For a long time now, formal methods have been successfully used to analyze security protocols. Several tools have even been developed to tackle automatically different proof techniques and, therefore, to ease the verification of such protocols. However, when it comes to electronic voting and APIs, current tools tend to reach their limits because they can’t handle some cryptographic primitives (e.g. homomorphic encryption), or the security properties (e.g. ballot secrecy), involved in those protocols.In this thesis, we first work on two cases studies of existing and deployed systems: a Norwegian e-voting protocol and a CNRS boardroom voting protocol. These two protocols are analyzed using the applied pi-calculus model and we discuss in detai...
In this document, we formally analyze security in electronic voting and electronic auctions. On-line...
In this document, we formally analyze security in electronic voting and electronic auctions. On-line...
International audienceWe provide the first machine-checked proof of privacy-related properties (incl...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
Les méthodes formelles ont fait leurs preuves dans l’étude des protocoles de sécurité et plusieurs o...
International audienceE-voting protocols aim at achieving a wide range of sophisticated security pro...
Abstract. E-voting protocols aim at achieving a wide range of sophisticated se-curity properties and...
Abstract. E-voting protocols aim at achieving a wide range of sophisticated se-curity properties and...
In this document, we formally analyze security in electronic voting and electronic auctions. On-line...
In this document, we formally analyze security in electronic voting and electronic auctions. On-line...
In this document, we formally analyze security in electronic voting and electronic auctions. On-line...
In this document, we formally analyze security in electronic voting and electronic auctions. On-line...
International audienceWe provide the first machine-checked proof of privacy-related properties (incl...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
For a long time now, formal methods have been successfully used to analyze security protocols. Sever...
Les méthodes formelles ont fait leurs preuves dans l’étude des protocoles de sécurité et plusieurs o...
International audienceE-voting protocols aim at achieving a wide range of sophisticated security pro...
Abstract. E-voting protocols aim at achieving a wide range of sophisticated se-curity properties and...
Abstract. E-voting protocols aim at achieving a wide range of sophisticated se-curity properties and...
In this document, we formally analyze security in electronic voting and electronic auctions. On-line...
In this document, we formally analyze security in electronic voting and electronic auctions. On-line...
In this document, we formally analyze security in electronic voting and electronic auctions. On-line...
In this document, we formally analyze security in electronic voting and electronic auctions. On-line...
International audienceWe provide the first machine-checked proof of privacy-related properties (incl...