BibTeX records: Hubert Comon-Lundh

download as .bib file

@inproceedings{DBLP:conf/ccs/ComonJS20,
  author       = {Hubert Comon and
                  Charlie Jacomme and
                  Guillaume Scerri},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Oracle Simulation: {A} Technique for Protocol Composition with Long
                  Term Shared Secrets},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1427--1444},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417229},
  doi          = {10.1145/3372297.3417229},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ComonJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ChevalCD17,
  author       = {Vincent Cheval and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  title        = {A procedure for deciding symbolic equivalence between sets of constraint
                  systems},
  journal      = {Inf. Comput.},
  volume       = {255},
  pages        = {94--125},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ic.2017.05.004},
  doi          = {10.1016/J.IC.2017.05.004},
  timestamp    = {Mon, 31 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/ChevalCD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ComonK17,
  author       = {Hubert Comon and
                  Adrien Koutsos},
  title        = {Formal Computational Unlinkability Proofs of {RFID} Protocols},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {100--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.9},
  doi          = {10.1109/CSF.2017.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ComonK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ComonK17,
  author       = {Hubert Comon and
                  Adrien Koutsos},
  title        = {Formal Computational Unlinkability Proofs of {RFID} Protocols},
  journal      = {CoRR},
  volume       = {abs/1705.02296},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.02296},
  eprinttype    = {arXiv},
  eprint       = {1705.02296},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ComonK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/BursucCD14,
  author       = {Sergiu Bursuc and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  title        = {Deducibility constraints and blind signatures},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {106--127},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.006},
  doi          = {10.1016/J.IC.2014.07.006},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/BursucCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BanaC14,
  author       = {Gergei Bana and
                  Hubert Comon{-}Lundh},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {A Computationally Complete Symbolic Attacker for Equivalence Properties},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {609--620},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660276},
  doi          = {10.1145/2660267.2660276},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BanaC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/Comon-LundhCS13,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier and
                  Guillaume Scerri},
  editor       = {Maria Paola Bonacina},
  title        = {Tractable Inference Systems: An Extension with a Deducibility Predicate},
  booktitle    = {Automated Deduction - {CADE-24} - 24th International Conference on
                  Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7898},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38574-2\_6},
  doi          = {10.1007/978-3-642-38574-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/Comon-LundhCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/Comon-Lundh13,
  author       = {Hubert Comon{-}Lundh},
  title        = {{LICS:} Logic in Computer Security - Some Attacker's Models and Related
                  Decision Problems},
  booktitle    = {28th Annual {ACM/IEEE} Symposium on Logic in Computer Science, {LICS}
                  2013, New Orleans, LA, USA, June 25-28, 2013},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/LICS.2013.68},
  doi          = {10.1109/LICS.2013.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/Comon-Lundh13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/Comon-LundhM12,
  author       = {Hubert Comon{-}Lundh and
                  Catherine Meadows},
  title        = {Special Issue on Security and Rewriting Foreword},
  journal      = {J. Autom. Reason.},
  volume       = {48},
  number       = {2},
  pages        = {133--134},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10817-011-9242-1},
  doi          = {10.1007/S10817-011-9242-1},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/Comon-LundhM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Comon-LundhHKS12,
  author       = {Hubert Comon{-}Lundh and
                  Masami Hagiya and
                  Yusuke Kawamoto and
                  Hideki Sakurada},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {Computational Soundness of Indistinguishability Properties without
                  Computable Parsing},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {63--79},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_5},
  doi          = {10.1007/978-3-642-29101-2\_5},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/Comon-LundhHKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/Comon-LundhCS12,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier and
                  Guillaume Scerri},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Security Proof with Dishonest Keys},
  booktitle    = {Principles of Security and Trust - First International Conference,
                  {POST} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7215},
  pages        = {149--168},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28641-4\_9},
  doi          = {10.1007/978-3-642-28641-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/Comon-LundhCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BanaC12,
  author       = {Gergei Bana and
                  Hubert Comon{-}Lundh},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Towards Unconditional Soundness: Computationally Complete Symbolic
                  Attacker},
  booktitle    = {Principles of Security and Trust - First International Conference,
                  {POST} 2012, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
                  - April 1, 2012, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7215},
  pages        = {189--208},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28641-4\_11},
  doi          = {10.1007/978-3-642-28641-4\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BanaC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/Comon-LundhD12,
  author       = {Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  editor       = {Tobias Nipkow and
                  Orna Grumberg and
                  Benedikt Hauptmann},
  title        = {Formal Security Proofs},
  booktitle    = {Software Safety and Security - Tools for Analysis and Verification},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {33},
  pages        = {26--63},
  publisher    = {{IOS} Press},
  year         = {2012},
  url          = {https://doi.org/10.3233/978-1-61499-028-4-26},
  doi          = {10.3233/978-1-61499-028-4-26},
  timestamp    = {Wed, 04 Mar 2020 14:10:38 +0100},
