![]() | Up a level |
Ben Ftima, M., Lafrance, S., & Léger, P. (2020). Three-dimensional modelling of shear keys in concrete gravity dams using an advanced grillage method. Water Science and Engineering, 13(3), 223-232. Available
Hadj-Alouane Nejib, B. E. N., Lafrance, S., Feng, L. I. N., Mullins, J., & Yeddes, M. (2005). Characterizing intransitive noninterference for 3-domain security policies with observability. IEEE Transactions on Automatic Control, 50(6), 920-925. External link
Hadj-Alouane, N. B., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. M. (2005). On the Verification of Intransitive Noninterference in Mulitlevel Security. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 35(5), 948-958. External link
Lafrance, S. (2006). Using Equivalence-Checking to Verify Robustness to Denial of Service. Computer Networks, 50(9), 1327-1348. External link
Lafrance, S. (2005). Spécification et validation de protocoles de sécurité [Ph.D. thesis, École Polytechnique de Montréal]. Available
Lafrance, S. (2004). Symbolic approach to the analysis of security protocols. Journal of Universal Computer Science, 10(9), 1156-1198. Available
Lafrance, S., & Mullins, J. (2003). An information flow method to detect denial of service vulnerabilities. Journal of Universal Computer Science, 9(11), 1350-1369. Available
Lafrance, S., & Mullins, J. (2002). Using admissible interference to detect denial of service attacks. (Technical Report n° EPM-RT-2002-01). Available
Lafrance, S., & Mullins, J. (2002, January). Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols [Paper]. Computing: the Australasian Theory Symposium (CATS 2002), Monash University, Melbourne, Australia (24 pages). Published in Electronic Notes in Theoretical Computer Science, 61. Available
Mullins, J., & Lafrance, S. (2003). Bisimulation-Based Non-Deterministic Admissible Interference and Its Application to the Analysis of Cryptographic Protocols. Information and Software Technology, 45(11), 779-790. External link