<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE raweb PUBLIC "-//INRIA//DTD " "raweb2.dtd">
<raweb xmlns:html="http://www.w3.org/1999/xhtml" xmlns:xlink="http://www.w3.org/1999/xlink" xml:lang="en" year="2011">
  <identification id="secsi" isproject="true">
    <shortname>SECSI</shortname>
    <projectName>Security of information systems</projectName>
    <theme-de-recherche>Programs, Verification and Proofs</theme-de-recherche>
    <domaine-de-recherche>Algorithmics, Programming, Software and Architecture</domaine-de-recherche>
    <structure_exterieure type="Labs">
      <libelle>Laboratoire specification et vérification (LSV)</libelle>
    </structure_exterieure>
    <structure_exterieure type="Organism">
      <libelle>CNRS</libelle>
    </structure_exterieure>
    <structure_exterieure type="Organism">
      <libelle>Ecole normale supérieure de Cachan</libelle>
    </structure_exterieure>
    <UR name="Saclay"/>
    <keywords>
      <term>Formal Methods</term>
      <term>Automated Theorem Proving</term>
      <term>Cryptography</term>
      <term>Protocols</term>
      <term>Model-Checking</term>
      <term>Security</term>
    </keywords>
    <moreinfo>
      <p>SECSI is a project common to INRIA and the Laboratoire Spécification et Vérification (LSV), itself a common lab between CNRS (UMR 8643) and the École Normale Supérieure (ENS) de Cachan. The
      team was created in 2001, and became an INRIA projet in December, 2002.</p>
    </moreinfo>
  </identification>
  <team id="uid1">
    <person key="secsi-2006-idm508572685104">
      <firstname>Hubert</firstname>
      <lastname>Comon-Lundh</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Professor, ENS Cachan</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="secsi-2006-idm508572701520">
      <firstname>Jean</firstname>
      <lastname>Goubault-Larrecq</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Team Leader, Professor, ENS Cachan</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="secsi-2006-idm508572664768">
      <firstname>Stéphanie</firstname>
      <lastname>Delaune</lastname>
      <affiliation>CNRS</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Junior Researcher</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="secsi-2006-idm508572694480">
      <firstname>Steve</firstname>
      <lastname>Kremer</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Junior Researcher, Until August 2011</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="secsi-2007-idm453291718128">
      <firstname>Graham</firstname>
      <lastname>Steel</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Junior Researcher</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="maxplus-2007-idm222999282640">
      <firstname>Assalé</firstname>
      <lastname>Adjé</lastname>
      <affiliation>CNRS</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>ANR grant CPP, Started May 2011</moreinfo>
    </person>
    <person key="secsi-2010-idm192214093616">
      <firstname>Gergei</firstname>
      <lastname>Bana</lastname>
      <affiliation>CNRS</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Until February 2011</moreinfo>
    </person>
    <person key="cascade-2008-idm9324667248">
      <firstname>Céline</firstname>
      <lastname>Chevalier</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>ATER, until Sept. 2010</moreinfo>
    </person>
    <person key="cascade-2008-idm9324655072">
      <firstname>Malika</firstname>
      <lastname>Izabachène</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>ATER, since Oct. 2011</moreinfo>
    </person>
    <person key="secsi-2010-idm192214087440">
      <firstname>Yusuke</firstname>
      <lastname>Kawamoto</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>INRIA grant</moreinfo>
    </person>
    <person key="secsi-2009-idm304595288624">
      <firstname>Joe-Kai</firstname>
      <lastname>Tsay</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Until September 2011; paid by INRIA until March 2011, by CNRS from April to September 2011</moreinfo>
    </person>
    <person key="secsi-2008-idm216112251840">
      <firstname>Mathilde</firstname>
      <lastname>Arnaud</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>ANR grant AVOTÉ, Started Oct. 2008</moreinfo>
    </person>
    <person key="secsi-2008-idm216112230192">
      <firstname>Hedi</firstname>
      <lastname>Benzina</lastname>
      <affiliation>AutreEtablissementPublic</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Digiteo grant, Started Nov. 2009</moreinfo>
    </person>
    <person key="alice-2007-idm354919509200">
      <firstname>Vincent</firstname>
      <lastname>Cheval</lastname>
      <affiliation>AutreEtablissementPublic</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>ENS Cachan student, Started Oct. 2009</moreinfo>
    </person>
    <person key="cassis-2009-idm311524300448">
      <firstname>Ştefan</firstname>
      <lastname>Ciobâcă</lastname>
      <affiliation>CNRS</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>ANR grant AVOTÉ, Started Oct. 2008</moreinfo>
    </person>
    <person key="cassis-2011-idm108880582928">
      <firstname>Guillaume</firstname>
      <lastname>Scerri</lastname>
      <affiliation>CNRS</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>ERC grant ProSecure (holder: Véronique Cortier, CASSIS), Started October 2011</moreinfo>
    </person>
    <person key="secsi-2009-idm304595291680">
      <firstname>Rohit</firstname>
      <lastname>Chadha</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Temporary Researcher</moreinfo>
    </person>
    <person key="secsi-2010-idm192214059648">
      <firstname>Robert</firstname>
      <lastname>Künnemann</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>INRIA grant</moreinfo>
    </person>
    <person key="proval-2007-idm172231421920">
      <firstname>Romain</firstname>
      <lastname>Bardou</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>ITI engineer, Since September 2011</moreinfo>
    </person>
    <person key="secsi-2010-idm192214056640">
      <firstname>Baptiste</firstname>
      <lastname>Gourdin</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>engineer “jeune diplomé”, INRIA ADT Phalaenopsis, Until November 2011</moreinfo>
    </person>
    <person key="secsi-2011-idm285107528576">
      <firstname>Nasr-Eddine</firstname>
      <lastname>Yousfi</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>ITI engineer, Since December 2011</moreinfo>
    </person>
    <person key="alien-2007-idm157627871872">
      <firstname>Isabelle</firstname>
      <lastname>Biercewicz</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Until September 2011</moreinfo>
    </person>
    <person key="secsi-2011-idm285107522464">
      <firstname>Valérie</firstname>
      <lastname>Hoareau</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Since November 2011</moreinfo>
    </person>
    <person key="secsi-2009-idm304595257824">
      <firstname>Morten</firstname>
      <lastname>Dahl</lastname>
      <affiliation>UnivEtrangere</affiliation>
      <categoryPro>Visiteur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>4 months</moreinfo>
    </person>
  </team>
  <presentation id="uid2">
    <bodyTitle>Overall Objectives</bodyTitle>
    <subsection id="uid3" level="1">
      <bodyTitle>Overall Objectives</bodyTitle>
      <p>SECSI is a common project between INRIA Saclay and the LSV (Laboratoire Spécification et Vérification), itself a common research unit of CNRS (UMR 8643) and the ENS (École Normale
      Supérieure) de Cachan.</p>
      <p>The SECSI project is a research project on the security of information systems. Originally, SECSI was organized around three main themes, and their mutual relationships:</p>
      <simplelist>
        <li id="uid4">
          <p noindent="true">Automated verification of cryptographic protocols;</p>
        </li>
        <li id="uid5">
          <p noindent="true">Intrusion detection;</p>
        </li>
        <li id="uid6">
          <p noindent="true">Static analysis of programs, in order to detect security holes and vulnerabilities at the protocol level.</p>
        </li>
      </simplelist>
      <p>This has changed. Starting from 2006, SECSI concentrates on the first theme, while keeping an eye on the other two.</p>
      <p>In a nutshell, the aim of the SECSI project is to 
      <i>develop logic-based verification techniques for security properties of computer systems and networks</i>.</p>
      <p>The thrust is towards more 
      <i>automation</i>(new automata-based, or theorem-proving based verification techniques), more 
      <i>properties</i>(not just secrecy or authentication, but e.g., coercion-resistance in electronic voting schemes), more 
      <i>realism</i>(e.g., cryptographic soundness theorems for formal models).</p>
      <p>The new objectives of the SECSI project are:</p>
      <orderedlist>
        <li id="uid7">
          <p noindent="true">Tree-automata based methods, automated deduction, and approximate/exact cryptographic protocol verification in the Dolev-Yao model.</p>
        </li>
        <li id="uid8">
          <p noindent="true">Enriching the Dolev-Yao model with algebraic theories, and associated decision problems.</p>
        </li>
        <li id="uid9">
          <p noindent="true">Computational soundness of formal models (Dolev-Yao, applied pi-calculus).</p>
        </li>
        <li id="uid10">
          <p noindent="true">Indistinguishability proofs allowing us to handle more properties, e.g. anonymity.</p>
        </li>
        <li id="uid11">
          <p noindent="true">Application to new security protocols, e.g. electonic voting protocols.</p>
        </li>
        <li id="uid12">
          <p noindent="true">Security in the presence of probabilistic and demonic non-deterministic choices.</p>
        </li>
      </orderedlist>
    </subsection>
    <subsection id="uid13" level="1">
      <bodyTitle>Highlights</bodyTitle>
      <simplelist>
        <li id="uid14">
          <p noindent="true">Jean Goubault-Larrecq was awarded the CNRS Silver Medal, 2011.</p>
        </li>
        <li id="uid15">
          <p noindent="true">SECSI organized the 24th IEEE Computer Security Foundations Symposium (CSF).</p>
        </li>
        <li id="uid16">
          <p noindent="true">SECSI organized a two-day colloquium centered around several invited talks and three defenses of habilitation theses by members of SECSI.</p>
        </li>
        <li id="uid17">
          <p noindent="true">Steve Kremer co-edited, with Véronique Cortier, the book 
          <i>Formal Models and Techniques for Analyzing Security Protocols</i> 
          <ref xlink:href="#secsi-2011-bid0" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
        </li>
      </simplelist>
    </subsection>
  </presentation>
  <fondements id="uid18">
    <bodyTitle>Scientific Foundations</bodyTitle>
    <subsection id="uid19" level="1">
      <bodyTitle>Foundations</bodyTitle>
      <p>Computer security has become more and more pressing as a concern since the mid 1990s. There are several reasons to this: cryptography is no longer a 
      <i>chasse réservée</i>of the military, and has become ubiquitous; and computer networks (e.g., the Internet) have grown considerably and have generated numerous opportunities for attacks and
      misbehaviors, notably.</p>
      <p>The aim of the SECSI project is to 
      <i>develop logic-based verification techniques for security properties of computer systems and networks</i>. Let us explain what this means, and what this does not mean.</p>
      <p>First, the scope of the research at SECSI started as a rather broad subset of computer security, although the core of SECSI's activities has always been on verifying cryptographic
      protocols.</p>
      <p>We took this for granted in 2006, and decided to concentrate on the latter. This already includes a vast number of concerns.</p>
      <p>First, there is a plethora of distinct 
      <i>security properties</i>one may wish to verify. Beyond the standard properties of secrecy (weak or strong forms), or authentication, one considers anonymity, fairness in contract-signing, and
      the subtle security properties involved in electronic voting such as accountability, receipt-freeness, resistance to coercion, or user verifiability. Some of these properties are trace
      properties, some are not, and are therefore more complex to state and verify.</p>
      <p>Second, there are many available 
      <i>models</i>. SECSI started with the rather simple symbolic models of security known today as Dolev-Yao models. One must then look at process algebra models (spi-calculus, applied
      pi-calculus), which allow for a symbolic treatment of more complex properties, especially those that are not trace properties. And one must also look at the computational models favored by
      cryptographers, e.g., the game-based approaches and the universal composability/simulatability approaches. They are more realistic in terms of security, but less directly amenable to automated
      verification. One of the features of computational models that makes them more complex is the need for computing, and bounding probabilities of certain events. This led us into contributing to
      the field of verification of probabilistic systems. One must also look at the relations between these models.</p>
      <p>Third, there are many important 
      <i>applications</i>. While SECSI started looking at the rather simple and now mundane confidentiality and authentication protocols, two important application domains have emerged: the
      verification of electronic voting protocols, and the verification of cryptographic APIs.</p>
      <p>Apart from cryptographic protocols, the initial vision of the SECSI project was that computer security, being a global concern, should be taken as a whole, as far as possible. This is why
      one of the initial objectives of SECSI included topic in intrusion detection, again seen from the logical point of view.</p>
      <p>One should remember the following. First, one of the key phrases in the SECSI motto is “logic-based”. It is a founding theme of SECSI that logic matters in security, and opportunities are to
      be grabbed. Another key phrase is “verification techniques”. The expertise of SECSI is not in designing protocols or security architectures. Verifying protocols, formally, is an arduous task
      already, and has proved to be an extremely rich area.</p>
    </subsection>
    <subsection id="uid20" level="1">
      <bodyTitle>Objectives</bodyTitle>
      <p>SECSI has five objectives:</p>
      <simplelist>
        <li id="uid21">
          <p noindent="true">Objective 1: symbolic verification of cryptographic protocols. Tree-automata based methods, automated deduction, and approximate/exact cryptographic protocol
          verification in the Dolev-Yao model. Enriching the Dolev-Yao model with algebraic theories, and associated decision problems.</p>
        </li>
        <li id="uid22">
          <p noindent="true">Objective 2: verification of cryptographic protocols in computational models. Computational soundness of formal models (Dolev-Yao, applied pi-calculus).</p>
        </li>
        <li id="uid23">
          <p noindent="true">Objective 3: security of group protocols, fair exchange, voting and other protocols. Other security properties, other security models. In 2011, mostly: electronic
          voting protocols, security of the TPM, of the European electronic passport.</p>
        </li>
        <li id="uid24">
          <p noindent="true">Objective 4: probabilistic transition systems. Security in the presence of probabilistic and demonic non-deterministic choices.</p>
        </li>
        <li id="uid25">
          <p noindent="true">Objective 5: intrusion detection, network and host protection in the large.</p>
        </li>
      </simplelist>
    </subsection>
  </fondements>
  <domaine id="uid26">
    <bodyTitle>Application Domains</bodyTitle>
    <subsection id="uid27" level="1">
      <bodyTitle>Application Domains</bodyTitle>
      <p>Here are a few examples of applications of research done in SECSI:</p>
      <simplelist>
        <li id="uid28">
          <p noindent="true">Security of electronic voting schemes: the case of the Helios protocol, used in particular at University of Louvain-la-Neuve (2010) and at the International Association
          for Cryptographic Research (IACR).</p>
        </li>
        <li id="uid29">
          <p noindent="true">Security of the protocols involved in the TPM (Trusted Platform Module) chip, a chip present in most PC laptops today, and which is meant to act as a trusted base.</p>
        </li>
        <li id="uid30">
          <p noindent="true">Security of the European electronic passport—and the discovery of an attack on the French implementation of it.</p>
        </li>
        <li id="uid31">
          <p noindent="true">The Tookan tool allows one to assess the security of security tokens. These tokens are meant as safes holding secret keys, which should never be permitted to get out
          unencrypted. Several vulnerabilities discovered. Several interesting customers in banking (HSBC, Barclays), in aeronautics (Boeing), notably.</p>
        </li>
        <li id="uid32">
          <p noindent="true">Intrusion detection with the Orchids tool: several interested partners, among which EADS Cassidian, Thales, Galois Inc. (USA), the French Direction Générale de l'Armement
          (DGA).</p>
        </li>
      </simplelist>
    </subsection>
  </domaine>
  <logiciels id="uid33">
    <bodyTitle>Software</bodyTitle>
    <subsection id="uid34" level="1">
      <bodyTitle>
        <ref xlink:href="http://secgroup.ext.dsi.unive.it/projects/security-apis/pkcs11-security/tookan/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
        Tookan</ref>
      </bodyTitle>
      <participants>
        <person key="secsi-2007-idm453291718128">
          <firstname>Graham</firstname>
          <lastname>Steel</lastname>
          <moreinfo>correspondant</moreinfo>
        </person>
        <person key="proval-2007-idm172231421920">
          <firstname>Romain</firstname>
          <lastname>Bardou</lastname>
        </person>
      </participants>
      <p>See also the web page 
      <ref xlink:href="http://secgroup.ext.dsi.unive.it/projects/security-apis/pkcs11-security/tookan/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
      <allowbreak/>secgroup.