  biburl       = {https://dblp.org/rec/series/natosec/Comon-LundhD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Comon-LundhCS12,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier and
                  Guillaume Scerri},
  title        = {Security proof with dishonest keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Comon-LundhCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanaC12,
  author       = {Gergei Bana and
                  Hubert Comon{-}Lundh},
  title        = {Towards Unconditional Soundness: Computationally Complete Symbolic
                  Attacker},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanaC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChevalCD11,
  author       = {Vincent Cheval and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Trace equivalence decision: negative tests and non-determinism},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {321--330},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046744},
  doi          = {10.1145/2046707.2046744},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChevalCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/Comon-LundhC11,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier},
  editor       = {Thomas Schwentick and
                  Christoph D{\"{u}}rr},
  title        = {How to prove security of communication protocols? {A} discussion on
                  the soundness of formal models w.r.t. computational ones},
  booktitle    = {28th International Symposium on Theoretical Aspects of Computer Science,
                  {STACS} 2011, March 10-12, 2011, Dortmund, Germany},
  series       = {LIPIcs},
  volume       = {9},
  pages        = {29--44},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2011},
  url          = {https://doi.org/10.4230/LIPIcs.STACS.2011.29},
  doi          = {10.4230/LIPICS.STACS.2011.29},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/stacs/Comon-LundhC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/Comon-LundhDM11,
  author       = {Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune and
                  Jonathan K. Millen},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Constraint solving techniques and enriching the model with equational
                  theories},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {35--61},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-35},
  doi          = {10.3233/978-1-60750-714-7-35},
  timestamp    = {Fri, 15 May 2020 12:11:04 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/Comon-LundhDM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Comon-LundhKM11,
  author       = {Hubert Comon{-}Lundh and
                  Ralf K{\"{u}}sters and
                  Catherine Meadows},
  title        = {Security and Rewriting (Dagstuhl Seminar 11332)},
  journal      = {Dagstuhl Reports},
  volume       = {1},
  number       = {8},
  pages        = {53--66},
  year         = {2011},
  url          = {https://doi.org/10.4230/DagRep.1.8.53},
  doi          = {10.4230/DAGREP.1.8.53},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Comon-LundhKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/Comon-LundhCZ10,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier and
                  Eugen Zalinescu},
  title        = {Deciding security properties for cryptographic protocols. application
                  to key cycles},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {11},
  number       = {2},
  pages        = {9:1--9:42},
  year         = {2010},
  url          = {https://doi.org/10.1145/1656242.1656244},
  doi          = {10.1145/1656242.1656244},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocl/Comon-LundhCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/ChevalCD10,
  author       = {Vincent Cheval and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  editor       = {J{\"{u}}rgen Giesl and
                  Reiner H{\"{a}}hnle},
  title        = {Automating Security Analysis: Symbolic Equivalence of Constraint Systems},
  booktitle    = {Automated Reasoning, 5th International Joint Conference, {IJCAR} 2010,
                  Edinburgh, UK, July 16-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6173},
  pages        = {412--426},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14203-1\_35},
  doi          = {10.1007/978-3-642-14203-1\_35},
  timestamp    = {Wed, 25 Sep 2019 18:19:14 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/ChevalCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsiaml/Comon-LundhKS09,
  author       = {Hubert Comon{-}Lundh and
                  Yusuke Kawamoto and
                  Hideki Sakurada},
  title        = {Computational and Symbolic Anonymity in an Unbounded Network},
  journal      = {{JSIAM} Lett.},
  volume       = {1},
  pages        = {28--31},
  year         = {2009},
  url          = {https://doi.org/10.14495/jsiaml.1.28},
  doi          = {10.14495/JSIAML.1.28},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsiaml/Comon-LundhKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/BursucCD09,
  author       = {Sergiu Bursuc and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  editor       = {Anupam Datta},
  title        = {Deducibility Constraints},
  booktitle    = {Advances in Computer Science - {ASIAN} 2009. Information Security
                  and Privacy, 13th Asian Computing Science Conference, Seoul, Korea,
                  December 14-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5913},
  pages        = {24--38},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10622-4\_3},
  doi          = {10.1007/978-3-642-10622-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/BursucCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/AbadiBC09,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet and
                  Hubert Comon{-}Lundh},
  editor       = {Ahmed Bouajjani and
                  Oded Maler},
  title        = {Models and Proofs of Protocol Security: {A} Progress Report},
  booktitle    = {Computer Aided Verification, 21st International Conference, {CAV}
                  2009, Grenoble, France, June 26 - July 2, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5643},
  pages        = {35--49},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02658-4\_5},
  doi          = {10.1007/978-3-642-02658-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/AbadiBC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/psec/AffeldtC09,
  author       = {Reynald Affeldt and
                  Hubert Comon{-}Lundh},
  editor       = {V{\'{e}}ronique Cortier and
                  Claude Kirchner and
                  Mitsuhiro Okada and
                  Hideki Sakurada},
  title        = {Verification of Security Protocols with a Bounded Number of Sessions
                  Based on Resolution for Rigid Variables},
  booktitle    = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese
                  Collaboration},
  series       = {Lecture Notes in Computer Science},
  volume       = {5458},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02002-5\_1},
  doi          = {10.1007/978-3-642-02002-5\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/psec/AffeldtC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/BursucC09,
  author       = {Sergiu Bursuc and
                  Hubert Comon{-}Lundh},
  editor       = {Ralf Treinen},
