Skip to Main content Skip to Navigation

Department 2: Formal methods

 For all your questions or comments about this collection, please contact us at:


Latest deposits

Chargement de la page




Number of full text documents


Submissions distribution by document type


Authentication Privacy Termination Formal methods Trace Formal language Rewriting Term rewriting Protocols Combination Logarithms Equational theories Vérification Formal verification Formal Methods Semantics Adding machine Operational transformation Applied π-Calculus Optimistic replication Decision procedure Modelling Automated reasoning Symbolic animation Déduction automatique Satisfiability Modulo Theories Tilings Reachability Unification Verification Sécurité Schwilgué Refinement E-voting Tree automata Security protocols Secrecy Symbolic model Event-B Proof assistants Distributed systems Computability Protocoles Temporal logic Combination of decision procedures Algorithms Abstract model Narrowing Proof-based development Automated verification Cryptography Security Distributed algorithms Computable analysis Réécriture SMT Sines Méthodes formelles Online Social Networks OSN Collaborative editors Satisfiability Social networks Malware Calculating machine Algorithmic randomness Protocol Web services Constraint solving Automated deduction Behavioral detection Formal Verification Intrusion detection Edward Sang Détection d'intrusions Abstraction Decision procedures XPath Complexity Operational Transformation Modélisation Protocoles cryptographiques Model checking Model-checking TLA+ Completeness Simulation Algorithm Polymorphism Animation Augmented human Implicit computational complexity First-order logic Raffinement Test generation Decidability Machine Theorem proving Cryptographic protocols Composition Validation