BibTeX records: Michaël Rusinowitch

download as .bib file

@inproceedings{DBLP:conf/netsoft/ZahwaLRA23,
  author       = {Wafik Zahwa and
                  Abdelkader Lahmadi and
                  Micha{\"{e}}l Rusinowitch and
                  Mondher Ayadi},
  editor       = {Carlos J. Bernardos and
                  Barbara Martini and
                  Elisa Rojas and
                  F{\'{a}}bio Luciano Verdii and
                  Zuqing Zhu and
                  Eiji Oki and
                  Helge Parzyjegla},
  title        = {Automated Placement of In-Network {ACL} Rules},
  booktitle    = {9th {IEEE} International Conference on Network Softwarization, NetSoft
                  2023, Madrid, Spain, June 19-23, 2023},
  pages        = {486--491},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/NetSoft57336.2023.10175436},
  doi          = {10.1109/NETSOFT57336.2023.10175436},
  timestamp    = {Thu, 20 Jul 2023 12:34:37 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/ZahwaLRA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/MacwanIR22,
  author       = {Kamalkumar Macwan and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Guy{-}Vincent Jourdan and
                  Laurent Mounier and
                  Carlisle M. Adams and
                  Florence S{\`{e}}des and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Differentially Private Friends Recommendation},
  booktitle    = {Foundations and Practice of Security - 15th International Symposium,
                  {FPS} 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13877},
  pages        = {236--251},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-30122-3\_15},
  doi          = {10.1007/978-3-031-30122-3\_15},
  timestamp    = {Sat, 27 May 2023 15:23:45 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/MacwanIR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/AbboudGLRBA22,
  author       = {Ahmad Abboud and
                  R{\'{e}}mi Garcia and
                  Abdelkader Lahmadi and
                  Micha{\"{e}}l Rusinowitch and
                  Adel Bouhoula and
                  Mondher Ayadi},
  title        = {Automatically Distributing and Updating In-Network Management Rules
                  for Software Defined Networks},
  booktitle    = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2022, Budapest, Hungary, April 25-29, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NOMS54207.2022.9789807},
  doi          = {10.1109/NOMS54207.2022.9789807},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/AbboudGLRBA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snams/MacwanIR22,
  author       = {Kamalkumar Macwan and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Paolo Ceravolo and
                  Christian Guetl and
                  Yaser Jararweh and
                  Elhadj Benkhelifa},
  title        = {Privacy Preserving Recommendations for Social Networks},
  booktitle    = {Ninth International Conference on Social Networks Analysis, Management
                  and Security, {SNAMS} 2022, Milan, Italy, November 29 - Dec. 1, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SNAMS58071.2022.10062760},
  doi          = {10.1109/SNAMS58071.2022.10062760},
  timestamp    = {Mon, 27 Mar 2023 16:44:42 +0200},
  biburl       = {https://dblp.org/rec/conf/snams/MacwanIR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/synasc/ChevalierR22,
  author       = {Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Bruno Buchberger and
                  Mircea Marin and
                  Viorel Negru and
                  Daniela Zaharie},
  title        = {Deciding Whether two Codes Have the Same Ambiguities is in co-NP},
  booktitle    = {24th International Symposium on Symbolic and Numeric Algorithms for
                  Scientific Computing, {SYNASC} 2022, Hagenberg / Linz, Austria, September
                  12-15, 2022},
  pages        = {84--91},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SYNASC57785.2022.00023},
  doi          = {10.1109/SYNASC57785.2022.00023},
  timestamp    = {Fri, 09 Jun 2023 15:18:17 +0200},
  biburl       = {https://dblp.org/rec/conf/synasc/ChevalierR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Eidizadehakhcheloo21,
  author       = {Sanaz Eidizadehakhcheloo and
                  Bizhan Alipour Pijani and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Ken Barker and
                  Kambiz Ghazinour},
  title        = {Divide-and-Learn: {A} Random Indexing Approach to Attribute Inference
                  Attacks in Online Social Networks},
  booktitle    = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12840},
  pages        = {338--354},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81242-3\_20},
  doi          = {10.1007/978-3-030-81242-3\_20},
  timestamp    = {Tue, 27 Jul 2021 09:02:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Eidizadehakhcheloo21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/CheikhIR21,
  author       = {Noreddine Belhadj Cheikh and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  title        = {{FOX:} Fooling with Explanations : Privacy Protection with Adversarial
