Stéphane Glondu
Title
Cited by
Cited by
Year
Deckard: Scalable and accurate tree-based detection of code clones
L Jiang, G Misherghi, Z Su, S Glondu
29th International Conference on Software Engineering (ICSE'07), 96-105, 2007
10922007
Election verifiability for Helios under weaker trust assumptions
V Cortier, D Galindo, S Glondu, M Izabachene
European Symposium on Research in Computer Security, 327-344, 2014
1202014
Distributed ElGamal á la Pedersen: application to Helios
V Cortier, D Galindo, S Glondu, M Izabachène
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
442013
A generic construction for voting correctness at minimum cost-Application to Helios.
V Cortier, D Galindo, S Glondu, M Izabachene
IACR Cryptology ePrint Archive 2013, 177, 2013
272013
Belenios: a simple private and verifiable electronic voting system
V Cortier, P Gaudry, S Glondu
Foundations of Security, Protocols, and Equational Reasoning, 214-238, 2019
222019
Extraction certifiée dans Coq-en-Coq
S Glondu
Actes de la conférence JFLA 2009 (Vingtièmes Journées Francophones des …, 2009
152009
Vers une certification de l'extraction de Coq
S Glondu
Université Paris Diderot, 2012
102012
Belenios specification
S Glondu
Version 0.1. http://www. belenios. org/specification. pdf, 2013
62013
Enforcing Type-Safe Linking using Inter-Package Relationships.
M Dogguy, S Glondu, S Le Gall, S Zacchiroli
Stud. Inform. Univ. 9 (1), 129-157, 2011
52011
Garantie formelle de correction pour l’extraction Coq
S Glondu
Master’s thesis, Université Paris 7, 2007
32007
Coq 8.4 Reference Manual
P Boutillier, S Glondu, B Grégoire, H Herbelin, P Letouzey, PM Pédrot, ...
Inria, 2014
22014
Ten years of hunting for similar code for fun and profit (keynote)
S Glondu, L Jiang, Z Su
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
2018
(a voté) Euh non: a cliqué
V Cortier, P Gaudry, S Glondu
Blog Binaire LeMonde. fr, 2018
2018
Deckard-a tree-based, scalable, and accurate code clone detection tool (version 1.2. 3)
L Jiang, G Misherghi, Z Su, S Glondu
2012
Analysis of authentication protocols Intership report
S Glondu
2006
Internship report: Uniform and non-structural subtyping
S Glondu, SZ Su
2005
Les arbres binaires de recherche équilibrés
S Glondu
Certifying confluence in a timed process calculus
M Dogguy, S Glondu
The system can't perform the operation now. Try again later.
Articles 1–18