Share This Author
Log auditing through model-checking
- M. Roger, J. Goubault-Larrecq
- Computer ScienceProceedings. 14th IEEE Computer Security…
- 11 June 2001
TLDR
Non-Hausdorff topology and domain theory
- J. Goubault-Larrecq
- Mathematics
- 2013
1. Introduction 2. Elements of set theory 3. A first tour of topology: metric spaces 4. Topology 5. Approximation, and function spaces 6. Metrics, quasi-metrics, hemi-metrics 7. Completeness 8. Sober…
Cryptographic Protocol Analysis on Real C Code
- J. Goubault-Larrecq, Fabrice Parrennes
- Computer Science, MathematicsVMCAI
- 17 January 2005
TLDR
Forward analysis for WSTS, part I: completions
- A. Finkel, J. Goubault-Larrecq
- Computer ScienceMathematical Structures in Computer Science
- 9 February 2009
TLDR
Karp-Miller Trees for a Branching Extension of VASS
- K. Verma, J. Goubault-Larrecq
- MathematicsDiscret. Math. Theor. Comput. Sci.
- 2005
TLDR
The Orchids Intrusion Detection Tool
- J. Olivain, J. Goubault-Larrecq
- Computer ScienceCAV
- 6 July 2005
TLDR
Detecting Subverted Cryptographic Protocols by Entropy Checking
- J. Goubault-Larrecq
- Computer Science, Mathematics
- 2006
TLDR
Deciding H1 by resolution
- J. Goubault-Larrecq
- MathematicsInf. Process. Lett.
- 16 August 2005
A Smell of Orchids
- J. Goubault-Larrecq, J. Olivain
- Computer ScienceRV
- 30 March 2008
TLDR
On Noetherian Spaces
- J. Goubault-Larrecq
- Mathematics22nd Annual IEEE Symposium on Logic in Computer…
- 10 July 2007
TLDR
...
...