                  Reactions in Social Media},
  booktitle    = {18th International Conference on Privacy, Security and Trust, {PST}
                  2021, Auckland, New Zealand, December 13-15, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PST52912.2021.9647778},
  doi          = {10.1109/PST52912.2021.9647778},
  timestamp    = {Tue, 28 Dec 2021 14:39:32 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/CheikhIR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-2109-02802,
  author       = {Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Temur Kutsia},
  title        = {Implementing Security Protocol Monitors},
  booktitle    = {Proceedings of the 9th International Symposium on Symbolic Computation
                  in Software Science, {SCSS} 2021, Hagenberg, Austria, September 8-10,
                  2021},
  series       = {{EPTCS}},
  volume       = {342},
  pages        = {22--34},
  year         = {2021},
  url          = {https://doi.org/10.4204/EPTCS.342.3},
  doi          = {10.4204/EPTCS.342.3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-02802.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adbis/Eidizadehakhcheloo20,
  author       = {Sanaz Eidizadehakhcheloo and
                  Bizhan Alipour Pijani and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Ladjel Bellatreche and
                  M{\'{a}}ria Bielikov{\'{a}} and
                  Omar Boussa{\"{\i}}d and
                  Barbara Catania and
                  J{\'{e}}r{\^{o}}me Darmont and
                  Elena Demidova and
                  Fabien Duchateau and
                  Mark M. Hall and
                  Tanja Mercun and
                  Boris Novikov and
                  Christos Papatheodorou and
                  Thomas Risse and
                  Oscar Romero and
                  Lucile Sautot and
                  Guilaine Talens and
                  Robert Wrembel and
                  Maja Zumer},
  title        = {Your Age Revealed by Facebook Picture Metadata},
  booktitle    = {ADBIS, {TPDL} and {EDA} 2020 Common Workshops and Doctoral Consortium
                  - International Workshops: DOING, MADEISD, SKG, BBIGAP, SIMPDA, AIMinScience
                  2020 and Doctoral Consortium, Lyon, France, August 25-27, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1260},
  pages        = {259--270},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55814-7\_22},
  doi          = {10.1007/978-3-030-55814-7\_22},
  timestamp    = {Thu, 23 Sep 2021 11:47:12 +0200},
  biburl       = {https://dblp.org/rec/conf/adbis/Eidizadehakhcheloo20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/AbboudGLRB20,
  author       = {Ahmad Abboud and
                  R{\'{e}}mi Garcia and
                  Abdelkader Lahmadi and
                  Micha{\"{e}}l Rusinowitch and
                  Adel Bouhoula},
  editor       = {Nur Zincir{-}Heywood and
                  Mehmet Ulema and
                  M{\"{u}}ge Sayit and
                  Stuart Clayman and
                  Myung{-}Sup Kim and
                  Cihat Cetinkaya},
  title        = {{R2-D2:} Filter Rule set Decomposition and Distribution in Software
                  Defined Networks},
  booktitle    = {16th International Conference on Network and Service Management, {CNSM}
                  2020, Izmir, Turkey, November 2-6, 2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/CNSM50824.2020.9269074},
  doi          = {10.23919/CNSM50824.2020.9269074},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/AbboudGLRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/PijaniIR20,
  author       = {Bizhan Alipour Pijani and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Sven Hartmann and
                  Josef K{\"{u}}ng and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Online Attacks on Picture Owner Privacy},
  booktitle    = {Database and Expert Systems Applications - 31st International Conference,
                  {DEXA} 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12392},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59051-2\_3},
  doi          = {10.1007/978-3-030-59051-2\_3},
  timestamp    = {Tue, 29 Dec 2020 18:31:18 +0100},
  biburl       = {https://dblp.org/rec/conf/dexa/PijaniIR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icin/AbboudLRCBA20,
  author       = {Ahmad Abboud and
                  Abdelkader Lahmadi and
                  Micha{\"{e}}l Rusinowitch and
                  Miguel Couceiro and
                  Adel Bouhoula and
                  Mondher Avadi},
  title        = {Double Mask: An Efficient Rule Encoding for Software Defined Networking},
  booktitle    = {23rd Conference on Innovation in Clouds, Internet and Networks and
                  Workshops, {ICIN} 2020, Paris, France, February 24-27, 2020},
  pages        = {186--193},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICIN48450.2020.9059433},
