{"id":13,"date":"2015-06-15T10:26:53","date_gmt":"2015-06-15T08:26:53","guid":{"rendered":"http:\/\/members.loria.fr\/thierrygartiser\/?page_id=13"},"modified":"2017-11-21T13:37:46","modified_gmt":"2017-11-21T11:37:46","slug":"publications","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/AFilipiak\/publications\/","title":{"rendered":"Publis"},"content":{"rendered":"<p>   <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD XHTML 1.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/xhtml1\/DTD\/xhtml1-transitional.dtd\"> <html xmlns='http:\/\/www.w3.org\/1999\/xhtml' xml:lang='fr' lang='fr'> <head> <meta name=\"robots\" content=\"noindex, nofollow\" \/> <meta http-equiv=\"content-type\" content= \"text\/html;charset=UTF-8\" \/> <meta http-equiv=\"Content-Language\" content=\"fr\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"..\/css\/VisuGen.css\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/haltools.inria.fr\/\/css\/VisuRubriqueEncadre.css\" \/> <!-- Piwik haltools.inria.fr--> <script type=\"text\/javascript\">   var _paq = _paq || [];   _paq.push(['trackPageView']);   _paq.push(['enableLinkTracking']);   (function() {     var u=\"\/\/piwik.inria.fr\/\";     _paq.push(['setTrackerUrl', u+'piwik.php']);     _paq.push(['setSiteId', 25]);     var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];     g.type='text\/javascript'; g.async=true; g.defer=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s);   })(); <\/script> <noscript><\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p><\/noscript> <!-- End Piwik Code -->  <title>Publications HAL de  alicia filipiak<\/title> <\/head> <body> <\/p>\n<div id=\"res_script\">\n<p class='Rubrique'>2019<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02268399v1\" target=\"_blank\" >BeleniosVS: Secrecy and Verifiability against a Corrupted Voting Device<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">V\u00e9ronique Cortier, Alicia Filipiak, Joseph Lallemand<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CSF 2019 &#8211; 32nd IEEE Computer Security Foundations Symposium<\/i>, Jun 2019, Hoboken, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02268399\/file\/csf19-report%283%29.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02268399\/file\/csf19-report%283%29.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02268399\/file\/csf19-report%283%29.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02268399v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02126077v1\" target=\"_blank\" >BeleniosVS: Secrecy and Verifiability against a Corrupted Voting Device<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">V\u00e9ronique Cortier, Alicia Filipiak, Joseph Lallemand<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] CNRS, Inria, LORIA; Orange Labs. 2019<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Reports<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02126077\/file\/main-report.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02126077\/file\/main-report.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02126077\/file\/main-report.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02126077v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2018<\/p>\n<p class='SousRubrique'>Theses<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/theses.hal.science\/tel-01862680v1\" target=\"_blank\" >Design and formal analysis of security protocols, an application to electronic voting and mobile payment<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Alicia Filipiak<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">Cryptography and Security [cs.CR]. Universit\u00e9 de Lorraine, 2018. English. <a target=\"_blank\" href=\"https:\/\/www.theses.fr\/2018LORR0039\">&#x27E8;NNT : 2018LORR0039&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Theses<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/theses.hal.science\/tel-01862680\/file\/DDOC_T_2018_0039_FILIPIAK.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/theses.hal.science\/tel-01862680\/file\/DDOC_T_2018_0039_FILIPIAK.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/theses.hal.science\/tel-01862680\/file\/DDOC_T_2018_0039_FILIPIAK.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/theses.hal.science\/tel-01862680v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2017<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01408584v1\" target=\"_blank\" >Designing and proving an EMV-compliant payment protocol for mobile devices<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">V\u00e9ronique Cortier, Alicia Filipiak, Sa\u00efd Gharout, Jacques Traor\u00e9<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2nd IEEE European Symposium on Security and Privacy (EuroSP&rsquo;17)<\/i>, Apr 2017, Paris, France<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01408584\/file\/00_Papier.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01408584\/file\/00_Papier.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01408584\/file\/00_Papier.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01408584v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl><\/div>\n<p> <\/body> <\/html> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>               var _paq = _paq || [];   _paq.push([&lsquo;trackPageView&rsquo;]);   _paq.push([&lsquo;enableLinkTracking&rsquo;]);   (function() {     var u=\u00a0\u00bb\/\/piwik.inria.fr\/\u00a0\u00bb;     _paq.push([&lsquo;setTrackerUrl&rsquo;, u+&rsquo;piwik.php&rsquo;]);     _paq.push([&lsquo;setSiteId&rsquo;, 25]);     var d=document, g=d.createElement(&lsquo;script&rsquo;), s=d.getElementsByTagName(&lsquo;script&rsquo;)[0];     g.type=&rsquo;text\/javascript&rsquo;; g.async=true; g.defer=true; g.src=u+&rsquo;piwik.js&rsquo;; s.parentNode.insertBefore(g,s);   })();  <\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p>   Publications HAL de  alicia filipiak   <\/p>\n<p class='Rubrique'>2019<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<p>titre<br \/>\n<a href=\"https:\/\/inria.hal.science\/hal-02268399v1\" target=\"_blank\">BeleniosVS: Secrecy and Verifiability against a Corrupted Voting Device<\/a><br \/>\nauteur<br \/>\nV\u00e9ronique Cortier, Alicia Filipiak, Joseph Lallemand<br \/>\narticle<br \/>\n<i>CSF 2019 &#8211; 32nd IEEE Computer Security Foundations Symposium<\/i>, Jun 2019, Hoboken, United States<br \/>\ntypdoc<br \/>\nConference papers<br \/>\nAcc\u00e8s au texte int\u00e9gral et bibtex<br \/>\n <a href=\"https:\/\/inria.hal.science\/hal-02268399\/file\/csf19-report%283%29.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02268399\/file\/csf19-report%283%29.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02268399\/file\/csf19-report%283%29.pdf\" \/><\/a> <a href=\"https:\/\/inria.hal.science\/hal-02268399v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/p>\n<p class='SousRubrique'>Reports<\/p>\n<p>titre<br \/>\n<a href=\"https:\/\/inria.hal.science\/hal-02126077v1\" target=\"_blank\">BeleniosVS: Secrecy and Verifiability against a Corrupted Voting Device<\/a><br \/>\nauteur<br \/>\nV\u00e9ronique Cortier, <\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/AFilipiak\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/AFilipiak\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/AFilipiak\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/AFilipiak\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/AFilipiak\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":24,"href":"https:\/\/members.loria.fr\/AFilipiak\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/members.loria.fr\/AFilipiak\/wp-json\/wp\/v2\/pages\/13\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/AFilipiak\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}