Members
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
  • 1M. Abadi, V. Cortier.
    Deciding knowledge in security protocols under equational theories, in: Theoretical Computer Science, November 2006, vol. 387, no 1-2, pp. 2-32.
  • 2A. Armando, W. Arsac, T. Avanesov, M. Barletta, A. Calvi, A. Cappai, R. Carbone, Y. Chevalier, L. Compagna, J. Cuéllar, G. Erzse, S. Frau, M. Minea, S. Mödersheim, D. von Oheimb, G. Pellegrino, S. E. Ponta, M. Rocchetto, M. Rusinowitch, M. T. Dashti, M. Turuani, L. Viganò.
    The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures, in: Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings, Lecture Notes in Computer Science, Springer, 2012, vol. 7214, pp. 267–282.
  • 3Y. Boichut, R. Courbis, P.-C. Héam, O. Kouchnarenko.
    Finer is better: Abstraction Refinement for Rewriting Approximations, in: 19th International Conference on Rewriting Techniques and Applications - RTA'2008, Hagenberg, Austria, A. Voronkov (editor), Lecture Notes in Computer Science, Springer, 2008, vol. 5117, pp. 48-62.
  • 4R. Chadha, S. Ciobaca, S. Kremer.
    Automated Verification of Equivalence Properties of Cryptographic Protocols, in: Programming Languages and Systems - 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings, H. Seidl (editor), Lecture Notes in Computer Science, Springer, 2012, vol. 7211, pp. 108–127.
  • 5V. Cortier, B. Smyth.
    Attacking and fixing Helios: An analysis of ballot secrecy, in: Journal of Computer Security, 2013, vol. 21, no 1, pp. 89–148.
  • 6F. Dadeau, P.-C. Héam, R. Kheddam.
    Mutation-Based Test Generation from Security Protocols in HLPSL, in: 4th International Conference on Software Testing Verification and Validation (ICST'2011), Berlin, Germany, M. Harman, B. Korel (editors), IEEE Computer Society Press, March 2011. [ DOI : 10.1109/ICST.2011.42 ]
    http://hal.inria.fr/inria-00559850/en
  • 7A. Giorgetti, J. Groslambert, J. Julliand, O. Kouchnarenko.
    Verification of Class Liveness Properties with Java Modelling Language, in: IET Software, 2008, vol. 2, no 6, pp. 500-514.
  • 8E. Nicolini, C. Ringeissen, M. Rusinowitch.
    Combinable Extensions of Abelian Groups, in: Proc. of 22nd International Conference on Automated Deduction, CADE-22, Montreal, Canada, R. Schmidt (editor), Lecture Notes in Artificial Intelligence, Springer, 2009, vol. 5663, pp. 51–66.
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 12W. Belkhir, Y. Chevalier, M. Rusinowitch.
    Parametrized automata simulation and application to service composition, in: Journal of Symbolic Computation, August 2015, 21 p.
    https://hal.inria.fr/hal-01089128
  • 13R. Chrétien, V. Cortier, S. Delaune.
    From Security Protocols to Pushdown Automata, in: ACM Transactions on Computational Logic, November 2015, vol. 17, no 1. [ DOI : 10.1145/2811262 ]
    https://hal.inria.fr/hal-01238159
  • 14F. Dadeau, P.-C. Héam, R. Kheddam, G. Maatoug, M. Rusinowitch.
    Model-based mutation testing from security protocols in HLPSL, in: Journal of Software Testing, Verification, and Reliability, August 2015, 30 p. [ DOI : 10.1002/stvr.1531 ]
    https://hal.inria.fr/hal-01090881
  • 15J. Dreier, J.-G. Dumas, P. Lafourcade.
    Brandt's fully private auction protocol revisited, in: Journal of Computer Security, September 2015, vol. 23, no 5, pp. 587-610. [ DOI : 10.3233/JCS-150535 ]
    https://hal.inria.fr/hal-01233555
  • 16J. Dreier, C. Ene, P. Lafourcade, Y. Lakhnech.
    On the existence and decidability of unique decompositions of processes in the applied π-calculus, in: Journal of Theoretical Computer Science (TCS), 2015. [ DOI : 10.1016/j.tcs.2015.11.033 ]
    https://hal.archives-ouvertes.fr/hal-01238097
  • 17H. Mahfoud, A. Imine.
    Efficient Querying of XML Data Through Arbitrary Security Views, in: Transactions on Large-Scale Data- and Knowledge-Centered Systems, November 2015, vol. 22, 40 p.
    https://hal.inria.fr/hal-01241212
  • 18T. Maillot, U. Boscain, J.-P. Gauthier, U. Serres.
    Lyapunov and Minimum-Time Path Planning for Drones, in: Journal of Dynamical and Control Systems, January 2015, vol. 21, no 1, pp. 1-34. [ DOI : 10.1007/s10883-014-9222-y ]
    https://hal.archives-ouvertes.fr/hal-01097155
  • 19A. Randolph, H. Boucheneb, A. Imine, A. Quintero.
    On Synthesizing a Consistent Operational Transformation Approach, in: IEEE Transactions on Computers, February 2015, vol. 64, no 4, 16 p.
    https://hal.archives-ouvertes.fr/hal-01094030
  • 20E. Tushkanova, A. Giorgetti, C. Ringeissen, O. Kouchnarenko.
    A rule-based system for automatic decidability and combinability, in: Science of Computer Programming, March 2015, vol. 99, pp. 3-23. [ DOI : 10.1016/j.scico.2014.02.005 ]
    https://hal.inria.fr/hal-01102883
  • 21N. Zeilberger, A. Giorgetti.
    A correspondence between rooted planar maps and normal planar lambda terms, in: Logical Methods in Computer Science (LMCS), September 2015, vol. 11, no 3:22, pp. 1-39. [ DOI : 10.2168/LMCS-11(3:22)2015 ]
    https://hal.inria.fr/hal-01057269

