עקוב אחר
Michael Rusinowitch
Michael Rusinowitch
INRIA
כתובת אימייל מאומתת בדומיין loria.fr
כותרת
צוטט על ידי
צוטט על ידי
שנה
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
16622005
Protocol insecurity with finite number of sessions is NP-complete
M Rusinowitch, M Turuani
INRIA, 2001
3472001
An NP decision procedure for protocol insecurity with XOR
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Theoretical Computer Science 338 (1-3), 247-274, 2005
2682005
On word problems in equational theories
J Hsiang, M Rusinowitch
Automata, Languages and Programming: 14th International Colloquium Karlsruhe …, 1987
2391987
Deduction with symbolic constraints
C Kirchner, H Kirchner, M Rusinowitch
INRIA, 1990
2311990
Protocol insecurity with a finite number of sessions and composed keys is NP-complete
M Rusinowitch, M Turuani
Theoretical Computer Science 299 (1-3), 451-475, 2003
2252003
A rewriting approach to satisfiability procedures
A Armando, S Ranise, M Rusinowitch
Information and Computation 183 (2), 140-164, 2003
1932003
Proving refutational completeness of theorem-proving strategies: The transfinite semantic tree method
J Hsiang, M Rusinowitch
Journal of the ACM (JACM) 38 (3), 558-586, 1991
1901991
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
International Conference on Foundations of Software Technology and …, 2003
1672003
Implicit induction in conditional theories
A Bouhoula, M Rusinowitch
Journal of automated reasoning 14, 189-235, 1995
1601995
Compiling and verifying security protocols
F Jacquemard, M Rusinowitch, L Vigneron
International Conference on Logic for Programming Artificial Intelligence …, 2000
1562000
Proving correctness of transformation functions in real-time groupware
A Imine, P Molli, G Oster, M Rusinowitch
ECSCW 2003: Proceedings of the Eighth European Conference on Computer …, 2003
1532003
On termination of the direct sum of term-rewriting systems
M Rusinowitch
Information processing letters 26 (2), 65-70, 1987
1531987
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1492012
Protocol analysis in intrusion detection using decision tree
T Abbes, A Bouhoula, M Rusinowitch
International Conference on Information Technology: Coding and Computing …, 2004
1342004
Automated mathematical induction
A Bouhoula, E Kounalis, M Rusinowitch
Journal of Logic and Computation 5 (5), 631-668, 1995
1161995
Theorem-proving with resolution and superposition
M Rusinowitch
Journal of Symbolic Computation 11 (1-2), 21-49, 1991
1091991
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002
1082002
Mechanizing inductive reasoning
E Kounalis, M Rusinowitch
Bulletin of the EATCS 41, 216-226, 1990
981990
Formal design and verification of operational transformation algorithms for copies convergence
A Imine, M Rusinowitch, G Oster, P Molli
Theoretical Computer Science 351 (2), 167-183, 2006
912006
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20