Pierre-Cyrille Heam
Pierre-Cyrille Heam
Université de Franche-Comté, Computer Science
Geverifieerd e-mailadres voor femto-st.fr
Titel
Geciteerd door
Geciteerd door
Jaar
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
12462005
Improvements on the Genet and Klay technique to automatically verify security protocols
Y Boichut, PC Héam, O Kouchnarenko, F Oehl
Proc. AVIS 4, 84, 2004
922004
Mutation-based test generation from security protocols in HLPSL
F Dadeau, PC Héam, R Kheddam
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
462011
Automatic verification of security protocols using approximations
Y Boichut, PC Héam, O Kouchnarenko
INRIA, 2005
412005
Efficient and cryptographically secure generation of chaotic pseudorandom numbers on gpu
C Guyeux, R Couturier, PC Héam, JM Bahi
The journal of Supercomputing 71 (10), 3877-3903, 2015
332015
Finer is better: Abstraction refinement for rewriting approximations
Y Boichut, R Courbis, PC Héam, O Kouchnarenko
International Conference on Rewriting Techniques and Applications, 48-62, 2008
292008
Handling algebraic properties in automatic analysis of security protocols
Y Boichut, PC Héam, O Kouchnarenko
International Colloquium on Theoretical Aspects of Computing, 153-167, 2006
232006
A theoretical limit for safety verification techniques with regular fix-point computations
Y Boichut, PC Héam
Information Processing Letters 108 (1), 1-2, 2008
222008
Approximation based tree regular model checking
Y Boichut, PC Héam, O Kouchnarenko
Nordic Journal of Computing 14, 216-241, 2008
202008
Component simulation-based substitutivity managing QoS and composition issues
PC Héam, O Kouchnarenko, J Voinot
Science of Computer Programming 75 (10), 898-917, 2010
162010
Seed: An easy-to-use random generator of recursive data structures for testing
PC Héam, C Nicaud
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
142011
Automatic approximation for the verification of cryptographic protocols
Y Boichut, PC Héam, O Kouchnarenko
Proc. AVIS, 2004
142004
A lower bound for reversible automata
PC Héam
RAIRO-Theoretical Informatics and Applications 34 (5), 331-341, 2000
142000
Model‐based mutation testing from security protocols in HLPSL
F Dadeau, PC Héam, R Kheddam, G Maatoug, M Rusinowitch
Software Testing, Verification and Reliability 25 (5-7), 684-711, 2015
132015
Pseudorandom number generators with balanced gray codes
JF Couchot, PC Heam, C Guyeux, Q Wang, JM Bahi
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-7, 2014
132014
Tree automata for detecting attacks on protocols with algebraic cryptographic primitives
Y Boichut, PC Héam, O Kouchnarenko
Electronic Notes in Theoretical Computer Science 239, 57-72, 2009
132009
How to handle qos aspects in web services substitutivity verification
PC Héam, O Kouchnarenko, J Voinot
16th IEEE International Workshops on Enabling Technologies: Infrastructure …, 2007
122007
Random Walk in a -Cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations
S Contassot-Vivier, JF Couchot, C Guyeux, PC Heam
International Journal of Bifurcation and Chaos 27 (01), 1750014, 2017
112017
Efficiency of automata in semi-commutation verification techniques
G Cécé, PC Héam, Y Mainier
RAIRO-Theoretical Informatics and Applications 42 (2), 197-215, 2008
112008
On shuffle ideals
PC Héam
RAIRO-Theoretical Informatics and Applications 36 (4), 359-384, 2002
102002
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20