  title        = {Protocol Security and Algebraic Properties: Decision Results for a
                  Bounded Number of Sessions},
  booktitle    = {Rewriting Techniques and Applications, 20th International Conference,
                  {RTA} 2009, Bras{\'{\i}}lia, Brazil, June 29 - July 1, 2009,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5595},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02348-4\_10},
  doi          = {10.1007/978-3-642-02348-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/BursucC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmcs/Comon-LundhJP08,
  author       = {Hubert Comon{-}Lundh and
                  Florent Jacquemard and
                  Nicolas Perrin},
  title        = {Visibly Tree Automata with Memory and Constraints},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {4},
  number       = {2},
  year         = {2008},
  url          = {https://doi.org/10.2168/LMCS-4(2:8)2008},
  doi          = {10.2168/LMCS-4(2:8)2008},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lmcs/Comon-LundhJP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/Comon-Lundh08,
  author       = {Hubert Comon{-}Lundh},
  editor       = {Alessandro Armando and
                  Peter Baumgartner and
                  Gilles Dowek},
  title        = {Challenges in the Automated Verification of Security Protocols},
  booktitle    = {Automated Reasoning, 4th International Joint Conference, {IJCAR} 2008,
                  Sydney, Australia, August 12-15, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5195},
  pages        = {396--409},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71070-7\_34},
  doi          = {10.1007/978-3-540-71070-7\_34},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/Comon-Lundh08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Comon-LundhC08,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Computational soundness of observational equivalence},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {109--118},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455786},
  doi          = {10.1145/1455770.1455786},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Comon-LundhC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/Comon-Lundh08,
  author       = {Hubert Comon{-}Lundh},
  editor       = {Ramesh Hariharan and
                  Madhavan Mukund and
                  V. Vinay},
  title        = {About models of security protocols},
  booktitle    = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2008, December 9-11, 2008,
                  Bangalore, India},
  series       = {LIPIcs},
  volume       = {2},
  pages        = {352--356},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2008},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2008.1766},
  doi          = {10.4230/LIPICS.FSTTCS.2008.1766},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/Comon-Lundh08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0804-3065,
  author       = {Hubert Comon{-}Lundh and
                  Florent Jacquemard and
                  Nicolas Perrin},
  title        = {Visibly Tree Automata with Memory and Constraints},
  journal      = {CoRR},
  volume       = {abs/0804.3065},
  year         = {2008},
  url          = {http://arxiv.org/abs/0804.3065},
  eprinttype    = {arXiv},
  eprint       = {0804.3065},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0804-3065.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BursucCD07,
  author       = {Sergiu Bursuc and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  editor       = {Hubert Comon{-}Lundh and
                  Claude Kirchner and
                  H{\'{e}}l{\`{e}}ne Kirchner},
  title        = {Deducibility Constraints, Equational Theory and Electronic Money},
  booktitle    = {Rewriting, Computation and Proof, Essays Dedicated to Jean-Pierre
                  Jouannaud on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {4600},
  pages        = {196--212},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73147-4\_10},
  doi          = {10.1007/978-3-540-73147-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BursucCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/Comon-LundhJP07,
  author       = {Hubert Comon{-}Lundh and
                  Florent Jacquemard and
                  Nicolas Perrin},
  editor       = {Helmut Seidl},
  title        = {Tree Automata with Memory, Visibility and Structural Constraints},
  booktitle    = {Foundations of Software Science and Computational Structures, 10th
                  International Conference, {FOSSACS} 2007, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2007,
                  Braga, Portugal, March 24-April 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4423},
  pages        = {168--182},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71389-0\_13},
  doi          = {10.1007/978-3-540-71389-0\_13},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/Comon-LundhJP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/BursucCD07,
  author       = {Sergiu Bursuc and
                  Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  editor       = {Wolfgang Thomas and
                  Pascal Weil},
  title        = {Associative-Commutative Deducibility Constraints},
  booktitle    = {{STACS} 2007, 24th Annual Symposium on Theoretical Aspects of Computer
                  Science, Aachen, Germany, February 22-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4393},
  pages        = {634--645},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70918-3\_54},
  doi          = {10.1007/978-3-540-70918-3\_54},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/BursucCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2007jouannaud,
  editor       = {Hubert Comon{-}Lundh and
                  Claude Kirchner and
                  H{\'{e}}l{\`{e}}ne Kirchner},
  title        = {Rewriting, Computation and Proof, Essays Dedicated to Jean-Pierre
                  Jouannaud on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {4600},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73147-4},
  doi          = {10.1007/978-3-540-73147-4},
  isbn         = {978-3-540-73146-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/2007jouannaud.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0708-3564,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier and
                  Eugen Zalinescu},
  title        = {Deciding security properties for cryptographic protocols. Application
                  to key cycles},
  journal      = {CoRR},
  volume       = {abs/0708.3564},
  year         = {2007},
  url          = {http://arxiv.org/abs/0708.3564},
  eprinttype    = {arXiv},
  eprint       = {0708.3564},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0708-3564.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/BernatC06,
  author       = {Vincent Bernat and
                  Hubert Comon{-}Lundh},
  editor       = {Mitsu Okada and
                  Ichiro Satoh},
  title        = {Normal Proofs in Intruder Theories},
  booktitle    = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related
                  Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December
                  6-8, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4435},
  pages        = {151--166},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-77505-8\_12},