  doi          = {10.1109/ICIN48450.2020.9059433},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icin/AbboudLRCBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/AbboudGLRB20,
  author       = {Ahmad Abboud and
                  R{\'{e}}mi Garcia and
                  Abdelkader Lahmadi and
                  Micha{\"{e}}l Rusinowitch and
                  Adel Bouhoula},
  title        = {Efficient Distribution of Security Policy Filtering Rules in Software
                  Defined Networks},
  booktitle    = {19th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2020, Cambridge, MA, USA, November 24-27, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/NCA51143.2020.9306746},
  doi          = {10.1109/NCA51143.2020.9306746},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nca/AbboudGLRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/PijaniIR20,
  author       = {Bizhan Alipour Pijani and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Chih{-}Cheng Hung and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Dongwan Shin and
                  Alessio Bechini},
  title        = {You are what emojis say about your pictures: language-independent
                  gender inference attack on Facebook},
  booktitle    = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online
                  event, [Brno, Czech Republic], March 30 - April 3, 2020},
  pages        = {1826--1834},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3341105.3373943},
  doi          = {10.1145/3341105.3373943},
  timestamp    = {Thu, 02 Apr 2020 17:08:04 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/PijaniIR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/JacquemardR19,
  author       = {Florent Jacquemard and
                  Micha{\"{e}}l Rusinowitch},
  title        = {One-variable context-free hedge automata},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {104},
  pages        = {278--296},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jcss.2016.10.006},
  doi          = {10.1016/J.JCSS.2016.10.006},
  timestamp    = {Fri, 14 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/JacquemardR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/AnantharamanHNR19,
  author       = {Siva Anantharaman and
                  Peter Hibbs and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Pascal Fontaine},
  title        = {Unification Modulo Lists with Reverse Relation with Certain Word Equations},
  booktitle    = {Automated Deduction - {CADE} 27 - 27th International Conference on
                  Automated Deduction, Natal, Brazil, August 27-30, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11716},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29436-6\_1},
  doi          = {10.1007/978-3-030-29436-6\_1},
  timestamp    = {Wed, 21 Aug 2019 13:34:20 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/AnantharamanHNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/AbboudLRCB19,
  author       = {Ahmad Abboud and
                  Abdelkader Lahmadi and
                  Micha{\"{e}}l Rusinowitch and
                  Miguel Couceiro and
                  Adel Bouhoula},
  title        = {Poster : Minimizing range rules for packet filtering using a double
                  mask representation},
  booktitle    = {2019 {IFIP} Networking Conference, Networking 2019, Warsaw, Poland,
                  May 20-22, 2019},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/IFIPNetworking46909.2019.8999466},
  doi          = {10.23919/IFIPNETWORKING46909.2019.8999466},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/AbboudLRCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/AlipourIR19,
  author       = {Bizhan Alipour and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Stefanos Gritzalis and
                  Edgar R. Weippl and
                  Sokratis K. Katsikas and
                  Gabriele Anderst{-}Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {Gender Inference for Facebook Picture Owners},
  booktitle    = {Trust, Privacy and Security in Digital Business - 16th International
                  Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11711},
  pages        = {145--160},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27813-7\_10},
  doi          = {10.1007/978-3-030-27813-7\_10},
  timestamp    = {Tue, 29 Dec 2020 18:28:24 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/AlipourIR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adbis/AbidIR18,
  author       = {Younes Abid and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Andr{\'{a}}s Bencz{\'{u}}r and
                  Bernhard Thalheim and
                  Tom{\'{a}}s Horv{\'{a}}th and
                  Silvia Chiusano and
                  Tania Cerquitelli and
                  Csaba Istv{\'{a}}n Sidl{\'{o}} and
                  Peter Z. Revesz},
  title        = {Online Testing of User Profile Resilience Against Inference Attacks
                  in Social Networks},
  booktitle    = {New Trends in Databases and Information Systems - {ADBIS} 2018 Short
                  Papers and Workshops, AI*QA, BIGPMED, CSACDB, M2U, BigDataMAPS, ISTREND,
