis of Security Protocols</title>
        <author>
          <persName>
            <foreName>Christoph</foreName>
            <surname>Weidenbach</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>H.</foreName>
            <surname>Ganzinger</surname>
            <initial>H.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 16th International Conference on Automated Deduction (CADE-16)</title>
        <imprint>
          <publisher>
            <orgName>Springer-Verlag LNAI 1632</orgName>
          </publisher>
          <dateStruct>
            <year>1999</year>
          </dateStruct>
          <biblScope type="pages">378–382</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:NZ:CSL03" type="inproceedings" id="bid24">
      <analytic>
        <title level="a">Logical Relations for Dynamic Name Creation</title>
        <author>
          <persName key="secsi-2005-id18301">
            <foreName>Yu</foreName>
            <surname>Zhang</surname>
            <initial>Y.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Nowak</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 17th Intl. Workshop Computer Science Logic (CSL'2003)</title>
        <title level="s">LNCS</title>
        <imprint>
          <biblScope type="volume">2803</biblScope>
          <publisher>
            <orgName>Springer Verlag</orgName>
          </publisher>
          <dateStruct>
            <year>2003</year>
          </dateStruct>
          <biblScope type="pages">575–588</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ZN-csl2003.ps" location="extern" xyref="104366283015">
          http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ZN-csl2003.ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct rend="foot" n="footcite:THJ:T2G:hack" type="article" id="bid0">
      <analytic>
        <title level="a">La carte à puce nouvelle génération T2G est hackable</title>
        <author>
          <persName>
            <foreName/>
            <surname>By &lt;JBs&gt;</surname>
            <initial/>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">The Hackademy Journal</title>
        <imprint>
          <biblScope type="volume">9</biblScope>
          <dateStruct>
            <month>June</month>
            <year>2003</year>
          </dateStruct>
          <biblScope type="pages">3–6</biblScope>
          <ref xlink:actuate="onRequest" xlink:show="replace" xlink:type="simple" xlink:href="http://www.thehackademy.net/magazine.php?zone=journal&amp;mag=22" location="extern" xyref="630663112024">
          http://www.thehackademy.net/magazine.php?zone=journal&amp;mag=22</ref>
        </imprint>
      </monogr>
    </biblStruct>
  </biblio>
</raweb>