Articles in National Peer-Reviewed Journals

  • 22A. Randolph, A. Imine, H. Boucheneb, A. Quintero.
    Spécification et Analyse d’un Protocole de Contrôle d’Accès Optimiste pour Éditeurs Collaboratifs Répartis, in: Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, January 2015, 1 p.
    https://hal.archives-ouvertes.fr/hal-01093982

Articles in Non Peer-Reviewed Journals

  • 23V. Cortier.
    Formal verification of e-voting: solutions and challenges, in: SigLog Newsletter, ACM Special Interest Group on Logic and Computation, January 2015, vol. 2, pp. 25-34. [ DOI : 10.1145/2728816.2728823 ]
    https://hal.inria.fr/hal-01206297

International Conferences with Proceedings

  • 24W. Belkhir, N. Ratier, D. D. Nguyen, B. Yang, M. Lenczner, F. Zamkotsian, H. Cirstea.
    Towards an automatic tool for multi-scale model derivation illustrated with a micro-mirror array , in: 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2015, Timisoara, Romania, September 2015.
    https://hal.inria.fr/hal-01243204
  • 25D. Bernhard, V. Cortier, D. Galindo, O. Pereira, B. Warinschi.
    A comprehensive analysis of game-based ballot privacy definitions, in: 36th IEEE Symposium on Security and Privacy (S&P'15), San Jose, United States, May 2015. [ DOI : 10.1109/SP.2015.37 ]
    https://hal.inria.fr/hal-01206289
  • 26H. Bride, O. Kouchnarenko, F. Peureux.
    Constraint Solving for Verifying Modal Specifications of Workflow Nets with Data, in: The Ershov Informatics Conference (the PSI Conference Series, 10th edition), Kazan, Russia, Springer, August 2015, 15 p.
    https://hal.inria.fr/hal-01242370
  • 27V. Cheval, V. Cortier.
    Timing attacks in security protocols: symbolic framework and proof techniques, in: 4th Conference on Principles of Security and Trust (POST 2015), Londres, United Kingdom, April 2015.
    https://hal.inria.fr/hal-01103618
  • 28P. Chocron, P. Fontaine, C. Ringeissen.
    A Polite Non-Disjoint Combination Method: Theories with Bridging Functions Revisited, in: 25th International Conference on Automated Deduction, CADE-25, Berlin, Germany, A. P. Felty, A. Middeldorp (editors), Lecture Notes in Computer Science, Springer, August 2015, vol. 9195, pp. 419-433. [ DOI : 10.1007/978-3-319-21401-6_29 ]
    https://hal.inria.fr/hal-01157898
  • 29P. Chocron, P. Fontaine, C. Ringeissen.
    A Rewriting Approach to the Combination of Data Structures with Bridging Theories, in: Frontiers of Combining Systems - 10th International Symposium, FroCoS 2015, Wroclaw, Poland, C. Lutz, S. Ranise (editors), Lecture Notes in Computer Science, Springer, September 2015, vol. 9322, pp. 275–290. [ DOI : 10.1007/978-3-319-24246-0_17 ]
    https://hal.inria.fr/hal-01206187
  • 30R. Chrétien, V. Cortier, S. Delaune.
    Checking Trace Equivalence: How to Get Rid of Nonces?, in: ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienne, Austria, September 2015. [ DOI : 10.1007/978-3-319-24177-7_12 ]
    https://hal.inria.fr/hal-01238163
  • 31R. Chrétien, V. Cortier, S. Delaune.
    Decidability of trace equivalence for protocols with nonces, in: 28th IEEE Computer Security Foundations Symposium (CSF'15), Verona, Italy, July 2015. [ DOI : 10.1109/CSF.2015.19 ]
    https://hal.inria.fr/hal-01206276
  • 32V. Cortier, F. Eigner, S. Kremer, M. Maffei, C. Wiedling.