                  DC, Budapest, Hungary, September, 2-5, 2018, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {909},
  pages        = {105--117},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00063-9\_12},
  doi          = {10.1007/978-3-030-00063-9\_12},
  timestamp    = {Mon, 03 Sep 2018 16:52:13 +0200},
  biburl       = {https://dblp.org/rec/conf/adbis/AbidIR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/AbidIR18,
  author       = {Younes Abid and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Nikolaus Augsten},
  title        = {Sensitive Attribute Prediction for Social Networks Users},
  booktitle    = {Proceedings of the Workshops of the {EDBT/ICDT} 2018 Joint Conference
                  {(EDBT/ICDT} 2018), Vienna, Austria, March 26, 2018},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2083},
  pages        = {28--35},
  publisher    = {CEUR-WS.org},
  year         = {2018},
  url          = {https://ceur-ws.org/Vol-2083/paper-05.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:44 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/AbidIR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/AvanesovCRT17,
  author       = {Tigran Avanesov and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {Intruder deducibility constraints with negation. Decidability and
                  application to secured service compositions},
  journal      = {J. Symb. Comput.},
  volume       = {80},
  pages        = {4--26},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jsc.2016.07.008},
  doi          = {10.1016/J.JSC.2016.07.008},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/AvanesovCRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/AvanesovCRT17a,
  author       = {Tigran Avanesov and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {Satisfiability of general intruder constraints with and without a
                  set constructor},
  journal      = {J. Symb. Comput.},
  volume       = {80},
  pages        = {27--61},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jsc.2016.07.009},
  doi          = {10.1016/J.JSC.2016.07.009},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/AvanesovCRT17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/AbidINRR17,
  author       = {Younes Abid and
                  Abdessamad Imine and
                  Amedeo Napoli and
                  Chedy Ra{\"{\i}}ssi and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Djamal Benslimane and
                  Ernesto Damiani and
                  William I. Grosky and
                  Abdelkader Hameurlain and
                  Amit P. Sheth and
                  Roland R. Wagner},
  title        = {Two-Phase Preference Disclosure in Attributed Social Networks},
  booktitle    = {Database and Expert Systems Applications - 28th International Conference,
                  {DEXA} 2017, Lyon, France, August 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10438},
  pages        = {249--263},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64468-4\_19},
  doi          = {10.1007/978-3-319-64468-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/AbidINRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sycss/2017,
  editor       = {Mohamed Mosbah and
                  Micha{\"{e}}l Rusinowitch},
  title        = {{SCSS} 2017, The 8th International Symposium on Symbolic Computation
                  in Software Science 2017, April 6-9, 2017, Gammarth, Tunisia},
  series       = {EPiC Series in Computing},
  volume       = {45},
  publisher    = {EasyChair},
  year         = {2017},
  url          = {https://easychair.org/publications/volume/SCSS\_2017},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sycss/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AbbesBR16,
  author       = {Tarek Abbes and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Detection of firewall configuration errors with updatable tree},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {3},
  pages        = {301--317},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0290-0},
  doi          = {10.1007/S10207-015-0290-0},
  timestamp    = {Wed, 26 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AbbesBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/NguyenIR16,
  author       = {Hiep H. Nguyen and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Network Structure Release under Differential Privacy},
  journal      = {Trans. Data Priv.},
  volume       = {9},
  number       = {3},
  pages        = {215--241},
  year         = {2016},
  url          = {http://www.tdp.cat/issues16/abs.a248a16.php},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdp/NguyenIR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/AbidINRR16,
  author       = {Younes Abid and
                  Abdessamad Imine and
                  Amedeo Napoli and
                  Chedy Ra{\"{\i}}ssi and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Jean{-}Louis Lanet and
                  Axel Legay},
  title        = {Online Link Disclosure Strategies for Social Networks},