      <allowbreak/>ext.
      <allowbreak/>dsi.
      <allowbreak/>unive.
      <allowbreak/>it/
      <allowbreak/>projects/
      <allowbreak/>security-apis/
      <allowbreak/>pkcs11-security/
      <allowbreak/>tookan/
      <allowbreak/></ref>.</p>
      <p>Tookan is a security analysis tool for cryptographic devices such as smartcards, security tokens and Hardware Security Modules that support the most widely-used industry standard interface,
      RSA PKCS#11. Each device implements PKCS#11 in a slightly different way since the standard is quite open, but finding a subset of the standard that results in a secure device, i.e. one where
      cryptographic keys cannot be revealed in clear, is actually rather tricky. Tookan analyses a device by first reverse engineering the exact implementation of PKCS#11 in use, then building a
      logical model of this implementation for a model checker, calling a model checker to search for attacks, and in the case where an attack is found, executing it directly on the device. Tookan
      has been used to find at least a dozen previously unknown flaws in commercially available devices.</p>
      <p>The first results using Tookan were published in 2010  
      <ref xlink:href="#secsi-2011-bid1" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>and a six-month licence was granted to Boeing to use the tool. In 2011,
      this transfer activity has continued, principally in combination with a major UK bank. In June, Tookan was used by Steel and Focardi two days of testing on devices belonging to the bank.
      Following these results, in September, a more significant contract was signed granting the bank 18 months of use of Tookan to test all their in-house equipment. Initial feedback has been very
      positive.</p>
      <p>Tookan is the subject of a CSATT transfer action resulting in the hiring of an engineer, Romain Bardou, who started on September 1st. Early progress in re-implementing key parts of Tookan to
      improve modularity and overall code quality has been excellent. The next steps for Tookan are still being investigated: the Tookan project is the subject of a `qualification' procedure by IT2
      who will evaluate its suitability as the basis for a start-up company. At the same time other options are being considered, such as partnership with an existing SME. A decision is expected in
      mid-2012.</p>
    </subsection>
    <subsection id="uid35" level="1">
      <bodyTitle>Orchids</bodyTitle>
      <participants>
        <person key="secsi-2006-idm508572701520">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
          <moreinfo>correspondant</moreinfo>
        </person>
        <person key="secsi-2008-idm216112230192">
          <firstname>Hedi</firstname>
          <lastname>Benzina</lastname>
        </person>
        <person key="secsi-2010-idm192214056640">
          <firstname>Baptiste</firstname>
          <lastname>Gourdin</lastname>
        </person>
        <person key="secsi-2011-idm285107528576">
          <firstname>Nasr-Eddine</firstname>
          <lastname>Yousfi</lastname>
        </person>
      </participants>
      <p>The ORCHIDS real-time intrusion detection system was created in 2003-04 at SECSI. After a few years where research and development around ORCHIDS was relatively quiet, several new things
      happened, starting from the end of 2010.</p>
      <p>First, several companies and institutions expressed interest in ORCHIDS, among which, notably, EADS Cassidian, Thalès, Galois Inc. (USA), the French Direction Générale de l'Armement
      (DGA).</p>
      <p>Second, Baptiste Gourdin was hired as a development engineer (Dec. 2010-Nov. 2011) on an Action de Développement Technologique (ADT). He improved Orchids in several ways. Its user interface
      benefitted from a complete revamping. New features were implemented, such as conformance with the IODEF and IDMEF standards, connection with vulnerability and network topology databases, the
      possibility to do forensics that synchronize past events to the state that the above databases were in at the time of the events, among others.</p>
      <p>Nasr-Eddine Yousfi has followed up on Baptiste Gourdin, starting from December 2011, on an ITI engineer position allotted by INRIA's CSATT.</p>
      <p>Hedi Benzina implemented a tool on top of ORCHIDS, RuleGen, which allows one to write simple security policies that compile to ORCHIDS rules.</p>
      <p>The efforts done in 2011 around ORCHIDS should be seen as the first steps in the creation of an open source consortium, which will be consolidated in the next years.</p>
    </subsection>
    <subsection id="uid36" level="1">
      <bodyTitle>AKISS and SubVariant</bodyTitle>
      <participants>
        <person key="cassis-2009-idm311524300448">
          <firstname>Ştefan</firstname>
          <lastname>Ciobâcă</lastname>
        </person>
      </participants>
      <p>AKISS (
      <ref xlink:href="http://www.lsv.ens-cachan.fr/~ciobaca/akiss/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
      <allowbreak/>www.
      <allowbreak/>lsv.
      <allowbreak/>ens-cachan.
      <allowbreak/>fr/
      <allowbreak/>~ciobaca/
      <allowbreak/>akiss/
      <allowbreak/></ref>) is a tool implementing a procedure for verifying trace equivalence (or equivalently may-testing equivalence) for bounded security processes with no else branches employing
      cryptographic primitives modeled by an optimally reducing rewrite system.</p>
      <p>Trace equivalence can be used to model strong secrecy, vote-privacy and other security properties.</p>
      <p>AKISS uses a fully-abstract encoding of symbolic traces into Horn clauses, thereby extending the KISS tool (
      <ref xlink:href="http://www.lsv.ens-cachan.fr/~ciobaca/kiss/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
      <allowbreak/>www.
      <allowbreak/>lsv.
      <allowbreak/>ens-cachan.
      <allowbreak/>fr/
      <allowbreak/>~ciobaca/
      <allowbreak/>kiss/
      <allowbreak/></ref>), which can only check static equivalence.</p>
      <p>In order to get rid of the equational theory modeling the crytographic primitives, AKISS employs algorithms for computing strongly complete sets of variants and complete set of unifiers of
      the SubVariant tool. AKISS is described in an article submitted to ESOP, in Chapter 5 of Ştefan Ciobâcă's PhD thesis 
      <ref xlink:href="#secsi-2011-bid2" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      <p>SubVariant (
      <ref xlink:href="http://www.lsv.ens-cachan.fr/~ciobaca/subvariant/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
      <allowbreak/>www.
      <allowbreak/>lsv.
      <allowbreak/>ens-cachan.
      <allowbreak/>fr/
      <allowbreak/>~ciobaca/
      <allowbreak/>subvariant/
      <allowbreak/></ref>) is a tool for computing finite strongly complete set of variants modulo a convergent optimally reducing term rewriting system. SubVariant can also compute complete sets of
      equational unifiers for equational theories implemented by a convergent optimally reducing term rewriting system.</p>
      <p>Complete sets of variants and the finite variant property were introduced in  
      <ref xlink:href="#secsi-2011-bid3" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. In 
      <ref xlink:href="#secsi-2011-bid4" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, Ştefan Ciobâcă defines strongly complete sets of variants, which are
      more natural and more useful. Chapter 3 in Ştefan Ciobâcă's PhD thesis describes extensively the algorithms behind SubVariant.</p>
    </subsection>
  </logiciels>
  <resultats id="uid37">
    <bodyTitle>New Results</bodyTitle>
    <subsection id="uid38" level="1">
      <bodyTitle>Indistinguishability Proofs</bodyTitle>
      <participants>
        <person key="secsi-2009-idm304595291680">
          <firstname>Rohit</firstname>
          <lastname>Chadha</lastname>
        </person>
        <person key="alice-2007-idm354919509200">
          <firstname>Vincent</firstname>
          <lastname>Cheval</lastname>
        </person>
        <person key="cassis-2009-idm311524300448">
          <firstname>Ştefan</firstname>
          <lastname>Ciobâcă</lastname>
        </person>
        <person key="secsi-2006-idm508572685104">
          <firstname>Hubert</firstname>
          <lastname>Comon-Lundh</lastname>
        </person>
        <person key="secsi-2006-idm508572664768">
          <firstname>Stéphanie</firstname>
          <lastname>Delaune</lastname>
        </person>
        <person key="secsi-2006-idm508572694480">
          <firstname>Steve</firstname>
          <lastname>Kremer</lastname>
        </person>
      </participants>
      <p>Most existing results in verification of security protocols focus on trace properties such as secrecy or authentication. There are however several security properties that cannot be defined
      (or cannot be naturally defined) as trace properties and require the notion of indistinguishably. Typical examples are anonymity, privacy related properties or statements closer to security
      properties used in cryptography.</p>
      <p>In the framework of the applied pi-calculus  
      <ref xlink:href="#secsi-2011-bid5" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, as in similar languages based on equational logics,
      indistinguishability corresponds to a relation called trace equivalence. Roughly, two processes are trace equivalent when an observer cannot see any difference between the two processes.</p>
      <p>Under some conditions, trace equivalence can be reduced to the problem of deciding symbolic equivalence, an equivalence relation introduced by M. Baudet  
      <ref xlink:href="#secsi-2011-bid6" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. However, the procedure proposed by Mathieu Baudet for deciding
      symbolic equivalence is complex and cannot be implemented in its current state. Moreover, this method can only deal with simple processes with trivial else branches and is restricted to the
      class of subterm-convergent equational theories. Unfortunately, this makes it unsuitable for some case studies of interest to the SECSI team, among which the FOO electronic voting protocol, and
      the electronic passport protocols.</p>
      <p>In order to provide tool support to decide trace equivalence, Rohit Chadha, Stefan Ciobâcă, and Steve Kremer propose a procedure that can handle a large set of cryptographic primitives. The
      procedure has been implemented in a prototype tool and has been effectively tested on examples (
      <i>e.g.</i>, the FOO e-voting protocol). This paper is currently under submission.</p>
      <p>Vincent Cheval, Hubert Comon-Lundh and Stéphanie Delaune have designed another procedure that allows one to check trace equivalence for a general class of processes 
      <ref xlink:href="#secsi-2011-bid7" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. In their class, they can model conditionals (with non-trivial else
      branches), private channels, and non-deterministic choice. The private authentication protocol and the various versions of the electronic passport protocol fall into their class.</p>
    </subsection>
    <subsection id="uid39" level="1">
      <bodyTitle>Anonymous Credentials</bodyTitle>
      <participants>
        <person key="secsi-2006-idm508572664768">
          <firstname>Stéphanie</firstname>
          <lastname>Delaune</lastname>
        </person>
        <person key="cascade-2008-idm9324655072">
          <firstname>Malika</firstname>
          <lastname>Izabachène</lastname>
        </person>
        <person key="secsi-2007-idm453291718128">
          <firstname>Graham</firstname>
          <lastname>Steel</lastname>
        </person>
      </participants>
      <p>Anonymous credentials plays an important role in non-interactive anonymous authentication: they allow a user to obtain certificates from organization and subsequently prove their possession
      in such a way that transactions of a same user remain unlinkable. In collaboration with Benoit Libert and Damien Vergnaud, Malika Izabachène present an anonymous credential scheme 
      <ref xlink:href="#secsi-2011-bid8" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>in which a user can prove possession of appropriate attributes in an
      non-interactive fashion, by showing that these attributes satisfy a certain predicate (different type of predicates are handled).</p>
      <p>Following this line of research on anonymous protocols, Stéphanie Delaune, Malika Izabachène and Graham Steel formalize unlinkability in the pi-calculus framework. They are exploring several
      scenarios in order to capture many adversarial strategies, especially in the context of low-cost devices, in which sensitive data are stored and identifier means are exchanged through public
      channels.</p>
    </subsection>
    <subsection id="uid40" level="1">
      <bodyTitle>Security APIs</bodyTitle>
      <participants>
        <person key="secsi-2006-idm508572664768">
          <firstname>Stéphanie</firstname>
          <lastname>Delaune</lastname>
        </person>
        <person key="secsi-2006-idm508572694480">
          <firstname>Steve</firstname>
          <lastname>Kremer</lastname>
        </person>
        <person key="secsi-2010-idm192214059648">
          <firstname>Robert</firstname>
          <lastname>Künnemann</lastname>
        </person>
        <person key="secsi-2007-idm453291718128">
          <firstname>Graham</firstname>
          <lastname>Steel</lastname>
        </person>
        <person key="secsi-2010-idm192214087440">
          <firstname>Yusuke</firstname>
          <lastname>Kawamoto</lastname>
        </person>
        <person key="secsi-2009-idm304595288624">
          <firstname>Joe-Kai</firstname>
          <lastname>Tsay</lastname>
        </person>
      </participants>
      <p>Security APIs allow untrusted code to access sensitive resources in a secure way. The idea is to design an interface between a trusted component, such as a smart card or cryptographic
      security module, and the untrusted outside world such that no matter what sequence of commands in the interface are called, and no matter what the parameters, certain  good 
      properties will continue to hold, e.g. the secret long term keys on the smartcard are never revealed. Designing such interfaces is very tricky, and several vulnerabilities in APIs in common use
      have come to light in recent years.</p>
      <p>The members of the SECSI team have been studying the application of formal security analysis techniques to APIs, for the last few years. These APIs include industrial standards such as
      PKCS#11 and the Trusted Platform Module (TPM).</p>
      <p>In 
      <ref xlink:href="#secsi-2011-bid9" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, Delaune, Kremer and Steel present a Horn-clause-based framework for
      analyzing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the Trusted Platform Module (TPM). In their model, the PCR state
      space is unbounded, and experience shows that a naïve analysis using verification tools such as ProVerif or SPASS does not terminate. To address this, the authors extract a set of instances of
      the Horn clauses of the model, for which ProVerif does terminate on the chosen examples. The authors prove the soundness of this extraction process: no attacks are lost, that is, any query
      derivable in the more general set of clauses is also derivable from the extracted instances. The effectiveness of this framework is demonstrated in two case studies: a simplified version of
      Microsoft Bitlocker, and a digital envelope protocol that allows a user to choose whether to perform a decryption, or to verifiably renounce the ability to perform the decryption.</p>
      <p>One of the reasons for the existence of security flaws that the members of the SECSI team identified when studying security APIs is the absence of definitions stating the expected security
      properties.</p>
      <p>In 
      <ref xlink:href="#secsi-2011-bid10" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, Kremer, Steel and Warinschi propose a much-needed formal definition
      of security for cryptographic key management APIs. The advantages of this definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational
      models of cryptography. This definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic
      corruption of keys. Based on this the authors can define the security of more expressive APIs which support richer functionality. They illustrate their approach by showing the security of APIs
      both in symbolic and computational models.</p>
      <p>More recently, Kremer, Künnemann and Steel go even a step further in that direction and present the first key-management functionality in Canetti's Universal Composability (UC) framework. It
      allows one to enforce a wide range of security policy and is highly extensible. The authors illustrate its use by proving an implementation of a Security API secure with respect to arbitrary
      key-usage operations and explore a proof technique that allows to store cryptographic keys externally, a novelty in the UC framework. This work is currently submitted.</p>
      <p>In other recent work, in collaboration with Riccardo Focardi at the University of Venice, Kawamoto, Steel and Tsay have investigated the error behaviour of functions in the PKCS#11 API of
      various cryptographic devices including security tokens, electronic ID cards and Hardware Security Modules (HSMs). In certain circumstances attackers can take advantage of errors reported to
      make cryptanalytic attacks on functions in the API. Taking the example of the command used to import and encrypted key onto the device, they have discovered a number of so-called `error oracle
      attacks' based on variations of well-known padding attacks due to Bleichenbacher and Vaudenay. This work has also recently been submitted. A number of vulnerability reports have been sent to
