Page d'accueil IMAG
Home page


My DBLP entry.

Publications ordered by year.

  Pascal Lafourcade Publications

Chapters in Books

[JL12] Raphël Jamet, Pascal Lafourcade: Formal Model for (k)-Neighborhood Discovery Protocols. Chapter in Advances in Network Analysis and its Applications. PDF | Bibtex | Abstract

Edited Books and Proceedings

Joaquín García-Alfaro, Pascal Lafourcade: Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers Springer 2012. Bibtex

Magazine

[PPS08+]
Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, Srdjan Capkun, Jean-Pierre Hubaux. Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking accepted for publication in IEEE Communications Magazine, 2008 PDF

Journal

[CDELL11] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech: Automated Proofs for Asymmetric Encryption. J. Autom. Reasoning 46(3-4): 261-291 (2011). PDF | Bibtex | Abstract

[CLN09] Cas Cremers, Pascal Lafourcade, and Philippe Nadeau. Comparing State Spaces in Automatic Protocol Analysis .Formal to Practical Security, LNCS, volume 5458/2009, 2009. PDF | PS | Bibtex | Abstract

[DLLT08] Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Symbolic protocol analysis for monoidal equational theories. Information and Computation, 2008. PDF | Bibtex | Abstract

[LLT07] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Intruder Deduction for the Equational Theory of Abelian Groups with Distributive Encryption. Information and Computation 205(4), pages 581-623, 2007. PDF | PS | PS.GZ | Bibtex | Abstract

[CDL06] Véronique Cortier, Stéphanie Delaune and Pascal Lafourcade. A Survey of Algebraic Properties Used in Cryptographic Protocols. Journal of Computer Security 14(1), pages 1-43, 2006. PDF | PS| PS.GZ | Bibtex | Abstract

Conferences

[DGKLL15] Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, and Gabriele Lenzini: A Framework for Analyzing Verifiability in Traditional and Electronic Exams. ISPEC 2015, pages 514-529

[KFL15] Ali Kassem, Yliès Falcone, and Pascal Lafourcade : Monitoring Electronic Exams. The 15th International Conference on Runtime Verification, September, 2015 Vienna, Austria

[DKL'15] Jannik Dreier, Ali Kassem, and Pascal Lafourcade: Formal Analysis of E-Cash Protocols. In 11th International Joint Conference on e-Business and Telecommunications (SECRYPT 2015).

[AGLM'15] Affoua Théràse Aby, Alexandre Guitton, Pascal Lafourcade, and Michel Misson. SLACK_MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks. ADHOCNETS 2015.

[DGK+14] Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzin,and Peter Y.A. Ryan. Formal analysis of electronic exams. In 11th International Joint Conference on e-Business and Telecommunications (SECRYPT 2014), 2014. Best Paper Award. PDF

[DJL14] Jannik Dreier, Hugo Jonker, and Pascal Lafourcade. Secure auctions without cryptography. In Alfredo Ferro, Fabrizio Luccio, and Peter Widmayer, editors, Fun with Algorithms - 7th International Conference, FUN 2014, Lipari Island, Sicily, Italy, July 1-3, 2014. Proceedings, volume 8496 of Lecture Notes in Computer Science, pages 158-170. Springer, 2014. PDF

[JL14b] Raphël Jamet and Pascal Lafourcade. (In)corruptibility of routing protocols. In Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montréal, Canada, 2014, Lecture Notes in Computer Science. Springer, 2014. Best Paper Award. PDF

[KLL14a] Ali Kassem, Pascal Lafourcade, and Yassine Lakhnech. Formal verification of e-reputation protocols. In Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montréal, Canada, Lecture Notes in Computer Science. Springer, 2014. PDF

[KLL14c] Amrit Kumar, Pascal Lafourcade, and Cédric Lauradoux. Performances of cryptographic accumulators. In The 39th IEEE Conference on Local Computer Networks (LCN), 2014. PDF

[MCL+14a] Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade, and Francois Delobel. Secure key renewal and revocation for wireless sensor networks. In The 39th IEEE Conference on Local Computer Networks (LCN), Edmonton, Canada, 2014. PDF

[MRC+14] Ismail Mansour, Damian Rusinek, Gérard Chalhoub, Pascal Lafourcade, and Bogdan Ksiezopolski. Multihop node authentication mechanisms for wireless sensor networks. In Song Guo, Jaime Lloret, Pietro Manzoni, and Stefan Ruehrup, editors, Ad-hoc, Mo- bile, and Wireless Networks - 13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 22-27, 2014 Proceedings, volume 8487 of Lecture Notes in Computer Science, pages 402 - 418. Springer, 2014. PDF