  booktitle    = {Risks and Security of Internet and Systems - 11th International Conference,
                  CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10158},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54876-0\_13},
  doi          = {10.1007/978-3-319-54876-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/AbidINRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/HeamDKMR16,
  author       = {Pierre{-}Cyrille H{\'{e}}am and
                  Fr{\'{e}}d{\'{e}}ric Dadeau and
                  Rafik Kheddam and
                  Ghazi Maatoug and
                  Micha{\"{e}}l Rusinowitch},
  title        = {A Model-Based Testing Approach for Security Protocols},
  booktitle    = {2016 {IEEE} Intl Conference on Computational Science and Engineering,
                  {CSE} 2016, and {IEEE} Intl Conference on Embedded and Ubiquitous
                  Computing, {EUC} 2016, and 15th Intl Symposium on Distributed Computing
                  and Applications for Business Engineering, {DCABES} 2016, Paris, France,
                  August 24-26, 2016},
  pages        = {553--556},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSE-EUC-DCABES.2016.240},
  doi          = {10.1109/CSE-EUC-DCABES.2016.240},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/HeamDKMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/f-egc/AbidINRRR16,
  author       = {Younes Abid and
                  Abdessamad Imine and
                  Amedeo Napoli and
                  Chedy Ra{\"{\i}}ssi and
                  Marc Rigolot and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Cyril de Runz and
                  Bruno Cr{\'{e}}milleux},
  title        = {Analyse d'activit{\'{e}} et exposition de la vie priv{\'{e}}e
                  sur les m{\'{e}}dias sociaux},
  booktitle    = {16{\`{e}}me Journ{\'{e}}es Francophones Extraction et Gestion
                  des Connaissances, {EGC} 2016, 18-22 Janvier 2016, Reims, France},
  series       = {Revue des Nouvelles Technologies de l'Information},
  volume       = {{E-30}},
  pages        = {545--546},
  publisher    = {{\'{E}}ditions {RNTI}},
  year         = {2016},
  url          = {http://editions-rnti.fr/?inprocid=1002223},
  timestamp    = {Tue, 26 Nov 2019 17:10:42 +0100},
  biburl       = {https://dblp.org/rec/conf/f-egc/AbidINRRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TuruaniVR16,
  author       = {Mathieu Turuani and
                  Thomas Voegtlin and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Automated Verification of Electrum Wallet},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  pages        = {27--42},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4\_3},
  doi          = {10.1007/978-3-662-53357-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/TuruaniVR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/NguyenIR16,
  author       = {Hiep H. Nguyen and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Sabrina De Capitani di Vimercati},
  title        = {Detecting Communities under Differential Privacy},
  booktitle    = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  pages        = {83--93},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994624},
  timestamp    = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/NguyenIR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2016iwspa,
  editor       = {Rakesh M. Verma and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Proceedings of the 2016 {ACM} on International Workshop on Security
                  And Privacy Analytics, IWSPA@CODASPY 2016, New Orleans, LA, USA, March
                  11, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2875475},
  isbn         = {978-1-4503-4077-9},
  timestamp    = {Tue, 15 Mar 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2016iwspa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NguyenIR16,
  author       = {Hiep H. Nguyen and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Detecting Communities under Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/1607.02060},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.02060},
  eprinttype    = {arXiv},
  eprint       = {1607.02060},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NguyenIR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NguyenIR16a,
  author       = {Hiep H. Nguyen and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Private Link Exchange over Social Graphs},
  journal      = {CoRR},
  volume       = {abs/1609.01616},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.01616},
  eprinttype    = {arXiv},
  eprint       = {1609.01616},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NguyenIR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/BelkhirCR15,
  author       = {Walid Belkhir and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Parametrized automata simulation and application to service composition},
  journal      = {J. Symb. Comput.},
  volume       = {69},
  pages        = {40--60},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jsc.2014.09.029},
