ACI-Rossignol : Rapport d’Activité

نویسندگان

  • D. Lugiez
  • Alexis SAURIN
  • Michael PERIN
  • Dale Miller
  • Alwen Tiu
  • Axelle Ziegler
چکیده

ACI Rossignol is composed of teams from LIF (UMR 6166), LSV (UMR 8643), INRIA Futurs (Projet Comète and projet SECSI) and Verimag (UMR 9939). The research topic of the action is ccryptographic protocol verification. Two general meetings have been held and additional meetings between sites have been organized. Futhermore the action has organized a Spring School on formal aspects on Security (Secur05), at CIRM (Marseille, April 25-29), see the web page http://www.cmi.univ-mrs.fr/~secur05

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Projet ACI Sécurité Informatique : 2003 - 2006 Rapport

1 General Description ACI Rossignol is composed of teams from LIF (UMR 6166), LSV (UMR 8643 CNRS ENS Cachan and INRIA Futurs-project SECSI), INRIA Futurs (project Comète) and Verimag (UMR 9939). The Rossignol project aims at investigating issues involved in the verification of cryptographic protocols. The focus has been put on research directions that go beyond the classical approach devised fo...

متن کامل

How Iranian EFL Learners, Persian Native Speakers, and English Native Speakers Attempt to Manage Rapport in Service Encounters

This study aims to examine the cross-cultural similarities and differences in the use of rapport management strategies (rapport enhancement, rapport maintenance, rapport neglect, and rapport challenge) in the complaints during service encounters based on Spencer Oatey’s (2008) model. To this end, 90 participants (30 Persian native speakers, 30 Iranian EFL (English as a foreign language) learner...

متن کامل

Intruder Deduction for the Equational Theory of Exclusive-or with Distributive Encryption *

Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocols are based on rewriting techniques and automated deduction in order to implement or mimic the process calculus describing the execution of a protocol. We are interested in the intruder deduction problem, that is the ...

متن کامل

Manifesting the Reprimanding Response Behavior of Native Persian Speakers and EFL Learners Using Rapport Management Approach

Using Spencer-Oatey’s (2004, 2008) Rapport Management approach, this study was conducted to elicit the reprimanding response behavior of native Persian speakers and EFL Learners. The participants of this study were 30 native Persian speakers and 60 EFL learners. To fulfill the purposes of this study, a six-binary situation Interactive Discourse Completion (IDCT) Task was utilized. Emotion Liker...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006