    Type-Based Verification of Electronic Voting Protocols, in: 4th Conference on Principles of Security and Trust (POST), London, United Kingdom, Springer, April 2015, vol. Proceedings of the 4th Conference on Principles of Security and Trust (POST).
    https://hal.inria.fr/hal-01103545
  • 33S. Erbatur, D. Kapur, A. M. Marshall, P. Narendran, C. Ringeissen.
    Unification and Matching in Hierarchical Combinations of Syntactic Theories, in: Frontiers of Combining Systems - 10th International Symposium, FroCoS 2015, Wroclaw, Poland, C. Lutz, S. Ranise (editors), Lecture Notes in Computer Science, Springer, September 2015, vol. 9322, pp. 291–306. [ DOI : 10.1007/978-3-319-24246-0_18 ]
    https://hal.inria.fr/hal-01206669
  • 34J.-M. Gauthier, F. Bouquet, A. Hammad, F. Peureux.
    Tooled Process for Early Validation of SysML Models using Modelica Simulation, in: FSEN'15, 6th IPM Int. Conf. on Fundamentals of Software Engineering, Tehran, Iran, Springer, 2015, vol. 9392, pp. 230-237. [ DOI : 10.1007/978-3-319-24644-4_16 ]
    https://hal.archives-ouvertes.fr/hal-01246025
  • 35J.-M. Gauthier, F. Bouquet, F. Peureux, H. Ahmad.
    A SysML Formal Framework to Combine Discrete and Continuous Simulation for Testing, in: ICFEM'15, 17th Int. Conf. on Formal Engineering Methods, Paris, France, Springer, 2015, vol. 9407, pp. 134–152.
    https://hal.archives-ouvertes.fr/hal-01246024
  • 36R. Genestier, A. Giorgetti, G. Petiot.
    Sequential generation of structured arrays and its deductive verification, in: TAP 2015, 9th Int. Conf. of Tests and Proofs, L'Aquila, Italy, LNCS, Springer, 2015, vol. 9154, pp. 109–128.
    https://hal.archives-ouvertes.fr/hal-01228995
  • 37N. Guetmi, A. Imine.
    A Cloud-Based Reusable Design for Mobile Data Sharing, in: Model and Data Engineering, Island of Rhodes, Greece, Lecture Notes in Computer Science, September 2015, vol. 9344.
    https://hal.inria.fr/hal-01241302
  • 38N. Guetmi, M. D. Mechaoui, A. Imine, L. L. Bellatreche.
    Mobile collaboration: a collaborative editing service in the cloud, in: The 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, April 2015, vol. ACM Proceedings.
    https://hal.inria.fr/hal-01241497
  • 39P.-C. Heam, J.-L. Joly.
    On the Uniform Random Generation of Non Deterministic Automata Up to Isomorphism, in: CIAA 2015, Umea, Sweden, F. Drewes (editor), Implementation and Application of Automata - 20th International Conference, Springer, August 2015, vol. 9223, 12 p. [ DOI : 10.1007/978-3-319-22360-5_12 ]
    https://hal.inria.fr/hal-01239735
  • 40P.-C. Héam, J.-L. Joly.
    Random Generation and Enumeration of Accessible Determinisitic Real-time Pushdown Automata, in: CIAA 2015, Umea, Sweden, F. Drewes (editor), Implementation and Application of Automata - 20th International Conference, Springer, August 2015, vol. 9223, 12 p.
    https://hal.inria.fr/hal-01087748
  • 41S. Kremer, P. Rønne.
    To Du or not to Du: A Security Analysis of Du-Vote, in: IEEE European Symposium on Security and Privacy 2016, Saarbrucken, Germany, IEEE Computer Society, March 2016.
    https://hal.inria.fr/hal-01238894
  • 42M. D. Mechaoui, N. Guetmi, A. Imine.
    Mobile Co-Authoring of Linked Data in the Cloud, in: New Trends in Databases and Information Systems (Workshops), Poitiers, France, September 2015.
    https://hal.inria.fr/hal-01241274