      manufacturers and national agencies.</p>
    </subsection>
    <subsection id="uid41" level="1">
      <bodyTitle>Mobile Ad-Hoc Networks</bodyTitle>
      <participants>
        <person key="secsi-2008-idm216112251840">
          <firstname>Mathilde</firstname>
          <lastname>Arnaud</lastname>
        </person>
        <person key="secsi-2009-idm304595257824">
          <firstname>Morten</firstname>
          <lastname>Dahl</lastname>
        </person>
        <person key="secsi-2006-idm508572664768">
          <firstname>Stéphanie</firstname>
          <lastname>Delaune</lastname>
        </person>
        <person key="secsi-2007-idm453291718128">
          <firstname>Graham</firstname>
          <lastname>Steel</lastname>
        </person>
      </participants>
      <p>Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their communication infrastructure: each node provides the function of a router and relays packets on
      paths to other nodes. Finding these paths in an a priori unknown and constantly changing network topology is a crucial functionality of any ad hoc network. Specific protocols, called 
      <i>routing protocols</i>, are designed to ensure this functionality known as 
      <i>route discovery</i>. Secure routing protocols use cryptographic mechanisms in order to prevent a malicious node from compromising the discovered route and they often perform some recursive
      tests on received messages.</p>
      <p>Mathilde Arnaud, Véronique Cortier and Stéphanie Delaune provide NPTIME decision procedures for protocols with recursive tests and for a bounded number of sessions 
      <ref xlink:href="#secsi-2011-bid11" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. They also revisit constraint system solving, providing a complete
      symbolic representation of the attacker knowledge.</p>
      <p>In the context of vehicular ad-hoc networks, to improve road safety, a vehicle-to-vehicle communication platform is currently being developed by consortia of car manufacturers and
      legislators.</p>
      <p>In 
      <ref xlink:href="#secsi-2011-bid12" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, Morten Dahl, Stéphanie Delaune and Graham Steel propose a framework
      for formal analysis of privacy in location based services such as anonymous electronic toll collection. They give a formal definition of privacy, and apply it to the VPriv scheme for vehicular
      services. They analyse the resulting model using the ProVerif tool, concluding that the privacy property holds only if certain conditions are met by the implementation. Their analysis includes
      some novel features such as the formal modelling of privacy for a protocol that relies on interactive zero-knowledge proofs of knowledge and list permutations.</p>
    </subsection>
    <subsection id="uid42" level="1">
      <bodyTitle>Composition Results</bodyTitle>
      <participants>
        <person key="cascade-2008-idm9324667248">
          <firstname>Céline</firstname>
          <lastname>Chevalier</lastname>
        </person>
        <person key="secsi-2006-idm508572664768">
          <firstname>Stéphanie</firstname>
          <lastname>Delaune</lastname>
        </person>
        <person key="secsi-2006-idm508572694480">
          <firstname>Steve</firstname>
          <lastname>Kremer</lastname>
        </person>
      </participants>
      <p>Céline Chevalier, Stéphanie Delaune, and Steve Kremer investigate the composition of protocols that share a common weak secret 
      <ref xlink:href="#secsi-2011-bid13" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. This situation arises when users employ the same password on
      different services. More precisely they study whether resistance against guessing attacks composes when a same password is used. More precisely, they present a transformation which maps a
      password protocol that is secure for a single protocol session (a decidable problem) to a protocol that is secure for an unbounded number of sessions. Their result provides an effective
      strategy to design secure password protocols: (i) design a protocol intended to be secure for one protocol session; (ii) apply the transformation and obtain a protocol which is secure for an
      unbounded number of sessions. This technique also applies to compose different password protocols allowing one to obtain both inter-protocol and inter-session composition.</p>
    </subsection>
    <subsection id="uid43" level="1">
      <bodyTitle>Protecting Hypervisors from Denial of Service Attacks</bodyTitle>
      <participants>
        <person key="secsi-2008-idm216112230192">
          <firstname>Hedi</firstname>
          <lastname>Benzina</lastname>
        </person>
      </participants>
      <p>Hedi Benzina showed that hypervisors can be protected from some denial of service attacks by allowing administrators to write security policies in a simple language 
      <ref xlink:href="#secsi-2011-bid14" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. He implemented the RuleGen tool, which translates these policies
      into Orchids signatures.</p>
    </subsection>
    <subsection id="uid44" level="1">
      <bodyTitle>Soundness Results: Some Limitations</bodyTitle>
      <participants>
        <person key="secsi-2006-idm508572685104">
          <firstname>Hubert</firstname>
          <lastname>Comon-Lundh</lastname>
        </person>
      </participants>
      <p>Soundness results aim at bridging the gap between computational and symbolic security; they show that some symbolic model, in which messages are terms and the attacker is a formal process,
      faithfully abstracts the computational model, in which messages are bitstrings and the attacker is any probabilistic polynomial time Turing machine. Such results allow one to derive strong
      security guarantees, while reasoning at an abstract level. They have been developed for several cryptographic primitives (e.g. symmetric and asymmetric encryption, signatures, hash) and
      security properties.</p>
      <p>These results however suffer from some severe limitations, as Hubert Comon-Lundh and Véronique Cortier demonstrate 
      <ref xlink:href="#secsi-2011-bid15" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, focusing on symmetric encryption.</p>
    </subsection>
    <subsection id="uid45" level="1">
      <bodyTitle>Model-Checking Reactive Probabilistic Systems</bodyTitle>
      <participants>
        <person key="secsi-2009-idm304595291680">
          <firstname>Rohit</firstname>
          <lastname>Chadha</lastname>
        </person>
      </participants>
      <p>Rohit Chadha along with A. Prasad Sistla and Mahesh Viswanathan continued their study on reactive probabilistic systems modeled as Probabilistic Büchi Automata (PBA) in 
      <ref xlink:href="#secsi-2011-bid16" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. Reactive probabilistic systems are probabilistic non-deterministic
      systems in which the nondeterminism is resolved by a external environment which is oblivious of the “current" state of the system. This paper investigates the power of PBA when the threshold
      probability of acceptance is non-extremal, i.e., is a value strictly between 0 and 1. Many practical randomized algorithms are designed to work under non-extremal threshold probabilities and
      thus it is important to study power of PBAs for such cases. The paper presents a number of surprising expressiveness and decidability results for PBAs when the threshold probability is
      non-extremal. Some of these results sharply contrast with the results for extremal threshold probabilities. The paper also presents results for Hierarchical PBAs and for an interesting subclass
      of them called simple PBAs.</p>
      <p>Rohit Chadha along with V. Korthikranthi, M. Viswanathan, G. Agha and Y. Kwon also study reactive probabilistic systems in 
      <ref xlink:href="#secsi-2011-bid17" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. In  
      <ref xlink:href="#secsi-2011-bid17" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, reactive probabilistic systems are viewed as transformers of
      probability distributions, giving rise to a labeled transition system over the probability distributions over the states of the system. Thus, a reactive probabilistic system can be seen as
      defining a set of executions where each execution is a sequence of probability distributions. Reasoning about sequences of distributions allows one to express properties not expressible in
      standard probabilistic logics like PCTL; examples include expressing bounds on transient rewards and expected values of random variables, as well as comparing the probability of being in one
      set of states at a given time with another set of states. With respect to such a semantics, the model-checking problem is undecidable. In this paper, the authors identify a special class of
      systems called semi-regular Markov Decision Processes that have a unique non-empty, compact, invariant set of distributions, for which they show that checking any 
      <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>ω</mi></math></formula>-regular property is decidable. Their decidability result also implies that for semi-regular probabilistic finite automata with isolated cut-points, the emptiness problem is
      decidable.</p>
    </subsection>
    <subsection id="uid46" level="1">
      <bodyTitle>Continuous Random Variables</bodyTitle>
      <participants>
        <person key="secsi-2006-idm508572701520">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
        </person>
      </participants>
      <p>Continuing work on probabilistic and non-deterministic choice in a domain-theoretic setting, Jean Goubault-Larrecq and Daniele Varacca (PPS, University Paris 7) proposed a new monad for
      probabilistic choice, that of 
      <i>continuous random variables</i>
      <ref xlink:href="#secsi-2011-bid18" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. The usual Jones-Plotkin monad of continuous valuations, although
      simple enough, suffers from the defect that no category of continuous domains is known that would be both Cartesian-closed (i.e., would allow one to interpret functions) and stable under the
      Jones-Plotkin monad.</p>
      <p>Jean Goubault-Larrecq and Daniele Varacca managed to show that a related monad, that of continuous random variables, inspired from the notion of a random variable in probability theory, did
      not suffer from this defect: the category of bc-domains is indeed both Cartesian-closed and stable under this monad. Moreover, the authors showed that using one or the other monad gave
      semantics to higher-order probabilistic programs that were indistinguishable at ground types. Finally, they used this to solve an open problem by Escardò, namely that observational equivalence
      of probabilistic higher-order programs is recursively enumerable.</p>
    </subsection>
    <subsection id="uid47" level="1">
      <bodyTitle>Choquet-Kendall-Matheron Theorems</bodyTitle>
      <participants>
        <person key="secsi-2006-idm508572701520">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
        </person>
      </participants>
      <p>One of the results obtained by Jean-Goubault-Larrecq in his theory of semantics for mixed non-deterministic and probabilistic choice 
      <ref xlink:href="#secsi-2011-bid19" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>is that there is a one-to-one correspondence between continuous
      credibilities over some (state) space 
      <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>X</mi></math></formula>and certain compact subsets of the space of all continuous valuations over 
      <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>X</mi></math></formula>, under mild assumptions on 
      <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>X</mi></math></formula>. Similar theorems were produced by Choquet in the 1950s, refined by Kendall, then by Matheron in the 1970s, with applications in random set theory, among others.</p>
      <p>Klaus Keimel and Jean Goubault-Larrecq produced an extremely simple proof of this fact 
      <ref xlink:href="#secsi-2011-bid20" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, based on a simple special case of Groemer's integral theorem. This
      proof also produces a much more general result than what was known earlier, as it does not assume that 
      <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>X</mi></math></formula>is second-countable or Hausdorff, and only local compactness.</p>
      <p>A domain-theoretic view is that this is a representation theorem for mixed demonic choice and probabilistic choice; the angelic and erratic cases are also covered by Goubault-Larrecq and
      Keimel.</p>
      <p>These results had been presented at Dagstuhl Seminar 10232, June 2010.</p>
    </subsection>
    <subsection id="uid48" level="1">
      <bodyTitle>Full Abstraction for Call-by-Value Programs with Choice</bodyTitle>
      <participants>
        <person key="secsi-2006-idm508572701520">
          <firstname>Jean</firstname>
          <lastname>Goubault-Larrecq</lastname>
        </person>
      </participants>
      <p>Consider a programming language, with both an operational semantics, stating how one can implement a machine for this language, and a denotational semantics, which states what programs
      compute (not how). A classical question in programming language semantics is whether equality of denotations (from denotational semantics) coincides with contextual equivalence (from
      operational semantics). This is called 
      <i>full abstraction</i>.</p>
      <p>This question was first formulated for PCF by G. Plotkin in 1977, who showed that PCF was not fully abstract, although PCF plus a form of parallel or was. PCF is a simply-typed higher-order
      language, which one could see as a simple variant of the ML language without mutable state.</p>
      <p>Jean Goubault-Larrecq examined the question for variants of PCF with various forms of non-deterministic and probabilistic choice. The latter are modeled denotationally by using his theory of
      previsions 
      <ref xlink:href="#secsi-2011-bid21" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. The most startling result is that the call-by-value variant of PCF
      with only angelic non-determinism is fully abstract, without the need for parallel or. Jean Goubault-Larrecq also showed that call-by-value PCF with angelic non-determinism and probabilistic
      choice is not fully abstract, but that this language plus so-called statistical test primitives is fully abstract. These results were presented at the Domains X Workshop, Swansea, Wales, UK,
      September 2011.</p>
    </subsection>
  </resultats>
  <international id="uid49">
    <bodyTitle>Partnerships and Cooperations</bodyTitle>
    <subsection id="uid50" level="1">
      <bodyTitle>Regional Initiatives</bodyTitle>
      <simplelist>
        <li id="uid51">
          <p noindent="true">DIM Digiteo project RedPill: Malware Detection on Virtualized Architectures, Oct. 2009-Sept. 2012. Sole partner: LSV. Funds Hedi Benzina's PhD Thesis.</p>
        </li>
        <li id="uid52">
          <p noindent="true">DIM Digiteo project API: Automated Proofs of Indistinguishability, 2010-2013. Partners: EPI SECSI, EPI CASCADE. Oct. 2010-Sept. 2013. Funds Vincent Cheval's PhD
          Thesis.</p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid53" level="1">
      <bodyTitle>National Initiatives</bodyTitle>
      <simplelist>
        <li id="uid54">
          <p noindent="true">ANR programme blanc CPP (“Confidence, Probability, and Proofs”), 2009-2012. Partners: LSV (scientific leader), CEA LIST (co-leader), INRIA (Comète, Parsifal), Ecole
          Supérieure d'Electricité (L2S, SSE). External partners: Safran, Dassault Systèmes.</p>
          <p>In the context of proofs of safety properties for critical software, The CPP project proposes to study the joint use of probabilistic and formal (deterministic) semantics and analysis
          methods, in a way to improve the applicability and precision of static analysis methods on numerical programs. See 
          <ref xlink:href="http://www.lix.polytechnique.fr/~bouissou/cpp/index.php" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lix.
          <allowbreak/>polytechnique.
          <allowbreak/>fr/
          <allowbreak/>~bouissou/
          <allowbreak/>cpp/
          <allowbreak/>index.
          <allowbreak/>php</ref>.</p>
        </li>
        <li id="uid55">
          <p noindent="true">ANR SeSur (“Sécurité et Sûreté Informatique”) project AVOTÉ, 2008-2012. Partners: INRIA (Cassis, leader), LSV, Verimag and, until September 2009 France Télécom
          R&amp;D.</p>
          <p>Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes. However, the convenience of electronic elections comes with a
          risk of large-scale fraud and their security has seriously been questioned. The AVOTÉ project aims at proposing formal methods to analyze electronic voting protocols. See 
          <ref xlink:href="http://www.lsv.ens-cachan.fr/anr-avote/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>anr-avote/
          <allowbreak/></ref>.</p>
        </li>
        <li id="uid56">
          <p noindent="true">ANR VERSO program ProSe (“Proofs of Security”), 2010-2014. Partners: INRIA (Cascade, leader; Cassis), LSV, Verimag.</p>
          <p>The goal of the ProSe project is to increase the confidence in security protocols, and in order to reach this goal, provide security proofs at three levels: the 
          <i>symbolic</i>level, in which messages are terms; the 
          <i>computational</i>level, in which messages are bitstrings; and the 
          <i>implementation</i>level: the program itself. This project is a continuation of the FormaCrypt project. See 
          <ref xlink:href="https://crypto.di.ens.fr/projects:prose:main" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://
          <allowbreak/>crypto.