  doi          = {10.1007/978-3-540-77505-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/BernatC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ComonC05,
  author       = {Hubert Comon and
                  V{\'{e}}ronique Cortier},
  title        = {Tree automata with one memory set constraints and cryptographic protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {331},
  number       = {1},
  pages        = {143--214},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.tcs.2004.09.036},
  doi          = {10.1016/J.TCS.2004.09.036},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ComonC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asm/Comon-Lundh05,
  author       = {Hubert Comon{-}Lundh},
  title        = {Normal Attacks on Security Protocols},
  booktitle    = {Proceedings of the 12th International Workshop on Abstract State Machines,
                  {ASM} 2005, March 8-11, 2005, Paris, France},
  pages        = {70},
  year         = {2005},
  url          = {http://www.univ-paris12.fr/lacl/dima/asm05/comon.ps},
  timestamp    = {Thu, 26 Jul 2007 15:03:11 +0200},
  biburl       = {https://dblp.org/rec/conf/asm/Comon-Lundh05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/Comon-LundhD05,
  author       = {Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune},
  editor       = {J{\"{u}}rgen Giesl},
  title        = {The Finite Variant Property: How to Get Rid of Some Algebraic Properties},
  booktitle    = {Term Rewriting and Applications, 16th International Conference, {RTA}
                  2005, Nara, Japan, April 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3467},
  pages        = {294--307},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32033-3\_22},
  doi          = {10.1007/978-3-540-32033-3\_22},
  timestamp    = {Wed, 25 Sep 2019 18:23:35 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/Comon-LundhD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/Comon-LundhC04,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier},
  title        = {Security properties: two agents are sufficient},
  journal      = {Sci. Comput. Program.},
  volume       = {50},
  number       = {1-3},
  pages        = {51--71},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.scico.2003.12.002},
  doi          = {10.1016/J.SCICO.2003.12.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/Comon-LundhC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/Comon-Lundh04,
  author       = {Hubert Comon{-}Lundh},
  editor       = {Igor Walukiewicz},
  title        = {Intruder Theories (Ongoing Work)},
  booktitle    = {Foundations of Software Science and Computation Structures, 7th International
                  Conference, {FOSSACS} 2004, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2004, Barcelona, Spain,
                  March 29 - April 2, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2987},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24727-2\_1},
  doi          = {10.1007/978-3-540-24727-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/Comon-Lundh04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ComonJ03,
  author       = {Hubert Comon and
                  Florent Jacquemard},
  title        = {Ground reducibility is EXPTIME-complete},
  journal      = {Inf. Comput.},
  volume       = {187},
  number       = {1},
  pages        = {123--153},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0890-5401(03)00134-2},
  doi          = {10.1016/S0890-5401(03)00134-2},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ComonJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/ComonNNR03,
  author       = {Hubert Comon and
                  Paliath Narendran and
                  Robert Nieuwenhuis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Deciding the confluence of ordered term rewrite systems},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {4},
  number       = {1},
  pages        = {33--55},
  year         = {2003},
  url          = {https://doi.org/10.1145/601775.601777},
  doi          = {10.1145/601775.601777},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocl/ComonNNR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Comon-LundhT03,
  author       = {Hubert Comon{-}Lundh and
                  Ralf Treinen},
  editor       = {Nachum Dershowitz},
  title        = {Easy Intruder Deductions},
  booktitle    = {Verification: Theory and Practice, Essays Dedicated to Zohar Manna
                  on the Occasion of His 64th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {2772},
  pages        = {225--242},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39910-0\_10},
  doi          = {10.1007/978-3-540-39910-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Comon-LundhT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/Comon-LundhC03,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier},
  editor       = {Pierpaolo Degano},
  title        = {Security Properties: Two Agents Are Sufficient},
  booktitle    = {Programming Languages and Systems, 12th European Symposium on Programming,
                  {ESOP} 2003, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2003, Warsaw, Poland, April 7-11,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2618},
  pages        = {99--113},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36575-3\_8},
  doi          = {10.1007/3-540-36575-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/Comon-LundhC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/Comon-LundhS03,
  author       = {Hubert Comon{-}Lundh and
                  Vitaly Shmatikov},
  title        = {Intruder Deductions, Constraint Solving and Insecurity Decision in
                  Presence of Exclusive or},
  booktitle    = {18th {IEEE} Symposium on Logic in Computer Science {(LICS} 2003),
                  22-25 June 2003, Ottawa, Canada, Proceedings},
  pages        = {271},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/LICS.2003.1210067},
  doi          = {10.1109/LICS.2003.1210067},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/Comon-LundhS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/Comon-LundhC03,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier},
  editor       = {Robert Nieuwenhuis},
  title        = {New Decidability Results for Fragments of First-Order Logic and Application
                  to Cryptographic Protocols},
  booktitle    = {Rewriting Techniques and Applications, 14th International Conference,
                  {RTA} 2003, Valencia, Spain, June 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2706},
  pages        = {148--164},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44881-0\_12},
  doi          = {10.1007/3-540-44881-0\_12},
  timestamp    = {Sun, 02 Oct 2022 16:14:20 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/Comon-LundhC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/ComonGN01,
  author       = {Hubert Comon and
                  Guillem Godoy and
                  Robert Nieuwenhuis},
  title        = {The Confluence of Ground Term Rewrite Systems is Decidable in Polynomial
                  Time},
  booktitle    = {42nd Annual Symposium on Foundations of Computer Science, {FOCS} 2001,
                  14-17 October 2001, Las Vegas, Nevada, {USA}},
  pages        = {298--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SFCS.2001.959904},