National Conferences with Proceedings

  • 43R. Genestier, A. Giorgetti, G. Petiot.
    Gagnez sur tous les tableaux, in: Vingt-sixièmes Journées Francophones des Langages Applicatifs (JFLA 2015), Le Val d'Ajol, France, D. Baelde, J. Alglave (editors), January 2015.
    https://hal.inria.fr/hal-01099135

Conferences without Proceedings

  • 44H. Bao Thien, A. Imine.
    Efficient and Decentralized Polling Protocol for General Social Networks, in: Stabilization, Safety, and Security of Distributed Systems, Edmonton, Canada, August 2015.
    https://hal.inria.fr/hal-01241241
  • 45V. Cheval, V. Cortier, E. Le Morvan.
    Secure refinements of communication channels, in: FSTTCS 2015, Bangalore, India, December 2015.
    https://hal.inria.fr/hal-01238094
  • 46F. Dadeau, E. Fourneret.
    Experience report on Model-Based Testing of Security Components, in: UCAAT 2015, 3rd User Conference on Advanced Automated Testing, Sophia-Antipolis, France, Bruno Legeard, October 2015.
    https://hal.inria.fr/hal-01244769
  • 47T. Jha, W. Belkhir, Y. Chevalier, M. Rusinowitch.
    Expressive Equivalence and Succinctness of Parametrized Automata with respect to Finite Memory Automata, in: FOR-MOVES 2015: FORmal MOdeling and VErification of Service-based systems, Goa, India, November 2015.
    https://hal.inria.fr/hal-01224144
  • 48O. Kouchnarenko, J.-F. Weber.
    Practical Analysis Framework for Component Systems with Dynamic Reconfigurations, in: 17th International Conference on Formal Engineering Methods, Paris, France, November 2015, Long version of the paper accepted at ICFEM 2015, the 17th International Conference on Formal Engineering Methods.
    https://hal.archives-ouvertes.fr/hal-01135720
  • 49H. H. Nguyen, A. Imine, M. Rusinowitch.
    Anonymizing Social Graphs via Uncertainty Semantics, in: ASIACCS 2015 - 10th ACM Symposium on Information, Computer and Communications Security, Singapour, Singapore, April 2015.
    https://hal.inria.fr/hal-01108437
  • 50H. H. Nguyen, A. Imine, M. Rusinowitch.
    Differentially Private Publication of Social Graphs at Linear Cost, in: ASONAM 2015, Paris, France, August 2015.
    https://hal.inria.fr/hal-01179528

Scientific Books (or Scientific Book chapters)