          <allowbreak/>di.
          <allowbreak/>ens.
          <allowbreak/>fr/
          <allowbreak/>projects:prose:main</ref>.</p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid57" level="1">
      <bodyTitle>INRIA Actions of Technological Development</bodyTitle>
      <simplelist>
        <li id="uid58">
          <p noindent="true">ADT Phalaenopsis, Dec. 2010-Dec. 2011. General improvement of the ORCHIDS tool (user interface, connexion with vulnerability and topology databases, enriching the
          signature base), and weaving a web of relations with interested industrial and institutional partners. Baptiste Gourdin was hired on this ADT in 2010-2011.</p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid59" level="1">
      <bodyTitle>International Initiatives</bodyTitle>
      <subsection id="uid60" level="2">
        <bodyTitle>Visits of International Scientists</bodyTitle>
        <simplelist>
          <li id="uid61">
            <p noindent="true">Olivier Pereira, Université Catholique de Louvain, Belgium, one week, March 2011.</p>
          </li>
          <li id="uid62">
            <p noindent="true">Mahesh Viswanathan, University of Illinois at Urbana-Champaign, one month, May 2011.</p>
          </li>
        </simplelist>
        <subsection id="uid63" level="3">
          <bodyTitle>Internship</bodyTitle>
          <simplelist>
            <li id="uid64">
              <p noindent="true">Jan Degrieck, 
              <i>Graph Reduction for Analysing Secure Routing Protocols</i>, advisor Stéphanie Delaune (with co-advisor Véronique Cortier);</p>
            </li>
            <li id="uid65">
              <p noindent="true">Daniel Pasaila, 
              <i>Algorithms for Deciding Symbolic Equivalence</i>, advisors Stéphanie Delaune and Steve Kremer;</p>
            </li>
            <li id="uid66">
              <p noindent="true">Loredana Vamanu, 
              <i>A Formal Analysis of Yubikey</i>, advisor Graham Steel.</p>
            </li>
          </simplelist>
        </subsection>
      </subsection>
    </subsection>
  </international>
  <diffusion id="uid67">
    <bodyTitle>Dissemination</bodyTitle>
    <subsection id="uid68" level="1">
      <bodyTitle>Animation of the scientific community</bodyTitle>
      <simplelist>
        <li id="uid69">
          <p noindent="true">Hubert Comon-Lundh is director of the Parisian Master of Research in Computer Science (MPRI).</p>
        </li>
      </simplelist>
      <p>Program committee chairs:</p>
      <simplelist>
        <li id="uid70">
          <p noindent="true">5th Workshop on Analysis of Security APIs ASA-5, Paris, June (Graham Steel).</p>
        </li>
      </simplelist>
      <p>Participation to program committes of conferences:</p>
      <simplelist>
        <li id="uid71">
          <p noindent="true">20th European Symposium on Programming ESOP'11 (affiliated with ETAPS 2011), Saarbrücken, Germany, March-April 2011 (Jean Goubault-Larrecq)</p>
        </li>
        <li id="uid72">
          <p noindent="true">Theory of Security and Applications Workshop TOSCA'11 (affiliated with ETAPS 2011), Saarbrücken, Germany, Germany, March-April 2011 (Graham Steel)</p>
        </li>
        <li id="uid73">
          <p noindent="true">Workshop on Formal Methods and Cryptography CryptoForma'11, Limerick, Ireland, June 2011 (Graham Steel)</p>
        </li>
        <li id="uid74">
          <p noindent="true">24th IEEE Computer Security Foundations Symposium CSF'11, Domaine de l'Abbaye des Vaux de Cernay, France, June 2011 (Steve Kremer, general chair; Stéphanie Delaune)</p>
        </li>
        <li id="uid75">
          <p noindent="true">9th Annual Conference on Privacy, Security and Trust PST'11, Montréal, Québec, July 2011 (Steve Kremer)</p>
        </li>
        <li id="uid76">
          <p noindent="true">23rd International Conference on Automated Deduction, Wroclaw, Poland, July-August 2011 (Stéphanie Delaune)</p>
        </li>
        <li id="uid77">
          <p noindent="true">2nd International Conference on Runtime Verification RV'11, Berkeley, California, USA, September 2011 (Jean Goubault-Larrecq)</p>
        </li>
        <li id="uid78">
          <p noindent="true">9th International Workshop on Security Issues in Concurrency SecCo'11, Aachen, Germany, September 2011 (Stéphanie Delaune)</p>
        </li>
        <li id="uid79">
          <p noindent="true">8th International Workshop on Formal Aspects of Security and Trust FAST'11, Leuven, Belgium, September 2011 (Steve Kremer)</p>
        </li>
        <li id="uid80">
          <p noindent="true">18th ACM Conference on Computer and Communications Security CCS'11, Chicago, USA, October 2011 (Stéphanie Delaune)</p>
        </li>
        <li id="uid81">
          <p noindent="true">31st Conference on Foundations of Software Technology and Theoretical Computer Science FST&amp;TCS'11, Mumbai, India, December 2011 (Stéphanie Delaune)</p>
        </li>
        <li id="uid82">
          <p noindent="true">27th Symposium On Applied Computing SAC'12 (security track), Riva del Garda (Trento), Italy March, 2012 (Graham Steel)</p>
        </li>
        <li id="uid83">
          <p noindent="true">16th International Conference on Foundations of Software Science and Computation Structures FoSSaCS'13, Rome, Italy, March 2013 (Jean Goubault-Larrecq).</p>
        </li>
      </simplelist>
      <p>Organization of conferences:</p>
      <simplelist>
        <li id="uid84">
          <p noindent="true">24th IEEE Computer Security Foundations Symposium CSF'11, Domaine de l'Abbaye des Vaux de Cernay, France, June 27-29, 2011 (Steve Kremer, general chair; Stéphanie
          Delaune, Vincent Cheval, Robert Künnemann, Graham Steel); around 90 attendees. 
          <ref xlink:href="http://csf2011.inria.fr/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>csf2011.
          <allowbreak/>inria.
          <allowbreak/>fr/
          <allowbreak/></ref></p>
        </li>
        <li id="uid85">
          <p noindent="true">Dagsuhl seminar 11332 
          <i>Security and Rewriting</i>, August 2011 (Hubert Comon-Lundh) 
          <ref xlink:href="http://www.dagstuhl.de/en/program/calendar/semhp/?semnr=11332" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>dagstuhl.
          <allowbreak/>de/
          <allowbreak/>en/
          <allowbreak/>program/
          <allowbreak/>calendar/
          <allowbreak/>semhp/
          <allowbreak/>?semnr=11332</ref></p>
        </li>
      </simplelist>
      <p>Steering committees of conferences:</p>
      <simplelist>
        <li id="uid86">
          <p noindent="true">Computer Security Foundations Conference CSF (Graham Steel, since 2010)</p>
        </li>
        <li id="uid87">
          <p noindent="true">Conference on Principles of Security and Trust POST (Steve Kremer, since 2011)</p>
        </li>
        <li id="uid88">
          <p noindent="true">IEEE Computer Security Foundations Symposium CSF (Steve Kremer, since 2010)</p>
        </li>
        <li id="uid89">
          <p noindent="true">Workshop on Security and Rewriting Techniques SecReT (Steve Kremer, since 2010).</p>
        </li>
      </simplelist>
      <p>Selection committees: Chaire X/CNRS (Stéphanie Delaune); LaBRI, Bordeaux (Jean Goubault-Larrecq); Paris XIII (Hubert Comon-Lundh), Marseilles (Hubert Comon-Lundh), ENS Cachan (Hubert
      Comon-Lundh, president).</p>
      <p>Evaluation committees:</p>
      <simplelist>
        <li id="uid90">
          <p noindent="true">French Delegation for Armaments (DGA), security of information systems, January (Jean Goubault-Larrecq)</p>
        </li>
        <li id="uid91">
          <p noindent="true">AERES evaluation, LIF, Marseilles, January (Hubert Comon-Lundh)</p>
        </li>
      </simplelist>
      <p>Scientific boards:</p>
      <simplelist>
        <li id="uid92">
          <p noindent="true">CNRS INSII (Oct. 2010-Oct 2014, Hubert Comon-Lundh).</p>
        </li>
      </simplelist>
      <p>PhD defenses:</p>
      <simplelist>
        <li id="uid93">
          <p noindent="true">Mário S. Alvim, 
          <i>Formal Approaches to Information Hiding</i>, École Polytechnique, October 12 (Stéphanie Delaune, member of the jury)</p>
        </li>
        <li id="uid94">
          <p noindent="true">Mathilde Arnaud, 
          <i>Formal Verification of Secured Routing Protocols</i>, ENS Cachan, December 13 (Stéphanie Delaune, PhD advisor; Jean Goubault-Larrecq, official PhD advisor)</p>
        </li>
        <li id="uid95">
          <p noindent="true">Romain Bardou, 
          <i>Verification of Pointer Programs Using Regions and Permissions</i>, Université Paris-Sud, October 14 (Jean Goubault-Larrecq, president of the jury)</p>
        </li>
        <li id="uid96">
          <p noindent="true">Charles Bouillaguet, 
          <i>Etudes d’hypothèses algorithmiques et attaques de primitives cryptographiques</i>, ENS Paris, September 2011 (Hubert Comon-Lundh, member of the jury)</p>
        </li>
        <li id="uid97">
          <p noindent="true">A. Baskar, 
          <i>Decidability Results For Extended Dolev-Yao Theories</i>, CMI, Chennai, India (Steve Kremer, reviewer)</p>
        </li>
        <li id="uid98">
          <p noindent="true">Ştefan Ciobâcă, 
          <i>Automated Verification of Security Protocols with Applications to Electronic Voting</i>, ENS Cachan, December 09 (Steve Kremer, PhD advisor; Jean Goubault-Larrecq, official PhD
          advisor)</p>
        </li>
        <li id="uid99">
          <p noindent="true">Cezara Drăgoi, 
          <i>Automated Verification of Heap-Manipulating Programs on Infinite Data</i>, University Paris 7, December 08 (Jean Goubault-Larrecq, rapporteur)</p>
        </li>
        <li id="uid100">
          <p noindent="true">Nicolas Perrin, 
          <i>Footstep Planning for Humanoid Robots: Discrete and Continuous Approaches</i>, Toulouse, October (Hubert Comon-Lundh, member of the jury)</p>
        </li>
        <li id="uid101">
          <p noindent="true">Paul Poncet, 
          <i>Infinite-Dimensional Idempotent Analysis, The Role of Continuous Posets</i>, Ecole Polytechnique, November 14 (Jean Goubault-Larrecq, member of the jury)</p>
        </li>
      </simplelist>
      <p>HDR defenses:</p>
      <simplelist>
        <li id="uid102">
          <p noindent="true">Yannick Chevalier, 
          <i>Logical Approach to Security in Distributed Systems</i>, Toulouse, February (Hubert Comon-Lundh, rapporteur)</p>
        </li>
        <li id="uid103">
          <p noindent="true">Stéphanie Delaune, 
          <i>Verification of security protocols: from confidentiality to privacy</i>, ENS Cachan, March (Hubert Comon-Lundh, member of the jury)</p>
        </li>
        <li id="uid104">
          <p noindent="true">Steve Kremer, 
          <i>Modelling and analyzing security protocols in cryptographic process calculi</i>, ENS Cachan, March (Hubert Comon-Lundh, member of the jury)</p>
        </li>
        <li id="uid105">
          <p noindent="true">Graham Steel, 
          <i>Formal Analysis of Security APIs</i>, ENS Cachan, March (Hubert Comon-Lundh, member of the jury).</p>
        </li>
      </simplelist>
      <p>Invited talks:</p>
      <simplelist>
        <li id="uid106">
          <p noindent="true"><i>Attacking and Fixing PKCS#11 Security Tokens</i>, SICSA security workshop, University of Edinburgh, UK, May 24 (Graham Steel).</p>
        </li>
        <li id="uid107">
          <p noindent="true"><i>Attacking and Fixing PKCS#11 Security Tokens</i>, Symposium sur la sécurité des technologies de l'information et des communications (SSTIC 2012), Rennes, France, June 9 (Graham
          Steel).</p>
        </li>
        <li id="uid108">
          <p noindent="true"><i>A Few Pearls in the Theory of Quasi-Metric Spaces</i>, 5th Intl. Conf. Topology, Algebra, and Categories in Logic (TACL'11), Marseilles, France, July 30 (Jean Goubault-Larrecq).</p>
        </li>
        <li id="uid109">
          <p noindent="true"><i>Attacking and Fixing PKCS#11 Security Tokens</i>, Santa's Crypto Workshop (SantaCrypt), Prague, Czech republic, December 1, (Graham Steel)</p>
        </li>
        <li id="uid110">
          <p noindent="true"><i>Cryptographic Devices: Formal Specification and Verification</i>, Workshop on Formal Methods And Tools for Security (FMATS), Cambridge, UK, December 7 (Graham Steel)</p>
        </li>
      </simplelist>
      <p>Invitation to seminars:</p>
      <simplelist>
        <li id="uid111">
          <p noindent="true"><i>Attacking and Fixing PKCS#11 Security Tokens</i>, Formal Methods and Security Seminar, IRISA Rennes, France, January 7 (Graham Steel)</p>
        </li>
        <li id="uid112">
          <p noindent="true"><i>Attacking and Fixing PKCS#11 Security Tokens</i>, Security Seminar, INRIA-Microsoft Joint Research Centre, Paris, France, January 11 (Graham Steel)</p>
        </li>
        <li id="uid113">
          <p noindent="true"><i>Formal Analysis of Security Protocols: The Case of Electronic Voting</i>, Formal Methods seminar, Nancy, France, January 25 (Steve Kremer)</p>
        </li>
        <li id="uid114">
          <p noindent="true"><i>Model Checking Concurrent Programs with Nondeterminism and Randomization</i>  
          <ref xlink:href="#secsi-2011-bid22" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, LIAFA Seminar, University Paris Diderot, Paris, February 14
          (Rohit Chadha)</p>
        </li>
        <li id="uid115">
          <p noindent="true"><i>Attacking and Fixing PKCS#11 Security Tokens</i>, Security group seminar, IMDEA, Madrid, Spain, February 22 (Graham Steel)</p>
        </li>
        <li id="uid116">
          <p noindent="true"><i>On the Expressiveness and Complexity of Randomization in Finite State Monitors</i>  
          <ref xlink:href="#secsi-2011-bid23" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, University of Technology, Sydney, Australia, April 12 (Rohit
          Chadha)</p>
        </li>
        <li id="uid117">
          <p noindent="true"><i>On the Expressiveness and Complexity of Randomization in Finite State Monitors</i>  
          <ref xlink:href="#secsi-2011-bid23" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, LaBRI seminar, Bordeaux, France, May 18 (Rohit Chadha)</p>
        </li>
        <li id="uid118">
          <p noindent="true"><i>Continuous Random Variables</i> 
          <ref xlink:href="#secsi-2011-bid18" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, PPS, University Paris Diderot, May 26 (Jean
          Goubault-Larrecq)</p>
        </li>
        <li id="uid119">
          <p noindent="true"><i>ORCHIDS, and Bad Weeds</i>, Formal Methods and Security seminar, IRISA, Rennes, May 27 (Jean Goubault-Larrecq)</p>
        </li>
        <li id="uid120">
          <p noindent="true"><i>ORCHIDS, and Bad Weeds</i>, CEA LIST, Saclay, June 09 (Jean Goubault-Larrecq)</p>
        </li>
        <li id="uid121">
          <p noindent="true"><i>Formal Analysis of Protocols Based on TPM State Registers</i> 
          <ref xlink:href="#secsi-2011-bid9" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, Verimag, Grenoble, France, June 23 (Stéphanie Delaune)</p>
        </li>
        <li id="uid122">
          <p noindent="true"><i>Trace Equivalence Decision: Negative Tests and Non-determinism</i> 
          <ref xlink:href="#secsi-2011-bid7" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, Dagstuhl seminar on Security and Rewriting, Dagstuhl, Germany,
          August 17 (Stéphanie Delaune)</p>
        </li>
        <li id="uid123">
          <p noindent="true"><i>Transforming Password Protocols to Compose</i> 