  doi          = {10.1109/SFCS.2001.959904},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/ComonGN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ComonCM01,
  author       = {Hubert Comon and
                  V{\'{e}}ronique Cortier and
                  John Mitchell},
  editor       = {Fernando Orejas and
                  Paul G. Spirakis and
                  Jan van Leeuwen},
  title        = {Tree Automata with One Memory, Set Constraints, and Ping-Pong Protocols},
  booktitle    = {Automata, Languages and Programming, 28th International Colloquium,
                  {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2076},
  pages        = {682--693},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-48224-5\_56},
  doi          = {10.1007/3-540-48224-5\_56},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/ComonCM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/el/RV01/Comon01,
  author       = {Hubert Comon},
  editor       = {John Alan Robinson and
                  Andrei Voronkov},
  title        = {Inductionless Induction},
  booktitle    = {Handbook of Automated Reasoning (in 2 volumes)},
  pages        = {913--962},
  publisher    = {Elsevier and {MIT} Press},
  year         = {2001},
  url          = {https://doi.org/10.1016/b978-044450813-3/50016-3},
  doi          = {10.1016/B978-044450813-3/50016-3},
  timestamp    = {Thu, 25 Jul 2019 12:26:00 +0200},
  biburl       = {https://dblp.org/rec/books/el/RV01/Comon01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cav/2001,
  editor       = {G{\'{e}}rard Berry and
                  Hubert Comon and
                  Alain Finkel},
  title        = {Computer Aided Verification, 13th International Conference, {CAV}
                  2001, Paris, France, July 18-22, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2102},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44585-4},
  doi          = {10.1007/3-540-44585-4},
  isbn         = {3-540-42345-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccl/1999,
  editor       = {Hubert Comon and
                  Claude March{\'{e}} and
                  Ralf Treinen},
  title        = {Constraints in Computational Logics: Theory and Applications, International
                  Summer School, CCL'99 Gif-sur-Yvette, France, September 5-8, 1999,
                  Revised Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {2002},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45406-3},
  doi          = {10.1007/3-540-45406-3},
  isbn         = {3-540-41950-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccl/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Comon00,
  author       = {Hubert Comon},
  title        = {Sequentiality, Monadic Second-Order Logic and Tree Automata},
  journal      = {Inf. Comput.},
  volume       = {157},
  number       = {1-2},
  pages        = {25--51},
  year         = {2000},
  url          = {https://doi.org/10.1006/inco.1999.2838},
  doi          = {10.1006/INCO.1999.2838},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Comon00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ComonN00,
  author       = {Hubert Comon and
                  Robert Nieuwenhuis},
  title        = {Induction=I-Axiomatization+First-Order Consistency},
  journal      = {Inf. Comput.},
  volume       = {159},
  number       = {1-2},
  pages        = {151--186},
  year         = {2000},
  url          = {https://doi.org/10.1006/inco.2000.2875},
  doi          = {10.1006/INCO.2000.2875},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/ComonN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/ComonC00,
  author       = {Hubert Comon and
                  V{\'{e}}ronique Cortier},
  editor       = {Peter Clote and
                  Helmut Schwichtenberg},
  title        = {Flatness Is Not a Weakness},
  booktitle    = {Computer Science Logic, 14th Annual Conference of the EACSL, Fischbachau,
                  Germany, August 21-26, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1862},
  pages        = {262--276},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44622-2\_17},
  doi          = {10.1007/3-540-44622-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/ComonC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/constraints/ComonDJK99,
  author       = {Hubert Comon and
                  Mehmet Dincbas and
                  Jean{-}Pierre Jouannaud and
                  Claude Kirchner},
  title        = {A Methodological View of Constraint Solving},
  journal      = {Constraints An Int. J.},
  volume       = {4},
  number       = {4},
  pages        = {337--361},
  year         = {1999},
  url          = {https://doi.org/10.1023/A:1009868906501},
  doi          = {10.1023/A:1009868906501},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/constraints/ComonDJK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccl/ComonK99,
  author       = {Hubert Comon and
                  Claude Kirchner},
  editor       = {Hubert Comon and
                  Claude March{\'{e}} and
                  Ralf Treinen},
  title        = {Constraint Solving on Terms},
  booktitle    = {Constraints in Computational Logics: Theory and Applications, International
                  Summer School, CCL'99 Gif-sur-Yvette, France, September 5-8, 1999,
                  Revised Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {2002},
  pages        = {47--103},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-45406-3\_2},
  doi          = {10.1007/3-540-45406-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ccl/ComonK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/ComonJ99,
  author       = {Hubert Comon and
                  Yan Jurski},
  editor       = {Jos C. M. Baeten and
                  Sjouke Mauw},
  title        = {Timed Automata and the Theory of Real Numbers},
  booktitle    = {{CONCUR} '99: Concurrency Theory, 10th International Conference, Eindhoven,
                  The Netherlands, August 24-27, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1664},
  pages        = {242--257},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48320-9\_18},
  doi          = {10.1007/3-540-48320-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/concur/ComonJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/Comon98,
  author       = {Hubert Comon},
  title        = {Completion of Rewrite Systems with Membership Constraints. Part {I:}
                  Deduction Rules},
  journal      = {J. Symb. Comput.},
  volume       = {25},
  number       = {4},
  pages        = {397--419},
  year         = {1998},
  url          = {https://doi.org/10.1006/jsco.1997.0185},
  doi          = {10.1006/JSCO.1997.0185},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/Comon98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/Comon98a,
  author       = {Hubert Comon},
  title        = {Completion of Rewrite Systems with Membership Constraints. Part {II:}
                  Constraint Solving},
  journal      = {J. Symb. Comput.},
  volume       = {25},
  number       = {4},
  pages        = {421--453},
  year         = {1998},
  url          = {https://doi.org/10.1006/jsco.1997.0186},
  doi          = {10.1006/JSCO.1997.0186},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/Comon98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ComonJ98,
  author       = {Hubert Comon and
                  Yan Jurski},
  editor       = {Alan J. Hu and