  doi          = {10.1016/J.JSC.2014.09.029},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/BelkhirCR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/DadeauHKMR15,
  author       = {Fr{\'{e}}d{\'{e}}ric Dadeau and
                  Pierre{-}Cyrille H{\'{e}}am and
                  Rafik Kheddam and
                  Ghazi Maatoug and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Model-based mutation testing from security protocols in {HLPSL}},
  journal      = {Softw. Test. Verification Reliab.},
  volume       = {25},
  number       = {5-7},
  pages        = {684--711},
  year         = {2015},
  url          = {https://doi.org/10.1002/stvr.1531},
  doi          = {10.1002/STVR.1531},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stvr/DadeauHKMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/NguyenIR15,
  author       = {Hiep H. Nguyen and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Jian Pei and
                  Fabrizio Silvestri and
                  Jie Tang},
  title        = {Differentially Private Publication of Social Graphs at Linear Cost},
  booktitle    = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances
                  in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France,
                  August 25 - 28, 2015},
  pages        = {596--599},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808797.2809385},
  doi          = {10.1145/2808797.2809385},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/NguyenIR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NguyenIR15,
  author       = {Hiep H. Nguyen and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Anonymizing Social Graphs via Uncertainty Semantics},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {495--506},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714584},
  doi          = {10.1145/2714576.2714584},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NguyenIR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/JhaBCR15,
  author       = {Tushant Jha and
                  Walid Belkhir and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Alex Norta and
                  Walid Gaaloul and
                  G. R. Gangadharan and
                  Hoa Khanh Dam},
  title        = {Expressive Equivalence and Succinctness of Parametrized Automata with
                  Respect to Finite Memory Automata},
  booktitle    = {Service-Oriented Computing - {ICSOC} 2015 Workshops - WESOA, RMSOC,
                  ISC, DISCO, WESE, BSCI, FOR-MOVES, Goa, India, November 16-19, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9586},
  pages        = {145--156},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-50539-7\_12},
  doi          = {10.1007/978-3-662-50539-7\_12},
  timestamp    = {Wed, 25 Sep 2019 18:15:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/JhaBCR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AnantharamanBNR14,
  author       = {Siva Anantharaman and
                  Christopher Bouchard and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Unification modulo a 2-sorted Equational theory for Cipher-Decipher
                  Block Chaining},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {10},
  number       = {1},
  year         = {2014},
  url          = {https://doi.org/10.2168/LMCS-10(1:5)2014},
  doi          = {10.2168/LMCS-10(1:5)2014},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AnantharamanBNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/CherifIR14,
  author       = {Asma Cherif and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Practical access control management for distributed collaborative
                  editors},
  journal      = {Pervasive Mob. Comput.},
  volume       = {15},
  pages        = {62--86},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.pmcj.2013.09.004},
  doi          = {10.1016/J.PMCJ.2013.09.004},
  timestamp    = {Thu, 30 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/CherifIR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiml/BelkhirRR14,
  author       = {Walid Belkhir and
                  Gisela Rossi and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Rajeev Gor{\'{e}} and
                  Barteld P. Kooi and
                  Agi Kurucz},
  title        = {A Parametrized Propositional Dynamic Logic with Application to Service
                  Synthesis},
  booktitle    = {Advances in Modal Logic 10, invited and contributed papers from the
                  tenth conference on "Advances in Modal Logic," held in Groningen,
                  The Netherlands, August 5-8, 2014},
  pages        = {34--53},
  publisher    = {College Publications},
  year         = {2014},
  url          = {http://www.aiml.net/volumes/volume10/Belkhir-Rossi-Rusinowitch.pdf},
  timestamp    = {Tue, 16 Jan 2024 17:18:03 +0100},
  biburl       = {https://dblp.org/rec/conf/aiml/BelkhirRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/NguyenIR14,
  author       = {Hiep H. Nguyen and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Wouter Joosen and
                  Fabio Martinelli and
                  Thomas Heyman},