          <ref xlink:href="#secsi-2011-bid13" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, Dagstuhl seminar on Security and Rewriting, Dagstuhl, Germany,
          August 15-17 (Steve Kremer)</p>
        </li>
        <li id="uid124">
          <p noindent="true"><i>A Procedure for Verifying Equivalence-Based Properties of Cryptographic Protocols</i>, Dagstuhl seminar on Security and Rewriting, Dagstuhl, Germany, August 15-17 (Steve Kremer)</p>
        </li>
        <li id="uid125">
          <p noindent="true"><i>Formal Analysis of Security APIs</i>, Security lab seminar, Nokia Research Centre, Beijing, August 24 (Graham Steel)</p>
        </li>
        <li id="uid126">
          <p noindent="true"><i>Trace Equivalence Decision: Negative Tests and Non-determinism</i> 
          <ref xlink:href="#secsi-2011-bid7" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, seminar of the LIENS, ENS, Paris, France, October 12 (Vincent
          Cheval)</p>
        </li>
        <li id="uid127">
          <p noindent="true"><i>Transforming Password Protocols to Compose</i> 
          <ref xlink:href="#secsi-2011-bid13" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, University of Luxembourg, October 18 (Steve Kremer)</p>
        </li>
        <li id="uid128">
          <p noindent="true"><i>Where is my Vote? - Formal Analysis of Electronic Voting Protocols</i>, Formal Methods and Security seminar, IRISA, Rennes, November 18 (Steve Kremer)</p>
        </li>
        <li id="uid129">
          <p noindent="true"><i>Trace Equivalence Decision: Negative Tests and Non-determinism</i> 
          <ref xlink:href="#secsi-2011-bid7" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, Formal Methods seminar, Nancy, France, November 15 (Vincent
          Cheval)</p>
        </li>
        <li id="uid130">
          <p noindent="true"><i>Analysing Security Protocols Using Process Algebra</i>, PPS, University Paris Diderot, November 17 (Stéphanie Delaune)</p>
        </li>
        <li id="uid131">
          <p noindent="true"><i>Automated Verification of Cryptographic Protocols</i> 
          <ref xlink:href="#secsi-2011-bid24" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, IIT Kanpur, India, December 06 (Rohit Chadha).</p>
        </li>
      </simplelist>
      <p>Popularization talks:</p>
      <simplelist>
        <li id="uid132">
          <p noindent="true"><i>Big Brother Won't Watch Us</i>, séminaire Unithé ou Café?, Parc Orsay Université, November 4 (Stéphanie Delaune)</p>
        </li>
        <li id="uid133">
          <p noindent="true"><i>Les protocoles cryptographiques: comment sécuriser nos communications ?</i>, atelier, Journées Nationales de l'APMEP, Grenoble, France, October 23 (Stéphanie Delaune)</p>
        </li>
      </simplelist>
      <p>Visits:</p>
      <simplelist>
        <li id="uid134">
          <p noindent="true">Rohit Chadha visited the Department of Computer Science, University of illinois, Urbana-Champaign from January 17 to January 23.</p>
        </li>
        <li id="uid135">
          <p noindent="true">Rohit Chadha was a visiting fellow at the University of Technology, Sydney from 28 March 2011 to 16 April.</p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid136" level="1">
      <bodyTitle>Teaching</bodyTitle>
      <sanspuceslist>
        <li id="uid137">
          <p noindent="true">License level:</p>
          <simplelist>
            <li id="uid138">
              <p noindent="true"><i>Logic and Computability</i>, 68+45h., L3, ENS Cachan, France (Hubert Comon-Lundh, Malika Izabachène)</p>
            </li>
            <li id="uid139">
              <p noindent="true"><i>Logic and Computer Science</i>(a.k.a., the lambda-calculus), 26h., L3, ENS Cachan and ENS Paris, France (Jean Goubault-Larrecq)</p>
            </li>
            <li id="uid140">
              <p noindent="true"><i>Programming</i>, 28+24h., L3, ENS Cachan, France (Jean Goubault-Larrecq, Vincent Cheval)</p>
            </li>
            <li id="uid141">
              <p noindent="true"><i>Cryptography, Cryptographic Protocols and Quantum Cryptography</i>, 3+4h., L3, Séminaire Regards Croisés Mathématiques-Physique, ENS Cachan, France (Jean Goubault-Larrecq, Stéphanie
              Delaune).</p>
            </li>
            <li id="uid142">
              <p noindent="true"><i>Introduction to Unix</i>, 8h., L3, ENS Cachan, France (Hedi Benzina).</p>
            </li>
            <li id="uid143">
              <p noindent="true"><i>Logic Programming</i>, 24h., L3 ENS Cachan, France (Hedi Benzina).</p>
            </li>
            <li id="uid144">
              <p noindent="true">Visits to laboratories, 3 days, L3 ENS Cachan (Hubert Comon-Lundh).</p>
            </li>
            <li id="uid145">
              <p noindent="true">Internship reviews, 12+4h., L3 ENS Cachan (Hubert Comon-Lundh, Jean Goubault-Larrecq).</p>
            </li>
          </simplelist>
        </li>
        <li id="uid146">
          <p noindent="true">Master level (MPRI=“Mastère Parisien de Recherche en Informatique”, MSSI=“Master Sécurité des Systèmes Informatiques”)</p>
          <simplelist>
            <li id="uid147">
              <p noindent="true"><i>Advanced Complexity</i>, 26h., M1, MPRI course 1-17, France (Jean Goubault-Larrecq)</p>
            </li>
            <li id="uid148">
              <p noindent="true"><i>Automated Deduction</i>, 12h., M2, MPRI course 2-5, France (Jean Goubault-Larrecq)</p>
            </li>
            <li id="uid149">
              <p noindent="true"><i>Cryptographic Protocols: Formal and Computational Proofs</i>, 12h., M2, MPRI course 2-30, France (Stéphanie Delaune)</p>
            </li>
            <li id="uid150">
              <p noindent="true"><i>Probabilistic Aspects of Computer Science</i>, 12+30h., M2, MPRI course 1-24, France (Rohit Chadha, Malika Izabachène).</p>
            </li>
            <li id="uid151">
              <p noindent="true"><i>Verification Methods for Security</i>, 9h., M2, MSSI, University Paris XII, France (Steve Kremer)</p>
            </li>
            <li id="uid152">
              <p noindent="true"><i>Network Programming Project</i>, 28h., M1, MPRI, France (Hedi Benzina)</p>
            </li>
            <li id="uid153">
              <p noindent="true"><i>Logic</i>, préparation à l'agrégation de Mathématiques, 30h., ENS Cachan (Hubert Comon-Lundh)</p>
            </li>
            <li id="uid154">
              <p noindent="true">Exercise sessions on 
              <i>programming</i>, préparation à l'agrégation de Mathématiques, 24h., ENS Cachan, France (Vincent Cheval)</p>
            </li>
            <li id="uid155">
              <p noindent="true">Exercise sessions on 
              <i>algebraic computation with Maple</i>, préparation à l'agrégation de Mathématiques, 32h., ENS Cachan, France (Malika Izabachène)</p>
            </li>
            <li id="uid156">
              <p noindent="true">Rehearsal of Computer Science Lessons, préparation à l'agrégation de Mathématiques, 12+12h., ENS Cachan, France (Hubert Comon-Lundh, Jean Goubault-Larrecq).</p>
            </li>
          </simplelist>
        </li>
        <li id="uid157">
          <p noindent="true">PhD level:</p>
          <simplelist>
            <li id="uid158">
              <p noindent="true">International NATO Summer School (Marktoberdorf), August 2011: 
              <i>Formal proofs of security</i>, 10h. (Hubert Comon-Lundh)</p>
            </li>
            <li id="uid159">
              <p noindent="true"><i>Security APIs</i>, one week, Tsinghua University, Beijing, China, August (Graham Steel). Master/PhD level.</p>
            </li>
          </simplelist>
        </li>
      </sanspuceslist>
      <p>PhD &amp; HdR:</p>
      <sanspuceslist>
        <li id="uid160">
          <p noindent="true">HdR :</p>
          <simplelist>
            <li id="uid161">
              <p noindent="true">Stéphanie Delaune, 
              <i>Verification of security protocols: from confidentiality to privacy</i>, ENS Cachan, March 2011 
              <ref xlink:href="#secsi-2011-bid25" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
            </li>
            <li id="uid162">
              <p noindent="true">Steve Kremer, 
              <i>Modelling and analyzing security protocols in cryptographic process calculi</i>, ENS Cachan, March 2011 
              <ref xlink:href="#secsi-2011-bid26" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
            </li>
            <li id="uid163">
              <p noindent="true">Graham Steel, 
              <i>Formal Analysis of Security APIs</i>, ENS Cachan, March 2011 
              <ref xlink:href="#secsi-2011-bid27" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
            </li>
          </simplelist>
        </li>
        <li id="uid164">
          <p noindent="true">PhD :</p>
          <simplelist>
            <li id="uid165">
              <p noindent="true">Ştefan Ciobâcă, 
              <i>Automated Verification of Security Protocols with Applications to Electronic Voting</i>
              <ref xlink:href="#secsi-2011-bid2" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, ENS Cachan, December 09 (Steve Kremer and Véronique Cortier,
              PhD advisors; Jean Goubault-Larrecq, official PhD advisor)</p>
            </li>
            <li id="uid166">
              <p noindent="true">Mathilde Arnaud, 
              <i>Formal Verification of Secured Routing Protocols</i>
              <ref xlink:href="#secsi-2011-bid28" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, ENS Cachan, December 13 (Stéphanie Delaune and Véronique
              Cortier, PhD advisors; Jean Goubault-Larrecq, official PhD advisor)</p>
            </li>
          </simplelist>
        </li>
        <li id="uid167">
          <p noindent="true">PhD in progress :</p>
          <simplelist>
            <li id="uid168">
              <p noindent="true">Hedi Benzina, 
              <i>Enforcing Security of Virtualized Architectures</i>, ENS Cachan, since October 2009, advisor Jean Goubault-Larrecq</p>
            </li>
            <li id="uid169">
              <p noindent="true">Vincent Cheval, 
              <i>Verification of Privacy-Type Security Properties</i>, ENS Cachan, since September 2009, advisors Hubert Comon-Lundh and Stéphanie Delaune</p>
            </li>
            <li id="uid170">
              <p noindent="true">Gavin Keighren, 
              <i>A Type System for Security APIs</i>, since 2007 (to submit March 2012), advisors Graham Steel and David Aspinall (University of Edinburgh).</p>
            </li>
            <li id="uid171">
              <p noindent="true">Robert Künnemann, 
              <i>Secure APIs and Simulation-Based Security</i>, ENS Cachan, since October 2010, advisors Steve Kremer and Graham Steel.</p>
            </li>
          </simplelist>
        </li>
      </sanspuceslist>
    </subsection>
  </diffusion>
  <biblio id="bibliography" html="bibliography" numero="10" titre="Bibliography">
    <biblStruct id="secsi-2011-bid54" type="article" rend="refer" n="refercite:BCK-IC09">
      <identifiant type="doi" value="10.1016/j.ic.2008.12.005"/>
      <analytic>
        <title level="a">Computationally Sound Implementations of Equational Theories against Passive Adversaries</title>
        <author>
          <persName key="secsi-2006-idm508572678128">
            <foreName>Mathieu</foreName>
            <surname>Baudet</surname>
            <initial>M.</initial>
          </persName>
          <persName key="cassis-2006-idm102849274320">
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Information and Computation</title>
        <imprint>
          <biblScope type="volume">207</biblScope>
          <biblScope type="number">4</biblScope>
          <dateStruct>
            <month>April</month>
            <year>2009</year>
          </dateStruct>
          <biblScope type="pages">496-520</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCK-ic09.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>BCK-ic09.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid60" type="inproceedings" rend="refer" n="refercite:BCFS-ccs10">
      <identifiant type="doi" value="10.1145/1866307.1866337"/>
      <analytic>
        <title level="a">Attacking and Fixing PKCS#11 Security Tokens</title>
        <author>
          <persName>
            <foreName>Matteo</foreName>
            <surname>Bortolozzo</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Matteo</foreName>
            <surname>Centenaro</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Riccardo</foreName>
            <surname>Focardi</surname>
            <initial>R.</initial>
          </persName>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10)</title>
        <loc>Chicago, Illinois, USA</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">260-269</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCFS-ccs10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>BCFS-ccs10.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid59" type="inproceedings" rend="refer" n="refercite:CCD-ccs11">
      <analytic>
        <title level="a">Trace Equivalence Decision: Negative Tests and Non-determinism</title>
        <author>
          <persName key="alice-2007-idm354919509200">
            <foreName>Vincent</foreName>
            <surname>Cheval</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2006-idm508572685104">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11)</title>
        <loc>Chicago, Illinois, USA</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CCD-ccs11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>CCD-ccs11.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="bnote">To appear</note>
    </biblStruct>
    <biblStruct id="secsi-2011-bid57" type="article" rend="refer" n="refercite:ComonCortier-TCS1">
      <identifiant type="doi" value="10.1016/j.tcs.2004.09.036"/>
      <analytic>
        <title level="a">Tree Automata with One Memory, Set Constraints and Cryptographic Protocols</title>
        <author>
          <persName key="secsi-2006-idm508572685104">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName key="cassis-2006-idm102849274320">
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">331</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <month>February</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">143-214</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PS/ComonCortierTCS1.ps" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PS/
          <allowbreak/>ComonCortierTCS1.
          <allowbreak/>ps</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid58" type="inproceedings" rend="refer" n="refercite:CLC-ccs08">
      <identifiant type="doi" value="10.1145/1455770.1455786"/>
      <analytic>
        <title level="a">Computational soundness of observational equivalence</title>
        <author>
          <persName key="secsi-2006-idm508572685104">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName key="cassis-2006-idm102849274320">
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08)</title>
        <loc>Alexandria, Virginia, USA</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2008</year>
          </dateStruct>
          <biblScope type="pages">109-118</biblScope>
          <ref xlink:href="http://dx.doi.org/10.1145/1455770.1455786" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>dx.
          <allowbreak/>doi.
          <allowbreak/>org/
          <allowbreak/>10.
          <allowbreak/>1145/
          <allowbreak/>1455770.