                  Moshe Y. Vardi},
  title        = {Multiple Counters Automata, Safety Analysis and Presburger Arithmetic},
  booktitle    = {Computer Aided Verification, 10th International Conference, {CAV}
                  '98, Vancouver, BC, Canada, June 28 - July 2, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1427},
  pages        = {268--279},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0028751},
  doi          = {10.1007/BFB0028751},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ComonJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/ComonNNR98,
  author       = {Hubert Comon and
                  Paliath Narendran and
                  Robert Nieuwenhuis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Decision Problems in Ordered Rewriting},
  booktitle    = {Thirteenth Annual {IEEE} Symposium on Logic in Computer Science, Indianapolis,
                  Indiana, USA, June 21-24, 1998},
  pages        = {276--286},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/LICS.1998.705664},
  doi          = {10.1109/LICS.1998.705664},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/ComonNNR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/Comon98,
  author       = {Hubert Comon},
  editor       = {Tobias Nipkow},
  title        = {About Proofs by Consistency (Abstract)},
  booktitle    = {Rewriting Techniques and Applications, 9th International Conference,
                  RTA-98, Tsukuba, Japan, March 30 - April 1, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1379},
  pages        = {136--137},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0052366},
  doi          = {10.1007/BFB0052366},
  timestamp    = {Sat, 05 Sep 2020 18:07:52 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/Comon98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ComonT97,
  author       = {Hubert Comon and
                  Ralf Treinen},
  title        = {The First-Order Theory of Lexicographic Path Orderings is Undecidable},
  journal      = {Theor. Comput. Sci.},
  volume       = {176},
  number       = {1-2},
  pages        = {67--87},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0304-3975(96)00049-7},
  doi          = {10.1016/S0304-3975(96)00049-7},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ComonT97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/ComonJ97,
  author       = {Hubert Comon and
                  Yan Jurski},
  editor       = {Mogens Nielsen and
                  Wolfgang Thomas},
  title        = {Higher-Order Matching and Tree Automata},
  booktitle    = {Computer Science Logic, 11th International Workshop, {CSL} '97, Annual
                  Conference of the EACSL, Aarhus, Denmark, August 23-29, 1997, Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1414},
  pages        = {157--176},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028013},
  doi          = {10.1007/BFB0028013},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/ComonJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/ComonJ97,
  author       = {Hubert Comon and
                  Florent Jacquemard},
  title        = {Ground Reducibility is EXPTIME-Complete},
  booktitle    = {Proceedings, 12th Annual {IEEE} Symposium on Logic in Computer Science,
                  Warsaw, Poland, June 29 - July 2, 1997},
  pages        = {26--34},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/LICS.1997.614922},
  doi          = {10.1109/LICS.1997.614922},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/ComonJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rta/1997,
  editor       = {Hubert Comon},
  title        = {Rewriting Techniques and Applications, 8th International Conference,
                  RTA-97, Sitges, Spain, June 2-5, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1232},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-62950-5},
  doi          = {10.1007/3-540-62950-5},
  isbn         = {3-540-62950-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caap/BoudetC96,
  author       = {Alexandre Boudet and
                  Hubert Comon},
  editor       = {H{\'{e}}l{\`{e}}ne Kirchner},
  title        = {Diophantine Equations, Presburger Arithmetic and Finite Automata},
  booktitle    = {Trees in Algebra and Programming - CAAP'96, 21st International Colloquium,
                  Link{\"{o}}ping, Sweden, April, 22-24, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1059},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61064-2\_27},
  doi          = {10.1007/3-540-61064-2\_27},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/caap/BoudetC96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/Comon95,
  author       = {Hubert Comon},
  title        = {On Unification of Terms with Integer Exponents},
  journal      = {Math. Syst. Theory},
  volume       = {28},
  number       = {1},
  pages        = {67--88},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01294596},
  doi          = {10.1007/BF01294596},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mst/Comon95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/ComonNR95,
  author       = {Hubert Comon and
                  Robert Nieuwenhuis and
                  Albert Rubio},
  title        = {Orderings, AC-Theories and Symbolic Constraint Solving (Extended Abstract)},
  booktitle    = {Proceedings, 10th Annual {IEEE} Symposium on Logic in Computer Science,
                  San Diego, California, USA, June 26-29, 1995},
  pages        = {375--385},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/LICS.1995.523272},
  doi          = {10.1109/LICS.1995.523272},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/ComonNR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/Comon95,
  author       = {Hubert Comon},
  title        = {Sequentiality, Second Order Monadic Logic and Tree Automata},
  booktitle    = {Proceedings, 10th Annual {IEEE} Symposium on Logic in Computer Science,
                  San Diego, California, USA, June 26-29, 1995},
  pages        = {508--517},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/LICS.1995.523285},
  doi          = {10.1109/LICS.1995.523285},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/Comon95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/unif/Comon95,
  author       = {Hubert Comon},
  editor       = {Robert Nieuwenhuis and
                  Albert Rubio},
  title        = {Linear diophantine equations, Presburger arithmetic and finite automata},
  booktitle    = {9th International Workshop on Unification, {UNIF} 1995, Sitges, Spain,
                  April 2-3, 1995},
  pages        = {13},
  year         = {1995},
  timestamp    = {Fri, 19 May 2023 16:00:29 +0200},
  biburl       = {https://dblp.org/rec/conf/unif/Comon95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ac/1993tr,
  editor       = {Hubert Comon and
                  Jean{-}Pierre Jouannaud},
  title        = {Term Rewriting, French Spring School of Theoretical Computer Science,
                  Font Romeux, France, May 17-21, 1993, Advanced Course},
  series       = {Lecture Notes in Computer Science},
  volume       = {909},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-59340-3},
  doi          = {10.1007/3-540-59340-3},
  isbn         = {3-540-59340-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/1993tr.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ComonHJ94,
