Hubert Comon-Lundh
Hubert Comon-Lundh
Computer Science professor, ENS Cachan
Bestätigte E-Mail-Adresse bei lsv.ens-cachan.fr
Titel
Zitiert von
Zitiert von
Jahr
Tree automata techniques and applications
H Comon
http://www. grappa. univ-lille3. fr/tata, 1997
16791997
Equational problems anddisunification
H Comon, P Lescanne
Journal of Symbolic Computation 7 (3-4), 371-425, 1989
2971989
Multiple counters automata, safety analysis and Presburger arithmetic
H Comon, Y Jurski
International Conference on Computer Aided Verification, 268-279, 1998
2631998
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
H Comon-Lundh, V Shmatikov
18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings …, 2003
2392003
Disuni cation: a survey
H Comon
Computational Logic. Essays in honor of Alan Robinson, 322-359, 1991
1981991
The finite variant property: How to get rid of some algebraic properties
H Comon-Lundh, S Delaune
International Conference on Rewriting Techniques and Applications, 294-307, 2005
1772005
Diophantine equations, Presburger arithmetic and finite automata
A Boudet, H Comon
Colloquium on Trees in Algebra and Programming, 30-43, 1996
1531996
New decidability results for fragments of first-order logic and application to cryptographic protocols
H Comon-Lundh, V Cortier
International Conference on Rewriting Techniques and Applications, 148-164, 2003
1222003
Computational soundness of observational equivalence
H Comon-Lundh, V Cortier
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1132008
Inductionless induction
H Comon
1131994
Unification et disunification: Théorie et applications
H Comon
1111988
Is it possible to decide whether a cryptographic protocol is secure or not?
H Comon, V Shmatikov
Journal of Telecommunications and Information Technology, 5-15, 2002
1092002
Timed automata and the theory of real numbers
H Comon, Y Jurski
International Conference on Concurrency Theory, 242-257, 1999
1091999
Tree automata techniques and applications (1997)
H Comon, M Dauchet, R Gilleron, F Jacquemard, D Lugiez, S Tison, ...
1062002
Solving symbolic ordering constraints
H Comon
International Journal of Foundations of Computer Science 1 (04), 387-411, 1990
1021990
Tree automata with one memory set constraints and cryptographic protocols
H Comon, V Cortier
Theoretical Computer Science 331 (1), 143-214, 2005
1002005
Equational formulas with membership constraints
H Comon, C Delor
Information and Computation 112 (2), 167-216, 1994
991994
Trace equivalence decision: Negative tests and non-determinism
V Cheval, H Comon-Lundh, S Delaune
Proceedings of the 18th ACM conference on Computer and communications …, 2011
862011
Security properties: two agents are sufficient
H Comon-Lundh, V Cortier
European Symposium On Programming, 99-113, 2003
802003
Syntacticness, cycle-syntacticness, and shallow theories
H Comon, M Haberstrau, JP Jouannaud
Information and Computation 111 (1), 154-191, 1994
791994
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20