          <allowbreak/>1455786</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid55" type="article" rend="refer" n="refercite:DKR-jcs08">
      <analytic>
        <title level="a">Verifying Privacy-type Properties of Electronic Voting Protocols</title>
        <author>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2007-idm453291724240">
            <foreName>Mark D.</foreName>
            <surname>Ryan</surname>
            <initial>M. D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal of Computer Security</title>
        <imprint>
          <biblScope type="volume">17</biblScope>
          <biblScope type="number">4</biblScope>
          <dateStruct>
            <month>July</month>
            <year>2009</year>
          </dateStruct>
          <biblScope type="pages">435-487</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKR-jcs08.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>DKR-jcs08.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid56" type="article" rend="refer" n="refercite:DKS-jcs09">
      <analytic>
        <title level="a">Formal Analysis of PKCS#11 and Proprietary Extensions</title>
        <author>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal of Computer Security</title>
        <imprint>
          <dateStruct>
            <year>2009</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKS-jcs09.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>DKS-jcs09.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="bnote">To appear</note>
    </biblStruct>
    <biblStruct id="secsi-2011-bid51" type="inproceedings" rend="refer" n="refercite:Gou-lics07">
      <identifiant type="doi" value="10.1109/LICS.2007.34"/>
      <analytic>
        <title level="a">On Noetherian Spaces</title>
        <author>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science (LICS'07)</title>
        <loc>Wrocław, Poland</loc>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society Press</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2007</year>
          </dateStruct>
          <biblScope type="pages">453-462</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-lics07.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>JGL-lics07.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid53" type="inproceedings" rend="refer" n="refercite:GLP:VMCAI">
      <identifiant type="doi" value="10.1007/b105073"/>
      <analytic>
        <title level="a">Cryptographic Protocol Analysis on Real C Code</title>
        <author>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Fabrice</foreName>
            <surname>Parrennes</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName key="abstraction-2007-idm495957213728">
            <foreName>Radhia</foreName>
            <surname>Cousot</surname>
            <initial>R.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05)</title>
        <loc>Paris, France</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3385</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>January</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">363-379</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GouPar-VMCAI2005.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>GouPar-VMCAI2005.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid52" type="inproceedings" rend="refer" n="refercite:Orchids-cav05">
      <identifiant type="doi" value="10.1007/11513988_28"/>
      <analytic>
        <title level="a">The Orchids Intrusion Detection Tool</title>
        <author>
          <persName>
            <foreName>Julien</foreName>
            <surname>Olivain</surname>
            <initial>J.</initial>
          </persName>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Kousha</foreName>
            <surname>Etessami</surname>
            <initial>K.</initial>
          </persName>
          <persName>
            <foreName>Sriram</foreName>
            <surname>Rajamani</surname>
            <initial>S.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05)</title>
        <loc>Edinburgh, Scotland, UK</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3576</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">286-290</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/OG-cav05.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>OG-cav05.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1826" id="secsi-2011-bid0" type="book" rend="year" n="cite:CK-ios2011">
      <monogr>
        <title level="m">Formal Models and Techniques for Analyzing Security Protocols</title>
        <title level="s">Cryptology and Information Security Series</title>
        <editor role="editor">
          <persName key="cassis-2006-idm102849274320">
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </editor>
        <imprint>
          <biblScope type="volume">5</biblScope>
          <publisher>
            <orgName>IOS Press</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.iospress.nl/loadtop/load.php?isbn=9781607507130" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>iospress.
          <allowbreak/>nl/
          <allowbreak/>loadtop/
          <allowbreak/>load.
          <allowbreak/>php?isbn=9781607507130</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1843" id="secsi-2011-bid44" type="book" rend="year" n="cite:LPS-book11">
      <monogr x-editorial-board="no" x-international-audience="yes">
        <title level="m">Mathematical and Algorithmic Foundations of the Internet</title>
        <author>
          <persName>
            <foreName>Fabrizio</foreName>
            <surname>Luccio</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Linda</foreName>
            <surname>Pagli</surname>
            <initial>L.</initial>
          </persName>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName>CRC Press</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.amazon.co.uk/gp/product/toc/1439831386" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>amazon.
          <allowbreak/>co.
          <allowbreak/>uk/
          <allowbreak/>gp/
          <allowbreak/>product/
          <allowbreak/>toc/
          <allowbreak/>1439831386</ref>
        </imprint>
      </monogr>
      <affiliation>
        <country>IT</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="5366" id="secsi-2011-bid28" type="phdthesis" rend="year" n="cite:arnaud-phd">
      <monogr x-editorial-board="no" x-international-audience="no" x-proceedings="no">
        <title level="m">Formal Verification of Secured Routing Protocols</title>
        <author>
          <persName key="secsi-2008-idm216112251840">
            <foreName>Mathilde</foreName>
            <surname>Arnaud</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">ENS Cachan</orgName>
          </publisher>
          <dateStruct>
            <month>December</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/~arnaud/phd/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>~arnaud/
          <allowbreak/>phd/
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Ph. D. Thesis</note>
      <affiliation>
        <country>FR</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="5280" id="secsi-2011-bid2" type="phdthesis" rend="year" n="cite:ciobaca-phd">
      <monogr x-editorial-board="no" x-international-audience="no" x-proceedings="no">
        <title level="m">Automated Verification of Security Protocols with Applications to Electronic Voting</title>
        <author>
          <persName key="cassis-2009-idm311524300448">
            <foreName>Ştefan</foreName>
            <surname>Ciobâcă</surname>
            <initial>Ş.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">ENS Cachan</orgName>
          </publisher>
          <dateStruct>
            <month>December</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/~ciobaca/thesis" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>~ciobaca/
          <allowbreak/>thesis</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Ph. D. Thesis</note>
      <affiliation>
        <country>RO</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="2027" id="secsi-2011-bid25" type="hdrthesis" rend="year" n="cite:delaune-HDR11">
      <monogr>
        <title level="m">Verification of security protocols: from confidentiality to privacy</title>
        <author>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">École Normale Supérieure de Cachan, France</orgName>
          </publisher>
          <dateStruct>
            <month>March</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-SD.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>hdr-SD.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Mémoire d'habilitation</note>
    </biblStruct>
    <biblStruct dedoublkey="2015" id="secsi-2011-bid26" type="hdrthesis" rend="year" n="cite:kremer-HDR11">
      <monogr>
        <title level="m">Modelling and analyzing security protocols in cryptographic process calculi</title>
        <author>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">École Normale Supérieure de Cachan, France</orgName>
          </publisher>
          <dateStruct>
            <month>March</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-SK.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>hdr-SK.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Mémoire d'habilitation</note>
    </biblStruct>
    <biblStruct dedoublkey="2009" id="secsi-2011-bid27" type="hdrthesis" rend="year" n="cite:steel-HDR11">
      <monogr>
        <title level="m">Formal Analysis of Security APIs</title>
        <author>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">École Normale Supérieure de Cachan, France</orgName>
          </publisher>
          <dateStruct>
            <month>March</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/hdr-GS.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>hdr-GS.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Mémoire d'habilitation</note>
    </biblStruct>
    <biblStruct dedoublkey="0523" id="secsi-2011-bid45" type="article" rend="year" n="cite:springerlink:10.1007/s10207-011-0125-6">
      <identifiant type="doi" value="10.1007/s10207-011-0125-6"/>
      <analytic>
        <title level="a">Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos</title>
        <author>
          <persName>
            <foreName>Michael</foreName>
            <surname>Backes</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Iliano</foreName>
            <surname>Cervesato</surname>
            <initial>I.</initial>
          </persName>
          <persName>
            <foreName>Aaron</foreName>
            <surname>Jaggard</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Andre</foreName>
            <surname>Scedrov</surname>
            <initial>A.</initial>
          </persName>
          <persName key="secsi-2009-idm304595288624">
            <foreName>Joe-Kai</foreName>
            <surname>Tsay</surname>
            <initial>J.-K.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01012" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">1615-5262</idno>
        <title level="j">International Journal of Information Security</title>
        <imprint>
          <biblScope type="volume">10</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">107-134</biblScope>
          <ref xlink:href="http://dx.doi.org/10.1007/s10207-011-0125-6" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>dx.
          <allowbreak/>doi.
          <allowbreak/>org/
          <allowbreak/>10.
          <allowbreak/>1007/
          <allowbreak/>s10207-011-0125-6</ref>
        </imprint>
      </monogr>
      <note type="bnote">10.1007/s10207-011-0125-6</note>
      <affiliation>
        <country>DE</country>
        <country>QA</country>
        <country>US</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="1306" id="secsi-2011-bid33" type="article" rend="year" n="cite:CSV-lmcs11">
      <identifiant type="doi" value="10.2168/LMCS-7(3:22)2011"/>
      <analytic>
        <title level="a">Power of Randomization in Automata on Infinite Strings</title>
        <author>
          <persName key="secsi-2009-idm304595291680">
            <foreName>Rohit</foreName>
            <surname>Chadha</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>A. Prasad</foreName>
            <surname>Sistla</surname>
            <initial>A. P.</initial>
          </persName>
          <persName>
            <foreName>Mahesh</foreName>
            <surname>Viswanathan</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01452" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">1860-5974</idno>
        <title level="j">Logical Methods in Computer Science</title>
        <imprint>
          <biblScope type="volume">7</biblScope>
          <biblScope type="number">3:22</biblScope>
          <dateStruct>
            <month>September</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CSV-lmcs11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>CSV-lmcs11.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <affiliation>
        <country>US</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="0455" subtype="nonparu" id="secsi-2011-bid32" type="article" rend="year" n="cite:CDK-jar10">
      <identifiant type="doi" value="10.1007/s10817-010-9197-7"/>
      <analytic>
        <title level="a">Computing knowledge in security protocols under convergent equational theories</title>
        <author>
          <persName key="cassis-2009-idm311524300448">
            <foreName>Ştefan</foreName>
            <surname>Ciobâcă</surname>
            <initial>Ş.</initial>
          </persName>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01145" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0168-7433</idno>
        <title level="j">Journal of Automated Reasoning</title>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDK-jar10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>CDK-jar10.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="bnote">To appear</note>
    </biblStruct>
    <biblStruct dedoublkey="2109" id="secsi-2011-bid37" type="incollection" rend="year" n="cite:CDM-fmtasp11">
      <analytic>
        <title level="a">Constraint solving techniques and enriching the model with equational theories</title>
        <author>
          <persName key="secsi-2006-idm508572685104">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Jonathan</foreName>
            <surname>Millen</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName key="cassis-2006-idm102849274320">
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </editor>
        <title level="m">Formal Models and Techniques for Analyzing Security Protocols</title>
        <title level="s">Cryptology and Information Security Series</title>
        <imprint>
          <biblScope type="volume">5</biblScope>
          <publisher>
            <orgName>IOS Press</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">35-61</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDM-fmtasp11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>CDM-fmtasp11.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <affiliation>
        <country>US</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="0533" subtype="nonparu" id="secsi-2011-bid30" type="article" rend="year" n="cite:CD-jar10">
      <identifiant type="doi" value="10.1007/s10817-010-9208-8"/>
      <analytic>
        <title level="a">Decidability and combination results for two notions of knowledge in security protocols</title>
        <author>
          <persName key="cassis-2006-idm102849274320">
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01145" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0168-7433</idno>
        <title level="j">Journal of Automated Reasoning</title>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CD-jar10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>CD-jar10.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="bnote">To appear</note>
    </biblStruct>
    <biblStruct dedoublkey="0298" id="secsi-2011-bid50" type="article" rend="year" n="cite:CKW-jar2010">
      <identifiant type="doi" value="10.1007/s10817-010-9187-9"/>
      <analytic>
        <title level="a">A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems</title>
        <author>
          <persName key="cassis-2006-idm102849274320">
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName key="cassis-2006-idm102849242640">
            <foreName>Bogdan</foreName>
            <surname>Warinschi</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01145" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0168-7433</idno>
        <title level="j">Journal of Automated Reasoning</title>
        <imprint>
          <biblScope type="volume">46</biblScope>
          <biblScope type="number">3-4</biblScope>
          <dateStruct>
            <month>April</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">225-259</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CKW-jar10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>CKW-jar10.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <affiliation>
        <country>GB</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="2081" id="secsi-2011-bid36" type="incollection" rend="year" n="cite:FLS-fosad11">
      <identifiant type="doi" value="10.1007/978-3-642-23082-0_2"/>
      <analytic>
        <title level="a">An Introduction to Security API Analysis</title>
        <author>
          <persName>
            <foreName>Riccardo</foreName>
            <surname>Focardi</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Flaminia L.</foreName>
            <surname>Luccio</surname>
            <initial>F. L.</initial>
          </persName>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Alessandro</foreName>
            <surname>Aldini</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Roberto</foreName>
            <surname>Gorrieri</surname>
            <initial>R.</initial>
          </persName>
        </editor>
        <title level="m">Foundations of Security Analysis and Design – FOSAD Tutorial Lectures (FOSAD'VI)</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">6858</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">35-65</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/FLS-fosad11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>FLS-fosad11.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <affiliation>
        <country>IT</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="1084" id="secsi-2011-bid42" type="article" rend="year" n="cite:JGL-jyg10">
      <identifiant type="doi" value="10.1016/j.tcs.2010.12.023"/>
      <analytic>
        <title level="a">Musings Around the Geometry of Interaction, and Coherence</title>
        <author>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01946" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0304-3975</idno>
        <title level="j">Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">412</biblScope>
          <biblScope type="number">20</biblScope>
          <dateStruct>
            <month>April</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">1998-2014</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jgl-jyg10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>jgl-jyg10.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="0404" id="secsi-2011-bid20" type="article" rend="year" n="cite:GLK-mscs10">
      <identifiant type="doi" value="10.1017/S0960129510000617"/>
      <analytic>
        <title level="a">Choquet-Kendall-Matheron Theorems for Non-Hausdorff Spaces</title>
        <author>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Klaus</foreName>
            <surname>Keimel</surname>
            <initial>K.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01486" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0960-1295</idno>
        <title level="j">Mathematical Structures in Computer Science</title>
        <imprint>
          <biblScope type="volume">21</biblScope>
          <biblScope type="number">3</biblScope>
          <dateStruct>
            <month>June</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">511-561</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GLK-mscs10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>GLK-mscs10.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <affiliation>
        <country>DE</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="1406" id="secsi-2011-bid29" type="article" rend="year" n="cite:JKV-icomp10">
      <identifiant type="doi" value="10.1016/j.ic.2010.11.015"/>
      <analytic>
        <title level="a">Rigid Tree Automata</title>
        <author>
          <persName key="secsi-2006-idm508572697760">
            <foreName>Florent</foreName>
            <surname>Jacquemard</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Francis</foreName>
            <surname>Klay</surname>
            <initial>F.</initial>
          </persName>
          <persName key="secsi-2007-idm453291728048">
            <foreName>Camille</foreName>
            <surname>Vacher</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid00905" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0890-5401</idno>
        <title level="j">Information and Computation</title>
        <imprint>
          <biblScope type="volume">209</biblScope>
          <biblScope type="number">3</biblScope>
          <dateStruct>
            <month>March</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">486-512</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JKV-icomp11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>JKV-icomp11.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="1373" subtype="nonparu" id="secsi-2011-bid31" type="article" rend="year" n="cite:KMT-jar10">
      <analytic>
        <title level="a">Reducing Equational Theories for the Decision of Static Equivalence</title>
        <author>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2006-idm508572658400">
            <foreName>Antoine</foreName>
            <surname>Mercier</surname>
            <initial>A.</initial>
          </persName>
          <persName key="secsi-2006-idm508572691824">
            <foreName>Ralf</foreName>
            <surname>Treinen</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01145" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0168-7433</idno>
        <title level="j">Journal of Automated Reasoning</title>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KMT-jar10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>KMT-jar10.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="bnote">To appear</note>
    </biblStruct>
    <biblStruct dedoublkey="2134" id="secsi-2011-bid43" type="incollection" rend="year" n="cite:steel-crypt2011">
      <analytic>
        <title level="a">Formal Analysis of Security APIs</title>
        <author>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Henk C. A.</foreName>
            <surname>van Tilborg</surname>
            <initial>H. C. A.</initial>
          </persName>
          <persName>
            <foreName>Sushil</foreName>
            <surname>Jajodia</surname>
            <initial>S.</initial>
          </persName>
        </editor>
        <title level="m">Encyclopedia of Cryptography and Security</title>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">492-494</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2990" id="secsi-2011-bid39" type="inproceedings" rend="year" n="cite:ACGP-rsa11">
      <identifiant type="doi" value="10.1007/978-3-642-19074-2_11"/>
      <analytic>
        <title level="a">Contributory Password-Authenticated Group Key Exchange with Join Capability</title>
        <author>
          <persName key="cascade-2008-idm9324696672">
            <foreName>Michel</foreName>
            <surname>Abdalla</surname>
            <initial>M.</initial>
          </persName>
          <persName key="cascade-2008-idm9324667248">
            <foreName>Céline</foreName>
            <surname>Chevalier</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Louis</foreName>
            <surname>Granboulan</surname>
            <initial>L.</initial>
          </persName>
          <persName key="cascade-2008-idm9324683648">
            <foreName>David</foreName>