  author       = {Hubert Comon and
                  Marianne Haberstrau and
                  Jean{-}Pierre Jouannaud},
  title        = {Syntacticness, Cycle-Syntacticness, and Shallow Theories},
  journal      = {Inf. Comput.},
  volume       = {111},
  number       = {1},
  pages        = {154--191},
  year         = {1994},
  url          = {https://doi.org/10.1006/inco.1994.1043},
  doi          = {10.1006/INCO.1994.1043},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ComonHJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ComonD94,
  author       = {Hubert Comon and
                  Catherine Delor},
  title        = {Equational Formulae with Membership Constraints},
  journal      = {Inf. Comput.},
  volume       = {112},
  number       = {2},
  pages        = {167--216},
  year         = {1994},
  url          = {https://doi.org/10.1006/inco.1994.1056},
  doi          = {10.1006/INCO.1994.1056},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ComonD94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caap/ComonT94,
  author       = {Hubert Comon and
                  Ralf Treinen},
  editor       = {Sophie Tison},
  title        = {Ordering Constraints on Trees},
  booktitle    = {Trees in Algebra and Programming - CAAP'94, 19th International Colloquium,
                  Edinburgh, UK, April 11-13, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {787},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0017470},
  doi          = {10.1007/BFB0017470},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/caap/ComonT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/CaronCCDJ94,
  author       = {Anne{-}C{\'{e}}cile Caron and
                  Hubert Comon and
                  Jean{-}Luc Coquid{\'{e}} and
                  Max Dauchet and
                  Florent Jacquemard},
  editor       = {Serge Abiteboul and
                  Eli Shamir},
  title        = {Pumping, Cleaning and Symbolic Constraints Solving},
  booktitle    = {Automata, Languages and Programming, 21st International Colloquium,
                  ICALP94, Jerusalem, Israel, July 11-14, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {820},
  pages        = {436--449},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58201-0\_88},
  doi          = {10.1007/3-540-58201-0\_88},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/CaronCCDJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/ComonJ94,
  author       = {Hubert Comon and
                  Florent Jacquemard},
  editor       = {Patrice Enjalbert and
                  Ernst W. Mayr and
                  Klaus W. Wagner},
  title        = {Ground Reducibility and Automata with Disequality Constraints},
  booktitle    = {{STACS} 94, 11th Annual Symposium on Theoretical Aspects of Computer
                  Science, Caen, France, February 24-26, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {775},
  pages        = {151--162},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-57785-8\_138},
  doi          = {10.1007/3-540-57785-8\_138},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/ComonJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/lncs/Comon94,
  author       = {Hubert Comon},
  editor       = {Andreas Podelski},
  title        = {Constraints in Term Algebras: An Overview of Constraint Solving Techniques},
  booktitle    = {Constraint Programming: Basics and Trends, Ch{\^{a}}tillon Spring
                  School, Ch{\^{a}}tillon-sur-Seine, France, May 16 - 20, 1994, Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {910},
  pages        = {62--67},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-59155-9\_4},
  doi          = {10.1007/3-540-59155-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/journals/lncs/Comon94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Comon93,
  author       = {Hubert Comon},
  title        = {Complete Axiomatizations of Some Quotient Term Algebras},
  journal      = {Theor. Comput. Sci.},
  volume       = {118},
  number       = {2},
  pages        = {167--191},
  year         = {1993},
  url          = {https://doi.org/10.1016/0304-3975(93)90108-6},
  doi          = {10.1016/0304-3975(93)90108-6},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Comon93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/Comon93,
  author       = {Hubert Comon},
  editor       = {Maurice Nivat and
                  Charles Rattray and
                  Teodor Rus and
                  Giuseppe Scollo},
  title        = {Constraints in Term Algebras (Short Survey)},
  booktitle    = {Algebraic Methodology and Software Technology {(AMAST} '93), Proceedings
                  of the Third International Conference on Methodology and Software
                  Technology, University of Twente, Enschede, The Netherlands, 21-25
                  June, 1993},
  series       = {Workshops in Computing},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {1993},
  timestamp    = {Tue, 18 Feb 2003 11:00:12 +0100},
  biburl       = {https://dblp.org/rec/conf/amast/Comon93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapsoft/BoudetC93,
  author       = {Alexandre Boudet and
                  Hubert Comon},
  editor       = {Marie{-}Claude Gaudel and
                  Jean{-}Pierre Jouannaud},
  title        = {About the Theory of Tree Embedding},
  booktitle    = {TAPSOFT'93: Theory and Practice of Software Development, International
                  Joint Conference CAAP/FASE, Orsay, France, April 13-17, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {668},
  pages        = {376--390},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-56610-4\_77},
  doi          = {10.1007/3-540-56610-4\_77},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/tapsoft/BoudetC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Comon92,
  author       = {Hubert Comon},
  editor       = {Werner Kuich},
  title        = {Completion of Rewrite Systems with Membership Constraints},
  booktitle    = {Automata, Languages and Programming, 19th International Colloquium,
                  ICALP92, Vienna, Austria, July 13-17, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {623},
  pages        = {392--403},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-55719-9\_91},
  doi          = {10.1007/3-540-55719-9\_91},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Comon92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/ComonHJ92,
  author       = {Hubert Comon and
                  Marianne Haberstrau and
                  Jean{-}Pierre Jouannaud},
  title        = {Decidable Problems in Shallow Equational Theories (Extended Abstract)},
  booktitle    = {Proceedings of the Seventh Annual Symposium on Logic in Computer Science
                  {(LICS} '92), Santa Cruz, California, USA, June 22-25, 1992},
  pages        = {255--265},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/LICS.1992.185538},
  doi          = {10.1109/LICS.1992.185538},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/ComonHJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/ComonF92,
  author       = {Hubert Comon and
                  Maribel Fern{\'{a}}ndez},
  editor       = {Ivan M. Havel and
                  V{\'{a}}clav Koubek},
  title        = {Negation Elimination in Equational Formulae},
  booktitle    = {Mathematical Foundations of Computer Science 1992, 17th International
