Tree automata techniques and applications H Comon, M Dauchet, R Gilleron, F Jacquemard, D Lugiez, C Löding, ... | 1627 | 2008 |

Tree automata techniques and applications (2007) H Comon, M Dauchet, R Gilleron, F Jacquemard, D Lugiez, S Tison, ... | 410 | 2007 |

Equational problems anddisunification H Comon, P Lescanne Journal of Symbolic Computation 7 (3-4), 371-425, 1989 | 315 | 1989 |

Multiple counters automata, safety analysis and Presburger arithmetic H Comon, Y Jurski Computer Aided Verification: 10th International Conference, CAV'98 Vancouver …, 1998 | 290 | 1998 |

Intruder deductions, constraint solving and insecurity decision in presence of exclusive or H Comon-Lundh, V Shmatikov 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings …, 2003 | 244 | 2003 |

The finite variant property: How to get rid of some algebraic properties H Comon-Lundh, S Delaune Term Rewriting and Applications: 16th International Conference, RTA 2005 …, 2005 | 213 | 2005 |

Disuni cation: a survey H Comon Computational Logic. Essays in honor of Alan Robinson, 322-359, 1991 | 209 | 1991 |

Diophantine equations, Presburger arithmetic and finite automata A Boudet, H Comon CAAP 1059, 30-43, 1996 | 165 | 1996 |

Computational soundness of observational equivalence H Comon-Lundh, V Cortier Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 127 | 2008 |

New decidability results for fragments of first-order logic and application to cryptographic protocols H Comon-Lundh, V Cortier Rewriting Techniques and Applications: 14th International Conference, RTA …, 2003 | 125 | 2003 |

Timed automata and the theory of real numbers H Comon, Y Jurski CONCUR 99, 242-257, 1999 | 119 | 1999 |

Inductionless induction H Comon Handbook of Automated Reasoning, 913-962, 2001 | 115 | 2001 |

Unification et disunification: Théorie et applications H Comon Institut National Polytechnique de Grenoble-INPG, 1988 | 111 | 1988 |

Is it possible to decide whether a cryptographic protocol is secure or not? H Comon, V Shmatikov Journal of Telecommunications and Information Technology, 5-15, 2002 | 110 | 2002 |

Tree automata with one memory set constraints and cryptographic protocols H Comon, V Cortier Theoretical Computer Science 331 (1), 143-214, 2005 | 103 | 2005 |

Solving symbolic ordering constraints H Comon International Journal of Foundations of Computer Science 1 (04), 387-411, 1990 | 103 | 1990 |

Equational formulas with membership constraints H Comon, C Delor Information and Computation 112 (2), 167-216, 1994 | 101 | 1994 |

Models and proofs of protocol security: A progress report M Abadi, B Blanchet, H Comon-Lundh Computer Aided Verification: 21st International Conference, CAV 2009 …, 2009 | 96 | 2009 |

Security properties: two agents are sufficient H Comon-Lundh, V Cortier Programming Languages and Systems: 12th European Symposium on Programming …, 2003 | 96 | 2003 |

Trace equivalence decision: Negative tests and non-determinism V Cheval, H Comon-Lundh, S Delaune Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 90 | 2011 |