[DLL13] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech: Formal verification of e-auction protocols. In David A. Basin and John C. Mitchell, editors, POST, volume 7796 of Lecture Notes in Computer Science, pages 247-266. Springer, 2013. PDF | Bibtex | Abstract [DJL13] Jannik Dreier, Hugo Jonker, and Pascal Lafourcade. Verifiability in e-auction protocols. In 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2013, Hangzhou, China, 2013. to appear. PDF | Bibtex | Abstract

[ADJL13] Karine Altisen, St&ecute;phane Devismes, Raphael Jamet, and Pascal Lafourcade. SR3: Secure resilient reputation-based routing. In The annual IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2013), Cambridge, Massachusetts, USA, may 2013. to appear. PDF | Bibtex | Abstract

[DELL13] Jannik Dreier, Cristian Ene, Pascal Lafourcade, and Yassine Lakhnech. On unique decomposition of processes in the applied-calculus. In Frank Pfenning, editor, FoSSaCS, volume 7794 of Lecture Notes in Computer Science, pages 50-64. Springer, 2013. PDF | Bibtex | Abstract

[DDL13] Jannik Dreier, Jean-Guillaume Dumas, and Pascal Lafourcade. Brandt's fully private auction protocol revisited. In 6th International Conference on Cryptology in Africa Africacrypt 2013, Egypt, june 2013. to appear. PDF | Bibtex | Abstract

[DLL12] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech: Defining Privacy for Weighted Votes, Single and Multi-Voter Coercion. . European Symposium on Research in Computer Security (ESORICS), 2012. PDF | Bibtex | Abstract | Technical Report

[AGDL12] Karine Altisen, Stéphane Devismes, Antoine Gerbaud, Pascal Lafourcade: Analysis of Random Walks Using Tabu Lists.. In Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30-July 2,2012.PDF | Bibtex | Abstract

[DLL12b] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. A Formal Taxonomy of Privacy in Voting Protocols. First IEEE International Workshop on Security and Forensics in Communication Systems (ICC'12 WS - SFCS), 2012. - | Bibtex | Abstract | Technical Report

[GKL12] Key Management Protocol in WIMAX revisited. Ghoualmi, Nacira and Kahya, Noudjoud and Lafourcade, Pascal (in The Third International Conference on Communications Security and Information Assurance (CSIA 2012), 2012)

[FLA11] Fousse, Laurent and Lafourcade, Pascal and Alnuaimi, Mohamed: Benaloh's Dense Probabilistic Encryption Revisited. In Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings, 2011. PDF | Bibtex | Abstract | Slides

[ADLP11] Routage par marche aléatoire à listes tabous. Altisen, Karine and Devismes, Stéphane and Lafourcade, Pascal and Ponsonnet, Clément (in Algotel, 2011). PDF | Bibtex | Abstract

[DLL11] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. Vote-Independence: A Powerful Privacy Notion for Voting Protocols. 4th Canada-France MITACS Workshop on Foundations & Practice of Security (FPS'11), 2011. PDF | Technical Report

[JWESML10] Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Gunter Muller, Pascal Lafourcade: Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records. IIH-MSP 2010: 510-513 PDF | Bibtex | Abstract

[LTV09] Pascal Lafourcade, Vanessa Terrade and Sylvain Vigier Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties . In Proceedings of the sixth International Workshop on Formal Aspects in Security and Trust (FAST2009), November 2009, Eindhoven, the Netherlands. PDF | PS| Slide | Bibtex| Abstract

[GLLS09] Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini Automated Proofs for Encryption Modes. In Proceedings of the 13th Annual Asian Computing Science Conference Focusing on Information Security and Privacy: Theory and Practice (ASIAN'09),October 2009. PDF | PS | Bibtex|Abstract | Slides

[CDELL08a] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade. and Yassine Lakhnech Towards Automated Proofs for Asymmetric Encryption Schemes in the Random Oracle Model. In Proceedings of the 15th ACM Conference on Computer and Communications Security, (CCS'08), October 2008, Alexandria USA. Pdf | PS | Bibtex | Abstract

[Laf07] Pascal Lafourcade. Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption. In Maribel Fernández and Claude Kirchner (eds.), Proceedings of the 1st International Workshop on Security and Rewriting Techniques (SecReT'06), Venice, Italy, July 2006, Electronic Notes in Theoretical Computer Science 171(4), pages 37-57. Elsevier Science Publishers, 2007. PDF | PS| PS.GZ | Bibtex | Abstract

[DLLT06] Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or. In Michele Buglesi, Bart Preneel, Vladimiro Sassone and Ingo Wegener (eds.), Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06) - Part II, Venice, Italy, July 2006, Lecture Notes in Computer Science 4052, pages 132-143. Springer. PDF | PS| PS.GZ | PDF (long version) | PS(long version) | PS.GZ (long version) | Bibtex | Abstract