                  Symposium, MFCS'92, Prague, Czechoslovakia, August 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {629},
  pages        = {191--199},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-55808-X\_17},
  doi          = {10.1007/3-540-55808-X\_17},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/ComonF92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/ComonLS91,
  author       = {Hubert Comon and
                  Denis Lugiez and
                  Philippe Schnoebelen},
  title        = {A Rewrite-Based Type Discipline for a Subset of Computer Algebra},
  journal      = {J. Symb. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {349--368},
  year         = {1991},
  url          = {https://doi.org/10.1016/S0747-7171(08)80110-1},
  doi          = {10.1016/S0747-7171(08)80110-1},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/ComonLS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Comon91,
  author       = {Hubert Comon},
  editor       = {Jean{-}Louis Lassez and
                  Gordon D. Plotkin},
  title        = {Disunification: {A} Survey},
  booktitle    = {Computational Logic - Essays in Honor of Alan Robinson},
  pages        = {322--359},
  publisher    = {The {MIT} Press},
  year         = {1991},
  timestamp    = {Wed, 30 Mar 2016 17:34:58 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Comon91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Comon91,
  author       = {Hubert Comon},
  editor       = {Javier Leach Albert and
                  Burkhard Monien and
                  Mario Rodr{\'{\i}}guez{-}Artalejo},
  title        = {Complete Axiomatizations of Some Quotient Term Algebras},
  booktitle    = {Automata, Languages and Programming, 18th International Colloquium,
                  ICALP91, Madrid, Spain, July 8-12, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {510},
  pages        = {469--480},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54233-7\_156},
  doi          = {10.1007/3-540-54233-7\_156},
  timestamp    = {Fri, 17 Jul 2020 16:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Comon91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/Comon90,
  author       = {Hubert Comon},
  title        = {Solving Symbolic Ordering Constraints},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {1},
  number       = {4},
  pages        = {387--412},
  year         = {1990},
  url          = {https://doi.org/10.1142/S0129054190000278},
  doi          = {10.1142/S0129054190000278},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/Comon90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Comon90,
  author       = {Hubert Comon},
  editor       = {Mike Paterson},
  title        = {Equational Formulas in Order-Sorted Algebras},
  booktitle    = {Automata, Languages and Programming, 17th International Colloquium,
                  ICALP90, Warwick University, England, UK, July 16-20, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {443},
  pages        = {674--688},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/BFb0032066},
  doi          = {10.1007/BFB0032066},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Comon90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/Comon90,
  author       = {Hubert Comon},
  title        = {Solving Inequations in Term Algebras (Extended Abstract)},
  booktitle    = {Proceedings of the Fifth Annual Symposium on Logic in Computer Science
                  {(LICS} '90), Philadelphia, Pennsylvania, USA, June 4-7, 1990},
  pages        = {62--69},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/LICS.1990.113734},
  doi          = {10.1109/LICS.1990.113734},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/Comon90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/ComonL89,
  author       = {Hubert Comon and
                  Pierre Lescanne},
  title        = {Equational Problems and Disunification},
  journal      = {J. Symb. Comput.},
  volume       = {7},
  number       = {3/4},
  pages        = {371--425},
  year         = {1989},
  url          = {https://doi.org/10.1016/S0747-7171(89)80017-3},
  doi          = {10.1016/S0747-7171(89)80017-3},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/ComonL89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/Comon89,
  author       = {Hubert Comon},
  editor       = {Nachum Dershowitz},
  title        = {Inductive Proofs by Specification Transformation},
  booktitle    = {Rewriting Techniques and Applications, 3rd International Conference,
                  RTA-89, Chapel Hill, North Carolina, USA, April 3-5, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {355},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-51081-8\_101},
  doi          = {10.1007/3-540-51081-8\_101},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/Comon89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Comon88,
  author       = {Hubert Comon},
  title        = {Unification et disunification : th{\'{e}}orie et applications.
                  (Unification and disunification in free algebras and in initial algebras
                  : theory and applications)},
  school       = {Grenoble Institute of Technology, France},
  year         = {1988},
  url          = {https://tel.archives-ouvertes.fr/tel-00331263},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Comon88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alp/Comon88,
  author       = {Hubert Comon},
  editor       = {Jan Grabowski and
                  Pierre Lescanne and
                  Wolfgang Wechler},
  title        = {An Effective Method for Handling Initial Algebras},
  booktitle    = {Algebraic and Logic Programming, International Workshop, Gaussig,
                  GDR, November 14-18, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {343},
  pages        = {108--118},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-50667-5\_62},
  doi          = {10.1007/3-540-50667-5\_62},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/alp/Comon88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/CalmetCL86,
  author       = {Jacques Calmet and
                  Hubert Comon and
                  Denis Lugiez},
  editor       = {Thomas Beth and
                  Michael Clausen},
  title        = {Type Inference Using Unification in Computer Algebra},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  4th International Conference, AAECC-4, Karlsruhe, FRG, September 23-26,
                  1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {307},
  pages        = {25--28},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/BFb0039176},
  doi          = {10.1007/BFB0039176},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/CalmetCL86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/Comon86,
  author       = {Hubert Comon},
  editor       = {J{\"{o}}rg H. Siekmann},
  title        = {Sufficient Completness, Term Rewriting Systems and "Anti-Unification"},
  booktitle    = {8th International Conference on Automated Deduction, Oxford, England,
                  July 27 - August 1, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {230},
  pages        = {128--140},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-16780-3\_85},
  doi          = {10.1007/3-540-16780-3\_85},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/Comon86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}