Michael Rusinowitch
Michael Rusinowitch
INRIA
Geverifieerd e-mailadres voor loria.fr
Titel
Geciteerd door
Geciteerd door
Jaar
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
11842005
Protocol insecurity with finite number of sessions is NP-complete
M Rusinowitch, M Turuani
INRIA, 2001
3212001
An NP decision procedure for protocol insecurity with XOR
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Theoretical Computer Science 338 (1-3), 247-274, 2005
2472005
Deduction with symbolic constraints
C Kirchner, H Kirchner, M Rusinowitch
INRIA, 1990
2231990
On word problems in equational theories
J Hsiang, M Rusinowitch
International Colloquium on Automata, Languages, and Programming, 54-71, 1987
2211987
Process rewrite systems
R Mayr
Information and Computation 156 (1-2), 264-286, 2000
2152000
Protocol insecurity with a finite number of sessions and composed keys is NP-complete
M Rusinowitch, M Turuani
Theoretical Computer Science 299 (1-3), 451-475, 2003
2082003
A rewriting approach to satisfiability procedures
A Armando, S Ranise, M Rusinowitch
Information and Computation 183 (2), 140-164, 2003
1872003
Proving refutational completeness of theorem-proving strategies: The transfinite semantic tree method
J Hsiang, M Rusinowitch
Journal of the ACM (JACM) 38 (3), 558-586, 1991
1741991
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
International Conference on Foundations of Software Technology and …, 2003
1592003
Compiling and verifying security protocols
F Jacquemard, M Rusinowitch, L Vigneron
International Conference on Logic for Programming Artificial Intelligence …, 2000
1552000
Implicit induction in conditional theories
A Bouhoula, M Rusinowitch
Journal of automated reasoning 14 (2), 189-235, 1995
1491995
On termination of the direct sum of term-rewriting systems
M Rusinowitch
Information processing letters 26 (2), 65-70, 1987
1431987
Proving correctness of transformation functions in real-time groupware
A Imine, P Molli, G Oster, M Rusinowitch
ECSCW 2003, 277-293, 2003
1382003
Protocol analysis in intrusion detection using decision tree
T Abbes, A Bouhoula, M Rusinowitch
International Conference on Information Technology: Coding and Computing …, 2004
1332004
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
1222012
Automated mathematical induction
A Bouhoula, E Kounalis, M Rusinowitch
Journal of Logic and Computation 5 (5), 631-668, 1995
1121995
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
982002
Formal design and verification of operational transformation algorithms for copies convergence
A Imine, M Rusinowitch, G Oster, P Molli
Theoretical Computer Science 351 (2), 167-183, 2006
872006
Mechanizing inductive reasoning
E Kounalis, M Rusinowitch
Bulletin of the EATCS 41, 216-226, 1990
871990
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20