[LLT05a] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Intruder Deduction for AC-like Equational Theories with Homomorphisms. In Juergen Giesl (ed.), Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), Nara, Japan, April 2005, Lecture Notes in Computer Science 3467, pages 308-322. Springer. PDF | PS| PS.GZ | PS(long version) | PS.GZ (long version) | Bibtex | Abstract

Thesis

[Laf06] Pascal Lafourcade. Vérification des protocoles cryptographiques en présence de théories équationnelles. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2006. 209 pages. PDF | PS| PS.GZ | Slides | Bibtex | Abstract

Others

[GLLS09] Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini Automated Proofs for Encryption Modes. In Proceedings of the Workshop on Formal and Computational Cryptography, (FCC'09), July 2009, PortJefferson NY, USA. PDF | PS | Bibtex| Abstract

[ML09] Sreekanth Malladi, Pascal Lafourcade, Prudent engineering practices to prevent type-flaw attacks under algebraic properties . In Proceedings of the Workshop on Security and Rewriting Techniques, (Secret'09) July 2009, PortJefferson NY, USA. PDF | PS | Bibtex| Abstract

[Laf08] Pascal Lafourcade. Relation between Unification Problem and Intruder Deduction Problem. In Proceedings of the 3rd International Workshop on Security and Rewriting Techniques (SecReT'08), Pittsburgh, PA USA, June , 2008. PDF | PS| Bibtex | Abstract

[CDELL08b] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade. and Yassine Lakhnech Automated Proofs for Asymmetric Encryption. In Proceedings of the Workshop on Formal and Computational Cryptography, (FCC'08), June 2008, Pittsburgh PA, USA. PDF | PS | Bibtex

[CDELL08c] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade. and Yassine Lakhnech Automated Proofs for Asymmetric Encryption. In Proceedings of the Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, (FCS-ARSPA-WITS'08), June 2008, Pittsburgh PA, USA. PDF | PS | Bibtex

[CL07] Cas Cremers and Pascal Lafourcade. Comparing State Spaces in Automatic Security Protocol Verification. In Michael Goldsmith and Bill Roscoe (eds.), Proceedings of the 7th International Workshop on Automated Verification of Critical Systems (AVoCS'07), Oxford, UK, September 2007, Electronic Notes in Theoretical Computer Science, pages 49-63. Elsevier Science Publishers. PDF | Bibtex | Abstract

[KL07] Bogdan Ksiezopolski and Pascal Lafourcade. Attack and Revison of an Electronic Auction Protocol using OFMC. Technical Report 549, Department of Computer Science, ETH Zurich, Switzerland, February 2007. 13 pages. PDF | Bibtex | Abstract

[LLT06] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. ACUNh: Unification and Disunification Using Automata Theory. In Jordi Levy (ed.), Proceedings of the 20th International Workshop on Unification (UNIF'06), Seattle, Washington, USA, August 2006, pages 6-20. PDF | PS| PS.GZ | Bibtex | Abstract

[LLT05b] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Intruder Deduction for the Equational Theory of Exclusive-or with Distributive Encryption. Research Report LSV-05-19, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2005. 39 pages. PDF | PS| PS.GZ | Bibtex | Abstract

[Laf03] Pascal Lafourcade. Application de la résolution de conflits 'logiques', à l'aide à la décision pour la résolution de aux conflits des problèmes d'ordonnancement. Rapport de DEA, DEA Représentation de la Connaissance et Fomalisation du Raisonnement, Toulouse, France, June 2003. 66 pages. PS| PS.GZ | Bibtex | Abstract

Contract Reports

[BCC+04] Vincent Bernat, Hubert Comon-Lundh, Véronique Cortier, Stéphanie Delaune, Florent Jacquemard, Pascal Lafourcade, Yassine Lakhnech and Laurent Mazaré. Sufficient conditions on properties for an automated verification: theoretical report on the verification of protocols for an extended model of the intruder. Technical Report 4, projet RNTL PROUVé, December 2004. 33 pages. PS| PS.GZ | Bibtex | Abstract



My DBLP entry.

Here you find how to compute you Erdos number.
My Erdos number is 4 (Paul Erdos -> Shmuel Zaks -> Nachum Dershowitz -> Ralf Treinen -> Pascal Lafourcade) or (Paul Erdos -> Gérald Tenenbaum -> Guillaume Hanrot -> Laurent Fousse -> Pascal Lafourcade) or (Paul Erdos -> Michael Makkai -> Matt Kaufmann -> David A. Basin -> Pascal Lafourcade) or (Paul Erdos -> Sylvie Corteel -> E. Rodney Canfield -> Philippe Nadeau-> Pascal Lafourcade) or (Paul Erdos -> Boris Aronov -> Xavier Goaoc -> Véronique Cortier-> Pascal Lafourcade )
" ?>