  title        = {Enforcing Privacy in Decentralized Mobile Social Networks},
  booktitle    = {Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the
                  International Symposium on Engineering Secure Software and Systems
                  (ESSoS 2014), Munich, Germany, February 26, 2014},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1298},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1298/paper6.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:23 +0100},
  biburl       = {https://dblp.org/rec/conf/essos/NguyenIR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/NguyenIR14,
  author       = {Hiep H. Nguyen and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood and
                  Philip W. L. Fong},
  title        = {A Maximum Variance Approach for Graph Anonymization},
  booktitle    = {Foundations and Practice of Security - 7th International Symposium,
                  {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8930},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17040-4\_4},
  doi          = {10.1007/978-3-319-17040-4\_4},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/NguyenIR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/BelkhirCR14,
  author       = {Walid Belkhir and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Farouk Toumani and
                  Barbara Pernici and
                  Daniela Grigori and
                  Djamal Benslimane and
                  Jan Mendling and
                  Nejib Ben Hadj{-}Alouane and
                  M. Brian Blake and
                  Olivier Perrin and
                  Iman Saleh and
                  Sami Bhiri},
  title        = {An {EXPTIME} Algorithm for Data-Aware Service Simulation Using Parametrized
                  Automata},
  booktitle    = {Service-Oriented Computing - {ICSOC} 2014 Workshops - WESOA; SeMaPS,
                  RMSOC, KASA, ISC, FOR-MOVES, {CCSA} and Satellite Events, Paris, France,
                  November 3-6, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8954},
  pages        = {295--307},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-22885-3\_26},
  doi          = {10.1007/978-3-319-22885-3\_26},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/BelkhirCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NguyenIR14,
  author       = {Hiep H. Nguyen and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Anonymizing Social Graphs via Uncertainty Semantics},
  journal      = {CoRR},
  volume       = {abs/1408.1209},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.1209},
  eprinttype    = {arXiv},
  eprint       = {1408.1209},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NguyenIR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideas/MahfoudIR13,
  author       = {Houari Mahfoud and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Bipin C. Desai and
                  Josep Llu{\'{\i}}s Larriba{-}Pey and
                  Jorge Bernardino},
  title        = {\emph{SVMAX}: a system for secure and valid manipulation of {XML}
                  data},
  booktitle    = {17th International Database Engineering {\&} Applications Symposium,
                  {IDEAS} '13, Barcelona, Spain - October 09 - 11, 2013},
  pages        = {154--161},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2513591.2513657},
  doi          = {10.1145/2513591.2513657},
  timestamp    = {Thu, 10 Dec 2020 13:35:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ideas/MahfoudIR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lata/JacquemardR13,
  author       = {Florent Jacquemard and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Adrian{-}Horia Dediu and
                  Carlos Mart{\'{\i}}n{-}Vide and
                  Bianca Truthe},
  title        = {Rewrite Closure and {CF} Hedge Automata},
  booktitle    = {Language and Automata Theory and Applications - 7th International
                  Conference, {LATA} 2013, Bilbao, Spain, April 2-5, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7810},
  pages        = {371--382},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37064-9\_33},
  doi          = {10.1007/978-3-642-37064-9\_33},
  timestamp    = {Mon, 16 Sep 2019 15:27:03 +0200},
  biburl       = {https://dblp.org/rec/conf/lata/JacquemardR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/synasc/BelkhirCR13,
  author       = {Walid Belkhir and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Nikolaj S. Bj{\o}rner and
                  Viorel Negru and
                  Tetsuo Ida and
                  Tudor Jebelean and
                  Dana Petcu and
                  Stephen M. Watt and
                  Daniela Zaharie},
  title        = {Fresh-Variable Automata: Application to Service Composition},
  booktitle    = {15th International Symposium on Symbolic and Numeric Algorithms for
                  Scientific Computing, {SYNASC} 2013, Timisoara, Romania, September
                  23-26, 2013},
  pages        = {153--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SYNASC.2013.28},