  • 51F. Bouquet, S. Chipeaux, C. Lang, N. Marilleau, J.-M. Nicod, P. Taillandier.
    Introduction à l'approche agent, in: Simulation spatiale à base d'agents avec NetLogo, partie 1, ISTE, 2015, pp. 15–36.
    https://hal.archives-ouvertes.fr/hal-01246023
  • 52F. Bouquet, D. Sheeren, N. Becu, B. Gaudou, C. Lang, N. Marilleau, C. Monteil.
    Formalismes de description des modèles agent, in: Simulation spatiale  A  base d'agents avec NetLogo, partie 1, ISTE, 2015, pp. 37–72.
    https://hal.archives-ouvertes.fr/hal-01246022

Books or Proceedings Editing

  • 53F. Dadeau, P. Le Gall (editors)
    Actes des 14e journées sur les Approches Formelles dans l'Assistance au Développement de Logiciels, Xavier Blanc, Bordeaux, France, May 2015, 88 p.
    https://hal.inria.fr/hal-01155626

Internal Reports

  • 54V. Cheval, V. Cortier, E. Le Morvan.
    Secure refinements of communication channels, LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy, October 2015, no RR-8790, 50 p.
    https://hal.inria.fr/hal-01215265

Scientific Popularization

  • 55N. Guetmi, M. D. Mechaoui, A. Imine.
    Resilient Collaboration for Mobile Cloud Computing, July 2015, This system description has been published in ERCIM NEWS 102.
    https://hal.inria.fr/hal-01241505
  • 56M. D. Mechaoui, N. Guetmi, A. Imine.
    Towards Real-Time Co-authoring of Linked-Data on the Web, in: Computer Science and Its Applications, Saida, Algeria, IFIP Advances in Information and Communication Technology, May 2015, vol. 456.
    https://hal.inria.fr/hal-01241287

