{"id":13,"date":"2015-06-15T10:26:53","date_gmt":"2015-06-15T08:26:53","guid":{"rendered":"http:\/\/members.loria.fr\/thierrygartiser\/?page_id=13"},"modified":"2023-01-16T15:23:10","modified_gmt":"2023-01-16T13:23:10","slug":"publications","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/MRacouchot\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p>   <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD XHTML 1.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/xhtml1\/DTD\/xhtml1-transitional.dtd\"> <html xmlns='http:\/\/www.w3.org\/1999\/xhtml' xml:lang='fr' lang='fr'> <head> <meta name=\"robots\" content=\"noindex, nofollow\" \/> <meta http-equiv=\"content-type\" content= \"text\/html;charset=UTF-8\" \/> <meta http-equiv=\"Content-Language\" content=\"fr\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"..\/css\/VisuGen.css\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/haltools.inria.fr\/\/css\/VisuRubriqueEncadre.css\" \/> <!-- Piwik haltools.inria.fr--> <script type=\"text\/javascript\">   var _paq = _paq || [];   _paq.push(['trackPageView']);   _paq.push(['enableLinkTracking']);   (function() {     var u=\"\/\/piwik.inria.fr\/\";     _paq.push(['setTrackerUrl', u+'piwik.php']);     _paq.push(['setSiteId', 25]);     var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];     g.type='text\/javascript'; g.async=true; g.defer=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s);   })(); <\/script> <noscript><\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p><\/noscript> <!-- End Piwik Code -->  <title>Publications HAL de  Ma\u00efwenn,Racouchot<\/title> <\/head> <body> <\/p>\n<div id=\"res_script\">\n<p class='Rubrique'>2025<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05038009v2\" target=\"_blank\" >Attacking and Fixing the Android Protected Confirmation Protocol<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Myrto Arapinis, Vincent Danos, Ma\u00efwenn Racouchot, David Robin, Thomas Zacharias<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The 10th IEEE European Symposium on Security and Privacy<\/i>, Ca&rsquo; Foscari University of Venice, Venice, Italy, Jun 2025, Venice, Italy. pp.458-479, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/EuroSP63326.2025.00034\">&#x27E8;10.1109\/EuroSP63326.2025.00034&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-05038009\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05038009\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05038009\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05038009v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2024<\/p>\n<p class='SousRubrique'>Theses<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/tel-04965599v1\" target=\"_blank\" >Formal analysis of security protocols:real-world case-studies and automated proof strategies<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ma\u00efwenn Racouchot<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">Computer Science [cs]. Universit\u00e9 de Lorraine, 2024. English. <a target=\"_blank\" href=\"https:\/\/www.theses.fr\/2024LORR0186\">&#x27E8;NNT : 2024LORR0186&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Theses<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/tel-04965599\/file\/DDOC_T_2024_0186_RACOUCHOT.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/tel-04965599\/file\/DDOC_T_2024_0186_RACOUCHOT.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/tel-04965599\/file\/DDOC_T_2024_0186_RACOUCHOT.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/tel-04965599v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2023<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03810102v1\" target=\"_blank\" >A comprehensive, formal and automated analysis of the EDHOC protocol<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Charlie Jacomme, Elise Klein, Steve Kremer, Ma\u00efwenn Racouchot<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>USENIX Security &rsquo;23 &#8211; 32nd USENIX Security Symposium<\/i>, Aug 2023, Anaheim, CA, United States<\/dd>\n<dt class=\"ChampRes\">typdoc<\/dt>\n<dd class=\"ValeurRes Type_de_document\">Conference papers<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03810102\/file\/paper.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03810102\/file\/paper.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03810102\/file\/paper.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03810102v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl><\/div>\n<p> <\/body> <\/html> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>               var _paq = _paq || [];   _paq.push([&lsquo;trackPageView&rsquo;]);   _paq.push([&lsquo;enableLinkTracking&rsquo;]);   (function() {     var u=\u00a0\u00bb\/\/piwik.inria.fr\/\u00a0\u00bb;     _paq.push([&lsquo;setTrackerUrl&rsquo;, u+&rsquo;piwik.php&rsquo;]);     _paq.push([&lsquo;setSiteId&rsquo;, 25]);     var d=document, g=d.createElement(&lsquo;script&rsquo;), s=d.getElementsByTagName(&lsquo;script&rsquo;)[0];     g.type=&rsquo;text\/javascript&rsquo;; g.async=true; g.defer=true; g.src=u+&rsquo;piwik.js&rsquo;; s.parentNode.insertBefore(g,s);   })();  <\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p>   Publications HAL de  Ma\u00efwenn,Racouchot   <\/p>\n<p class='Rubrique'>2025<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<p>titre<br \/>\n<a href=\"https:\/\/hal.science\/hal-05038009v2\" target=\"_blank\">Attacking and Fixing the Android Protected Confirmation Protocol<\/a><br \/>\nauteur<br \/>\nMyrto Arapinis, Vincent Danos, Ma\u00efwenn Racouchot, David Robin, Thomas Zacharias<br \/>\narticle<br \/>\n<i>The 10th IEEE European Symposium on Security and Privacy<\/i>, Ca&rsquo; Foscari University of Venice, Venice, Italy, Jun 2025, Venice, Italy. pp.458-479, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/EuroSP63326.2025.00034\">&#x27E8;10.1109\/EuroSP63326.2025.00034&#x27E9;<\/a><br \/>\ntypdoc<br \/>\nConference papers<br \/>\nAcc\u00e8s au texte int\u00e9gral et bibtex<br \/>\n <a href=\"https:\/\/hal.science\/hal-05038009\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05038009\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05038009\/file\/main.pdf\" \/><\/a> <a href=\"https:\/\/hal.science\/hal-05038009v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/p>\n<p class='Rubrique'>2024<\/p>\n<p class='SousRubrique'>Theses<\/p>\n<p>titre<br \/>\n<a href=\"https:\/\/hal.science\/tel-04965599v1\" target=\"_blank\">Formal analysis of security protocols:real-world case-studies and automated proof strategies<\/a><br \/>\nauteur<br \/>\nMa\u00efwenn Racouchot<br \/>\narticle<br \/>\nComputer Science [cs]. <\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/MRacouchot\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/MRacouchot\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/MRacouchot\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/MRacouchot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/MRacouchot\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":26,"href":"https:\/\/members.loria.fr\/MRacouchot\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/members.loria.fr\/MRacouchot\/wp-json\/wp\/v2\/pages\/13\/revisions\/317"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/MRacouchot\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}