            <surname>Pointcheval</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Aggelos</foreName>
            <surname>Kiayias</surname>
            <initial>A.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the Cryptographers' Track at the RSA Conference 2011 (CT-RSA'11)</title>
        <loc>San Francisco, CA, USA</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">6558</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>February</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">142-160</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACGP-rsa11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>ACGP-rsa11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid57265">
          <title>Cryptographers' Track at the RSA Conference</title>
          <num>2011</num>
          <abbr type="sigle">CT-RSA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3053" id="secsi-2011-bid11" type="inproceedings" rend="year" n="cite:ACD-cade11">
      <identifiant type="doi" value="10.1007/978-3-642-22438-6_6"/>
      <analytic>
        <title level="a">Deciding security for protocols with recursive tests</title>
        <author>
          <persName key="secsi-2008-idm216112251840">
            <foreName>Mathilde</foreName>
            <surname>Arnaud</surname>
            <initial>M.</initial>
          </persName>
          <persName key="cassis-2006-idm102849274320">
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Nikolaj</foreName>
            <surname>Bjørner</surname>
            <initial>N.</initial>
          </persName>
          <persName>
            <foreName>Viorica</foreName>
            <surname>Sofronie-Stokkermans</surname>
            <initial>V.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 23rd International Conference on Automated Deduction (CADE'11)</title>
        <loc>Wrocław, Poland</loc>
        <title level="s">Lecture Notes in Artificial Intelligence</title>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">49-63</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/ACD-cade11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>ACD-cade11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid112188">
          <title>International Conference on Automated Deduction</title>
          <num>23</num>
          <abbr type="sigle">CADE</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3755" id="secsi-2011-bid14" type="inproceedings" rend="year" n="cite:benzina-iccans11">
      <analytic>
        <title level="a">Logic in Virtualized Systems</title>
        <author>
          <persName key="secsi-2008-idm216112230192">
            <foreName>Hedi</foreName>
            <surname>Benzina</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="no">
        <title level="m">Proceedings of the International Conference on Computer Applications and Network Security (ICCANS'11)</title>
        <loc>Republic of Maldives</loc>
        <imprint>
          <dateStruct>
            <month>May</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/benzina-iccans11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>benzina-iccans11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid393887">
          <title>International Conference on Computer Applications and Network Security</title>
          <num>2011</num>
          <abbr type="sigle">ICCANS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="4574" id="secsi-2011-bid47" type="inproceedings" rend="year" n="cite:bgl-setop10">
      <analytic>
        <title level="a">Some Ideas on Virtualized Systems Security, and Monitors</title>
        <author>
          <persName key="secsi-2008-idm216112230192">
            <foreName>Hedi</foreName>
            <surname>Benzina</surname>
            <initial>H.</initial>
          </persName>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Ana</foreName>
            <surname>Cavalli</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Jean</foreName>
            <surname>Leneutre</surname>
            <initial>J.</initial>
          </persName>
        </editor>
        <title level="m">Revised Selected Papers of the 5th International Workshop on Data Privacy Management and Autonomous Spontaneous Security (DPM'10) and 3rd International Workshop on Autonomous
        and Spontaneous Security (SETOP'10)</title>
        <loc>Athens, Greece</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">6514</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">244-258</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/bgl-setop10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>bgl-setop10.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid541108">
          <title>International Workshop on Data Privacy Management and Autonomous Spontaneous Security and International Workshop on Autonomous and Spontaneous Security</title>
          <num>2011</num>
          <abbr type="sigle">DPM/SETOP</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2400" subtype="nonparu" id="secsi-2011-bid48" type="inproceedings" rend="year" n="cite:BGGLP-scan10">
      <analytic>
        <title level="a">A Generalization of P-boxes to Affine Arithmetic, and Applications to Static Analysis of Programs</title>
        <author>
          <persName>
            <foreName>Olivier</foreName>
            <surname>Bouissou</surname>
            <initial>O.</initial>
          </persName>
          <persName>
            <foreName>Éric</foreName>
            <surname>Goubault</surname>
            <initial>É.</initial>
          </persName>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Sylvie</foreName>
            <surname>Putot</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="no">
        <title level="m">Proceedings of the 14th GAMM-IMACS International Symposium on Scientific Computing, Computer Arithmetic and Validated Numerics (SCAN'10)</title>
        <loc>Lyon, France</loc>
        <imprint>
          <dateStruct>
            <month>September</month>
            <year>2011</year>
          </dateStruct>
        </imprint>
        <meeting id="cid73487">
          <title>GAMM - IMACS International Symposium on Scientific Computing, Computer Arithmetic, and Validated Numerics</title>
          <num>14</num>
          <abbr type="sigle">SCAN</abbr>
        </meeting>
      </monogr>
      <note type="bnote">To appear</note>
    </biblStruct>
    <biblStruct dedoublkey="3843" subtype="nonparu" id="secsi-2011-bid17" type="inproceedings" rend="year" n="cite:CKVAK-qest11">
      <analytic>
        <title level="a">Model Checking MDPs with a Unique Compact Invariant Set of Distributions</title>
        <author>
          <persName key="secsi-2009-idm304595291680">
            <foreName>Rohit</foreName>
            <surname>Chadha</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Vijay</foreName>
            <surname>Korthikranthi</surname>
            <initial>V.</initial>
          </persName>
          <persName>
            <foreName>Mahesh</foreName>
            <surname>Viswanathan</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Gul</foreName>
            <surname>Agha</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Youngmin</foreName>
            <surname>Kwon</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of the 8th International Conference on Quantitative Evaluation of Systems (QEST'11)</title>
        <loc>Aachen, Germany</loc>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society Press</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CKVAK-qest11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>CKVAK-qest11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid297847">
          <title>International Conference on Quantitative Evaluation of Systems</title>
          <num>8</num>
          <abbr type="sigle">QEST</abbr>
        </meeting>
      </monogr>
      <note type="bnote">To appear</note>
      <affiliation>
        <country>US</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="3842" id="secsi-2011-bid46" type="inproceedings" rend="year" n="cite:CSV-fsttcs10">
      <analytic>
        <title level="a">Model Checking Concurrent Programs with Nondeterminism and Randomization</title>
        <author>
          <persName key="secsi-2009-idm304595291680">
            <foreName>Rohit</foreName>
            <surname>Chadha</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>A. Prasad</foreName>
            <surname>Sistla</surname>
            <initial>A. P.</initial>
          </persName>
          <persName>
            <foreName>Mahesh</foreName>
            <surname>Viswanathan</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Kamal</foreName>
            <surname>Lodaya</surname>
            <initial>K.</initial>
          </persName>
          <persName>
            <foreName>Meena</foreName>
            <surname>Mahajan</surname>
            <initial>M.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10)</title>
        <loc>Chennai, India</loc>
        <title level="s">Leibniz International Proceedings in Informatics</title>
        <imprint>
          <biblScope type="volume">8</biblScope>
          <publisher>
            <orgName>Leibniz-Zentrum für Informatik</orgName>
          </publisher>
          <dateStruct>
            <month>December</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">364-375</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CSV-fsttcs10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>CSV-fsttcs10.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid47524">
          <title>Conference on Foundations of Software Technology and Theoretical Computer Science</title>
          <num>30</num>
          <abbr type="sigle">FSTTCS</abbr>
        </meeting>
      </monogr>
      <affiliation>
        <country>US</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="4257" id="secsi-2011-bid16" type="inproceedings" rend="year" n="cite:CSV-vmcai11">
      <identifiant type="doi" value="10.1007/978-3-642-18275-4_9ç"/>
      <analytic>
        <title level="a">Probabilistic Büchi Automata with non-extremal acceptance thresholds</title>
        <author>
          <persName key="secsi-2009-idm304595291680">
            <foreName>Rohit</foreName>
            <surname>Chadha</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>A. Prasad</foreName>
            <surname>Sistla</surname>
            <initial>A. P.</initial>
          </persName>
          <persName>
            <foreName>Mahesh</foreName>
            <surname>Viswanathan</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Ranjit</foreName>
            <surname>Jhala</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>David</foreName>
            <surname>Schmidt</surname>
            <initial>D.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 12th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'11)</title>
        <loc>Austin, TX, USA</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">6538</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>January</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">103-117</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CSV-vmcai11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>CSV-vmcai11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid303616">
          <title>International Conference on Verification, Model Checking, and Abstract Interpretation</title>
          <num>12</num>
          <abbr type="sigle">VMCAI</abbr>
        </meeting>
      </monogr>
      <affiliation>
        <country>US</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="4838" subtype="nonparu" id="secsi-2011-bid7" type="inproceedings" rend="year" n="cite:CCD-ccs11">
      <analytic>
        <title level="a">Trace Equivalence Decision: Negative Tests and Non-determinism</title>
        <author>
          <persName key="alice-2007-idm354919509200">
            <foreName>Vincent</foreName>
            <surname>Cheval</surname>
            <initial>V.</initial>
          </persName>
          <persName key="secsi-2006-idm508572685104">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11)</title>
        <loc>Chicago, Illinois, USA</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CCD-ccs11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>CCD-ccs11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid18256">
          <title>ACM Conference on Computer and Communications Security</title>
          <num>18</num>
          <abbr type="sigle">CCS</abbr>
        </meeting>
      </monogr>
      <note type="bnote">To appear</note>
    </biblStruct>
    <biblStruct dedoublkey="4851" subtype="nonparu" id="secsi-2011-bid13" type="inproceedings" rend="year" n="cite:CDK-fsttcs11">
      <analytic>
        <title level="a">Transforming Password Protocols to Compose</title>
        <author>
          <persName key="cascade-2008-idm9324667248">
            <foreName>Céline</foreName>
            <surname>Chevalier</surname>
            <initial>C.</initial>
          </persName>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Supratik</foreName>
            <surname>Chakraborty</surname>
            <initial>S.</initial>
          </persName>
          <persName key="cairn-2009-idm287156296464">
            <foreName>Amit</foreName>
            <surname>Kumar</surname>
            <initial>A.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 31st Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'11)</title>
        <loc>Mumbai, India</loc>
        <title level="s">Leibniz International Proceedings in Informatics</title>
        <imprint>
          <publisher>
            <orgName>Leibniz-Zentrum für Informatik</orgName>
          </publisher>
          <dateStruct>
            <month>December</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDK-fsttcs11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>CDK-fsttcs11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid47524">
          <title>Conference on Foundations of Software Technology and Theoretical Computer Science</title>
          <num>31</num>
          <abbr type="sigle">FSTTCS</abbr>
        </meeting>
      </monogr>
      <note type="bnote">To appear</note>
    </biblStruct>
    <biblStruct dedoublkey="2950" subtype="nonparu" id="secsi-2011-bid4" type="inproceedings" rend="year" n="cite:SC-unif11">
      <analytic>
        <title level="a">Computing finite variants for subterm convergent rewrite systems</title>
        <author>
          <persName key="cassis-2009-idm311524300448">
            <foreName>Ştefan</foreName>
            <surname>Ciobâcă</surname>
            <initial>Ş.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Franz</foreName>
            <surname>Baader</surname>
            <initial>F.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 25th International Workshop on Unification (UNIF'11)</title>
        <loc>Wrocław, Poland</loc>
        <imprint>
          <dateStruct>
            <month>July</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/SC-unif11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>SC-unif11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid337154">
          <title>International Workshop on Unification</title>
          <num>25</num>
          <abbr type="sigle">UNIF</abbr>
        </meeting>
      </monogr>
      <note type="bnote">To appear</note>
    </biblStruct>
    <biblStruct dedoublkey="3526" id="secsi-2011-bid15" type="inproceedings" rend="year" n="cite:CLC-stacs11">
      <identifiant type="doi" value="10.4230/LIPIcs.STACS.2011.29"/>
      <analytic>
        <title level="a">How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones</title>
        <author>
          <persName key="secsi-2006-idm508572685104">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName key="cassis-2006-idm102849274320">
            <foreName>Véronique</foreName>
            <surname>Cortier</surname>
            <initial>V.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Christoph</foreName>
            <surname>Dürr</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Thomas</foreName>
            <surname>Schwentick</surname>
            <initial>T.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 28th Annual Symposium on Theoretical Aspects of Computer Science (STACS'11)</title>
        <loc>Dortmund, Germany</loc>
        <title level="s">Leibniz International Proceedings in Informatics</title>
        <imprint>
          <biblScope type="volume">9</biblScope>
          <publisher>
            <orgName>Leibniz-Zentrum für Informatik</orgName>
          </publisher>
          <dateStruct>
            <month>March</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">29-44</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CLC-stacs11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>CLC-stacs11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid318933">
          <title>International Symposium on Theoretical Aspects of Computer Science</title>
          <num>28</num>
          <abbr type="sigle">STACS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3371" subtype="nonparu" id="secsi-2011-bid12" type="inproceedings" rend="year" n="cite:DDS-tosca11">
      <analytic>
        <title level="a">Formal Analysis of Privacy for Anonymous Location Based Services</title>
        <author>
          <persName key="secsi-2009-idm304595257824">
            <foreName>Morten</foreName>
            <surname>Dahl</surname>
            <initial>M.</initial>
          </persName>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of the Workshop on Theory of Security and Applications (TOSCA'11)</title>
        <loc>Saarbrücken, Germany</loc>
        <imprint>
          <dateStruct>
            <month>March-April</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DDS-tosca11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>DDS-tosca11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid362118">
          <title>Theory of Security and Applications</title>
          <num>1</num>
          <abbr type="sigle">TOSCA</abbr>
        </meeting>
      </monogr>
      <note type="bnote">To appear</note>
    </biblStruct>
    <biblStruct dedoublkey="2387" id="secsi-2011-bid49" type="inproceedings" rend="year" n="cite:DKRS-fast10">
      <analytic>
        <title level="a">A Formal Analysis of Authentication in the TPM</title>
        <author>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2007-idm453291724240">
            <foreName>Mark D.</foreName>
            <surname>Ryan</surname>
            <initial>M. D.</initial>
          </persName>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Pierpaolo</foreName>
            <surname>Degano</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Sandro</foreName>
            <surname>Etalle</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Joshua</foreName>
            <surname>Guttman</surname>
            <initial>J.</initial>
          </persName>
        </editor>
        <title level="m">Revised Selected Papers of the 7th International Workshop on Formal Aspects in Security and Trust (FAST'10)</title>
        <loc>Pisa, Italy</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">6561</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">111-125</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKRS-fast10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>DKRS-fast10.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid325761">
          <title>International Workshop on Formal Aspects in Security and Trust</title>
          <num>8</num>
          <abbr type="sigle">FAST</abbr>
        </meeting>
      </monogr>
      <affiliation>
        <country>GB</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="3372" id="secsi-2011-bid9" type="inproceedings" rend="year" n="cite:DKRS-csf11">
      <identifiant type="doi" value="10.1109/CSF.2011.12"/>
      <analytic>
        <title level="a">Formal analysis of protocols based on TPM state registers</title>
        <author>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2007-idm453291724240">
            <foreName>Mark D.</foreName>
            <surname>Ryan</surname>
            <initial>M. D.</initial>
          </persName>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11)</title>
        <loc>Cernay-la-Ville, France</loc>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society Press</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">66-82</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKRS-csf11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>DKRS-csf11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid77878">
          <title>IEEE Computer Security Foundation Symposium</title>
          <num>24</num>
          <abbr type="sigle">CSF</abbr>
        </meeting>
      </monogr>
      <affiliation>
        <country>GB</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="2983" id="secsi-2011-bid18" type="inproceedings" rend="year" n="cite:GLV-lics2011">
      <identifiant type="doi" value="10.1109/LICS.2011.23"/>
      <analytic>
        <title level="a">Continuous Random Variables</title>
        <author>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Daniele</foreName>
            <surname>Varacca</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of the 26th Annual IEEE Symposium on Logic in Computer Science (LICS'11)</title>
        <loc>Toronto, Canada</loc>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society Press</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">97-106</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/GLV-lics2011.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>GLV-lics2011.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid31229">
          <title>Annual IEEE Symposium on Logic in Computer Science</title>
          <num>26</num>
          <abbr type="sigle">LICS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="2798" id="secsi-2011-bid8" type="inproceedings" rend="year" n="cite:ILV:blockwise">
      <analytic>
        <title level="a">Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes</title>
        <author>
          <persName key="cascade-2008-idm9324655072">
            <foreName>Malika</foreName>
            <surname>Izabachène</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Benoııt</foreName>
            <surname>Libert</surname>
            <initial>B.</initial>
          </persName>
          <persName key="cascade-2008-idm9324676768">
            <foreName>Damien</foreName>
            <surname>Vergnaud</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName key="abstraction-2007-idm495957176608">
            <foreName>Liqun</foreName>
            <surname>Chen</surname>
            <initial>L.</initial>
          </persName>
        </editor>
        <title level="m">Proc. 13th IMA International Conference on Cryptography and Coding (IMACC'11)</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">7089</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
        </imprint>
        <meeting id="cid102474">
          <title>IMA International Conference on Cryptography and Coding</title>
          <num>13</num>
          <abbr type="sigle">IMACC</abbr>
        </meeting>
      </monogr>
      <affiliation>
        <country>BE</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="4479" id="secsi-2011-bid10" type="inproceedings" rend="year" n="cite:KSW-csf11">
      <identifiant type="doi" value="10.1109/CSF.2011.25"/>
      <analytic>
        <title level="a">Security for Key Management Interfaces</title>
        <author>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
          <persName key="cassis-2006-idm102849242640">
            <foreName>Bogdan</foreName>
            <surname>Warinschi</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of the 24th IEEE Computer Security Foundations Symposium (CSF'11)</title>
        <loc>Cernay-la-Ville, France</loc>
        <imprint>
          <publisher>
            <orgName>IEEE Computer Society Press</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">266-280</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/KSW-csf11.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>KSW-csf11.
