ACTION DYADE

Previous Next Contents PS

9.8. VIP

[1] D. Bolignano, Integrating Proof-based and Model-checking Techniques for the Formal Verification of Cryptographic Protocols, CAV'98.

[2] Carine Courbis "Simulation d'applications Java Card" Jul 1998. Rapport de DEA.

[3] J. Goubault-Larrecq. "A Formalization of Cryptographic Knowledge". Rapport Interne.

[4] T. Jensen, D. Le Métayer, T. Thorn, "Security and dynamic class loading in Java: a formalisation", proc. IEEE Int. Conference on Computer Languages, 1998.

[5] E. Rose, K. Rose, "Lightweight Bytecode Verification", FUJ '98 workshop, oct. 1998, Vancouver, Canada.

[6] F. Rouaix, X. Leroy, "Security Properties of Typed Applets", POPL'98.



Rapport d'activité 1998