Other Publications

  • 57Y. Abid, A. Imine, A. Napoli, C. Raïssi, M. Rigolot, M. Rusinowitch.
    Analyse d'activité et exposition de la vie privée sur les médias sociaux, January 2016, 16ème conférence francophone sur l'Extraction et la Gestion des Connaissances (EGC 2016), Poster.
    https://hal.inria.fr/hal-01241619
  • 58W. Belkhir, N. Ratier, D. D. Nguyen, B. Yang, M. Lenczner, F. Zamkotsian, H. Cirstea.
    Towards an automatic tool for multi-scale model derivation, November 2015, working paper or preprint.
    https://hal.inria.fr/hal-01223141
  • 59T. Creutzig, Y. Hikida, P. B. Rønne.
    Correspondences between WZNW models and CFTs with W -algebra symmetry, December 2015, working paper or preprint.
    https://hal.inria.fr/hal-01242685
  • 60R. Giustolisi, V. Iovino, P. Rønne.
    On the Possibility of Non-Interactive E-Voting in the Public-key Setting, December 2015, working paper or preprint.
    https://hal.inria.fr/hal-01242688
  • 61P. Y. A. Ryan, P. Rønne, V. Iovino.
    Selene: Voting with Transparent Verifiability and Coercion-Mitigation, December 2015, working paper or preprint.
    https://hal.inria.fr/hal-01242690
References in notes
  • 62S. Kremer, V. Cortier (editors)
    Formal Models and Techniques for Analyzing Security Protocols, Cryptology and Information Security Series, IOS Press, 2011, vol. 5, 312 p.
    http://hal.inria.fr/inria-00636787/en
  • 63M. Arapinis, V. Cortier, S. Kremer, M. Ryan.
    Practical Everlasting Privacy, in: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, D. A. Basin, J. C. Mitchell (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 7796, pp. 21–40.
  • 64F. Bellegarde, C. Darlot, J. Julliand, O. Kouchnarenko.
    Reformulation: a Way to Combine Dynamic Properties and Refinement, in: International Symposium Formal Methods Europe (FME 2001), LNCS, Springer-Verlag, 2001, vol. 2021.
  • 65E. Bernard, B. Legeard, X. Luck, F. Peureux.
    Generation of Test Sequences from Formal Specifications: GSM 11-11 Standard Case-Study, in: International Journal on Software Practice and Experience, 2004, vol. 34, no 10, pp. 915–948.
  • 66Y. Boichut, P.-C. Héam, O. Kouchnarenko.
    Vérifier automatiquement les protocoles de sécurité, in: Techniques de l'ingénieur, October 2007, pp. RE95-1–RE95-8.
  • 67F. Bouquet, B. Legeard.
    Reification of Executable Test Scripts in Formal Specification-Based Test Generation: The Java Card Transaction Mechanism Case Study, in: Formal Methods, FME 2003, Springer-Verlag, September 2003, vol. 2805, pp. 778–795.
  • 68F. Bouquet, B. Legeard, F. Peureux.
    CLPS-B - A Constraint Solver for B, in: International Conference on Tools and Algorithms for Construction and Analysis of Systems, TACAS2002, Grenoble, France, Lecture Notes in Computer Science, Springer, April 2002, vol. 2280, pp. 188–204.
  • 69V. Cheval, H. Comon-Lundh, S. Delaune.
    Trace Equivalence Decision: Negative Tests and Non-determinism, in: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), Chicago, Illinois, USA, Y. Chen, G. Danezis, V. Shmatikov (editors), ACM Press, October 2011, pp. 321-330. [ DOI : 10.1145/2046707.2046744 ]
    http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CCD-ccs11.pdf
  • 70H. Comon-Lundh, V. Cortier.
    Security Properties: Two Agents are Sufficient, in: Science of Computer Programming, March 2004, vol. 50, no 1-3, pp. 51-71.
  • 71F. Dadeau, K. Cabrera Castillos, R. Tissot.
    Scenario-Based Testing using Symbolic Animation of B Models, in: Software Testing, Verification and Reliability, March 2012, vol. 6, no 22, pp. 407-434.
    http://hal.inria.fr/hal-00760020
  • 72J. Dick, A. Faivre.
    Automating the Generation and Sequencing of Test Cases from Model-Based Specifications, in: FME'93: Industrial-Strength Formal Methods, Lecture Notes in Computer Science, Springer-Verlag, April 1993, vol. 670, pp. 268–284.
  • 73G. S. Grewal, M. Ryan, L. Chen, M. Clarkson.
    Du-Vote: Remote Electronic Voting with Untrusted Computers, in: Proc. 28th Computer Security Foundations Symposium Conference (CSF'15), IEEE Computer Society, 2015, pp. 155-169.
  • 74P.-C. Héam, V. Hugot, O. Kouchnarenko.
    The Emptiness Problem for Tree Automata with at Least One Disequality Constraint is NP-hard, FEMTO-ST, December 2014.
    https://hal.inria.fr/hal-01089711
  • 75P.-C. Héam, J.-L. Joly.
    On the Uniform Random Generation of Determinisitic Partially Ordered Automata using Monte Carlo Techniques, December 2014.
    https://hal.inria.fr/hal-01087751
  • 76P.-C. Héam, V. Hugot, O. Kouchnarenko.
    From Linear Temporal Logic Properties to Rewrite Propositions, in: IJCAR 2012, 6th Int. Joint Conf. on Automated Reasoning, United Kingdom, January 2012, pp. 316-331.
    https://hal.archives-ouvertes.fr/hal-00956586
  • 77K. G. Larsen, B. Thomsen.
    A modal process logic, in: Proc. of the 3rd Annual Symp. on Logic in Computer Science (LICS'88), IEEE, July 1988, pp. 203–210.
  • 78B. Legeard, F. Bouquet, N. Pickaert.
    Industrialiser le test fonctionnel, Management des systèmes d'information, Dunod, 2009, 266 p.
    http://hal.inria.fr/inria-00430538/en/
  • 79G. Sénizergues.
    The Equivalence Problem for Deterministic Pushdown Automata is Decidable, in: 24th International Colloquium on Automata, Languages and Programming (ICALP'97), Lecture Notes in Computer Science, Springer, 1997, pp. 671-681.
  • 80A. Vernotte, C. Botea, B. Legeard, A. Molnar, F. Peureux.
    Risk-Driven Vulnerability Testing: Results from eHealth Experiments Using Patterns and Model-Based Approach, in: Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015. Revised Selected Papers, F. Seehusen, M. Felderer, J. Großmann, M. Wendland (editors), LNCS, Springer, 2015, vol. 9488, pp. 93–109.