          <allowbreak/>pdf</ref>
        </imprint>
        <meeting id="cid77878">
          <title>IEEE Computer Security Foundation Symposium</title>
          <num>24</num>
          <abbr type="sigle">CSF</abbr>
        </meeting>
      </monogr>
      <affiliation>
        <country>GB</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="5660" id="secsi-2011-bid24" type="techreport" rend="year" n="cite:CHADHA:2011:INRIA-00632564:1">
      <identifiant type="hal" value="inria-00632564"/>
      <monogr>
        <title level="m">Automated verification of equivalence properties of cryptographic protocols</title>
        <author>
          <persName key="secsi-2009-idm304595291680">
            <foreName>Rohit</foreName>
            <surname>Chadha</surname>
            <initial>R.</initial>
          </persName>
          <persName key="cassis-2009-idm311524300448">
            <foreName>Ştefan</foreName>
            <surname>Ciobâcă</surname>
            <initial>Ş.</initial>
          </persName>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>October</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/inria-00632564/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>hal.
          <allowbreak/>inria.
          <allowbreak/>fr/
          <allowbreak/>inria-00632564/
          <allowbreak/>en/
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="typdoc">Technical report</note>
    </biblStruct>
    <biblStruct dedoublkey="5073" id="secsi-2011-bid35" type="mastersthesis" rend="year" n="cite:degriek-master">
      <monogr>
        <title level="m">Réduction de graphes pour l'analyse de protocoles de routage sécurisés</title>
        <author>
          <persName key="carte-2010-idm457193410576">
            <foreName>Jan</foreName>
            <surname>Degrieck</surname>
            <initial>J.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">Master Parisien de Recherche en Informatique, Paris, France</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/jd11-m2.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>jd11-m2.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Rapport de Master</note>
    </biblStruct>
    <biblStruct dedoublkey="5089" id="secsi-2011-bid41" type="misc" rend="year" n="cite:avote-D22">
      <monogr>
        <title level="m">Algorithms for observational equivalence</title>
        <author>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>January</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/avote-d22.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>avote-d22.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="howpublished">Deliverable AVOTE 2.2, (ANR-07-SESU-002)</note>
      <note type="bnote">118 pages</note>
    </biblStruct>
    <biblStruct dedoublkey="5205" id="secsi-2011-bid40" type="misc" rend="year" n="cite:avote-D42">
      <monogr>
        <title level="m">Results on case studies from literature</title>
        <author>
          <persName key="secsi-2006-idm508572694480">
            <foreName>Steve</foreName>
            <surname>Kremer</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>January</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/avote-d4-2.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>avote-d4-2.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="howpublished">Deliverable AVOTE 4.2, (ANR-07-SESU-002)</note>
      <note type="bnote">96 pages</note>
    </biblStruct>
    <biblStruct dedoublkey="5185" id="secsi-2011-bid38" type="misc" rend="year" n="cite:orchids-v1.0">
      <monogr>
        <title level="m">ORCHIDS</title>
        <author>
          <persName>
            <foreName>Julien</foreName>
            <surname>Olivain</surname>
            <initial>J.</initial>
          </persName>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
          <persName key="secsi-2008-idm216112230192">
            <foreName>Hedi</foreName>
            <surname>Benzina</surname>
            <initial>H.</initial>
          </persName>
          <persName key="secsi-2010-idm192214056640">
            <foreName>Baptiste</foreName>
            <surname>Gourdin</surname>
            <initial>B.</initial>
          </persName>
          <persName>
            <foreName>Romdhane</foreName>
            <surname>Ben Younès</surname>
            <initial>R.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Software/orchids/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Software/
          <allowbreak/>orchids/
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <affiliation>
        <country>CA</country>
      </affiliation>
    </biblStruct>
    <biblStruct dedoublkey="5077" id="secsi-2011-bid34" type="mastersthesis" rend="year" n="cite:pasaila-master">
      <monogr>
        <title level="m">Verifying equivalence properties of security protocols</title>
        <author>
          <persName>
            <foreName>Daniel</foreName>
            <surname>Pasailă</surname>
            <initial>D.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">Master Parisien de Recherche en Informatique, Paris, France</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2011</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/dp11-m2.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>dp11-m2.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Rapport de Master</note>
    </biblStruct>
    <biblStruct id="secsi-2011-bid5" type="inproceedings" rend="foot" n="footcite:AF:appliedpi">
      <analytic>
        <title level="a">Mobile Values, New Names, and Secure Communication</title>
        <author>
          <persName>
            <foreName>Martín</foreName>
            <surname>Abadi</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Cédric</foreName>
            <surname>Fournet</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proc. 28th ACM Symposium on Principles of Programming Languages (POPL'01)</title>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <year>2001</year>
          </dateStruct>
          <biblScope type="pages">104–15</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid6" type="inproceedings" rend="foot" n="footcite:baudet-ccs2005">
      <identifiant type="doi" value="10.1145/1102125"/>
      <analytic>
        <title level="a">Deciding Security of Protocols against Off-line Guessing Attacks</title>
        <author>
          <persName key="secsi-2006-idm508572678128">
            <foreName>Mathieu</foreName>
            <surname>Baudet</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05)</title>
        <loc>Alexandria, Virginia, USA</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <month>November</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">16-25</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/Baudet_CCS05revised.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>Baudet_CCS05revised.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid1" type="inproceedings" rend="foot" n="footcite:BCFS-ccs10">
      <identifiant type="doi" value="10.1145/1866307.1866337"/>
      <analytic>
        <title level="a">Attacking and Fixing PKCS#11 Security Tokens</title>
        <author>
          <persName>
            <foreName>Matteo</foreName>
            <surname>Bortolozzo</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Matteo</foreName>
            <surname>Centenaro</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Riccardo</foreName>
            <surname>Focardi</surname>
            <initial>R.</initial>
          </persName>
          <persName key="secsi-2007-idm453291718128">
            <foreName>Graham</foreName>
            <surname>Steel</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10)</title>
        <loc>Chicago, Illinois, USA</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">260-269</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/BCFS-ccs10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>BCFS-ccs10.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid23" type="article" rend="foot" n="footcite:CSV-jacm09">
      <identifiant type="doi" value="10.1145/1552285.1552287"/>
      <analytic>
        <title level="a">On the expressiveness and complexity of randomization in finite state monitors</title>
        <author>
          <persName key="secsi-2009-idm304595291680">
            <foreName>Rohit</foreName>
            <surname>Chadha</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>A. Prasad</foreName>
            <surname>Sistla</surname>
            <initial>A. P.</initial>
          </persName>
          <persName>
            <foreName>Mahesh</foreName>
            <surname>Viswanathan</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal of the ACM</title>
        <imprint>
          <biblScope type="volume">56</biblScope>
          <biblScope type="number">5</biblScope>
          <dateStruct>
            <month>August</month>
            <year>2009</year>
          </dateStruct>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CSV-jacm09.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>CSV-jacm09.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid22" type="inproceedings" rend="foot" n="footcite:CSV-fsttcs10">
      <identifiant type="doi" value="10.4230/LIPIcs.FSTTCS.2010.364"/>
      <analytic>
        <title level="a">Model Checking Concurrent Programs with Nondeterminism and Randomization</title>
        <author>
          <persName key="secsi-2009-idm304595291680">
            <foreName>Rohit</foreName>
            <surname>Chadha</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>A. Prasad</foreName>
            <surname>Sistla</surname>
            <initial>A. P.</initial>
          </persName>
          <persName>
            <foreName>Mahesh</foreName>
            <surname>Viswanathan</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Kamal</foreName>
            <surname>Lodaya</surname>
            <initial>K.</initial>
          </persName>
          <persName>
            <foreName>Meena</foreName>
            <surname>Mahajan</surname>
            <initial>M.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 30th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'10)</title>
        <loc>Chennai, India</loc>
        <title level="s">Leibniz International Proceedings in Informatics</title>
        <imprint>
          <biblScope type="volume">8</biblScope>
          <publisher>
            <orgName>Leibniz-Zentrum für Informatik</orgName>
          </publisher>
          <dateStruct>
            <month>December</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">364-375</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CSV-fsttcs10.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>CSV-fsttcs10.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid3" type="inproceedings" rend="foot" n="footcite:ComDel-rta2005">
      <analytic>
        <title level="a">The finite variant property: How to get rid of some algebraic properties</title>
        <author>
          <persName key="secsi-2006-idm508572685104">
            <foreName>Hubert</foreName>
            <surname>Comon-Lundh</surname>
            <initial>H.</initial>
          </persName>
          <persName key="secsi-2006-idm508572664768">
            <foreName>Stéphanie</foreName>
            <surname>Delaune</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Jürgen</foreName>
            <surname>Giesl</surname>
            <initial>J.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05)</title>
        <loc>Nara, Japan</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3467</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>April</month>
            <year>2005</year>
          </dateStruct>
          <biblScope type="pages">294-307</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/rta05-CD.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>rta05-CD.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid19" type="inproceedings" rend="foot" n="footcite:JGL-icalp07">
      <identifiant type="doi" value="10.1007/978-3-540-73420-8_66"/>
      <analytic>
        <title level="a">Continuous Capacities on Continuous State Spaces</title>
        <author>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Lars</foreName>
            <surname>Arge</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Christian</foreName>
            <surname>Cachin</surname>
            <initial>Ch.</initial>
          </persName>
          <persName>
            <foreName>Tomasz</foreName>
            <surname>Jurdziński</surname>
            <initial>T.</initial>
          </persName>
          <persName>
            <foreName>Andrzej</foreName>
            <surname>Tarlecki</surname>
            <initial>A.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 34th International Colloquium on Automata, Languages and Programming (ICALP'07)</title>
        <loc>Wrocław, Poland</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">4596</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2007</year>
          </dateStruct>
          <biblScope type="pages">764-776</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-icalp07.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>JGL-icalp07.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="secsi-2011-bid21" type="inproceedings" rend="foot" n="footcite:Gou-csl07">
      <identifiant type="doi" value="10.1007/978-3-540-74915-8_40"/>
      <analytic>
        <title level="a">Continuous Previsions</title>
        <author>
          <persName key="secsi-2006-idm508572701520">
            <foreName>Jean</foreName>
            <surname>Goubault-Larrecq</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Jacques</foreName>
            <surname>Duparc</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Thomas A.</foreName>
            <surname>Henzinger</surname>
            <initial>T. A.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 16th Annual EACSL Conference on Computer Science Logic (CSL'07)</title>
        <loc>Lausanne, Switzerland</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">4646</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2007</year>
          </dateStruct>
          <biblScope type="pages">542-557</biblScope>
          <ref xlink:href="http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/JGL-csl07.pdf" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://
          <allowbreak/>www.
          <allowbreak/>lsv.
          <allowbreak/>ens-cachan.
          <allowbreak/>fr/
          <allowbreak/>Publis/
          <allowbreak/>PAPERS/
          <allowbreak/>PDF/
          <allowbreak/>
          <allowbreak/>JGL-csl07.
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
  </biblio>
</raweb>