  doi          = {10.1109/SYNASC.2013.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/synasc/BelkhirCR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-4205,
  author       = {Walid Belkhir and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Fresh-Variable Automata for Service Composition},
  journal      = {CoRR},
  volume       = {abs/1302.4205},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.4205},
  eprinttype    = {arXiv},
  eprint       = {1302.4205},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-4205.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1304-6297,
  author       = {Walid Belkhir and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Guarded Variable Automata over Infinite Alphabets},
  journal      = {CoRR},
  volume       = {abs/1304.6297},
  year         = {2013},
  url          = {http://arxiv.org/abs/1304.6297},
  eprinttype    = {arXiv},
  eprint       = {1304.6297},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1304-6297.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/ImineR13,
  author       = {Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Secure Collaboration for Smartphones},
  journal      = {{ERCIM} News},
  volume       = {2013},
  number       = {93},
  year         = {2013},
  url          = {http://ercim-news.ercim.eu/en93/special/secure-collaboration-for-smartphones},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/ImineR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/AnantharamanLLNR12,
  author       = {Siva Anantharaman and
                  Hai Lin and
                  Christopher Lynch and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Unification Modulo Homomorphic Encryption},
  journal      = {J. Autom. Reason.},
  volume       = {48},
  number       = {2},
  pages        = {135--158},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10817-010-9205-y},
  doi          = {10.1007/S10817-010-9205-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/AnantharamanLLNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/ChevalierR12,
  author       = {Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Decidability of Equivalence of Symbolic Derivations},
  journal      = {J. Autom. Reason.},
  volume       = {48},
  number       = {2},
  pages        = {263--292},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10817-010-9199-5},
  doi          = {10.1007/S10817-010-9199-5},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/ChevalierR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/AnantharamanELNR12,
  author       = {Siva Anantharaman and
                  Serdar Erbatur and
                  Christopher Lynch and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Bernhard Gramlich and
                  Dale Miller and
                  Uli Sattler},
  title        = {Unification Modulo Synchronous Distributivity},
  booktitle    = {Automated Reasoning - 6th International Joint Conference, {IJCAR}
                  2012, Manchester, UK, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7364},
  pages        = {14--29},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31365-3\_4},
  doi          = {10.1007/978-3-642-31365-3\_4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/AnantharamanELNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lata/AnantharamanBNR12,
  author       = {Siva Anantharaman and
                  Christopher Bouchard and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Adrian{-}Horia Dediu and
                  Carlos Mart{\'{\i}}n{-}Vide},
  title        = {Unification Modulo Chaining},
  booktitle    = {Language and Automata Theory and Applications - 6th International
                  Conference, {LATA} 2012, {A} Coru{\~{n}}a, Spain, March 5-9, 2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7183},
  pages        = {70--82},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28332-1\_7},
  doi          = {10.1007/978-3-642-28332-1\_7},
  timestamp    = {Sun, 02 Oct 2022 16:11:11 +0200},
  biburl       = {https://dblp.org/rec/conf/lata/AnantharamanBNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/AvanesovCRT12,
  author       = {Tigran Avanesov and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Towards the Orchestration of Secured Services under Non-disclosure
                  Policies},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_12},
  doi          = {10.1007/978-3-642-33704-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/AvanesovCRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12,
  author       = {Alessandro Armando and
                  Wihem Arsac and
                  Tigran Avanesov and
                  Michele Barletta and
                  Alberto Calvi and
                  Alessandro Cappai and
                  Roberto Carbone and
                  Yannick Chevalier and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Gabriel Erzse and
                  Simone Frau and
                  Marius Minea and
                  Sebastian M{\"{o}}dersheim and
                  David von Oheimb and
                  Giancarlo Pellegrino and
                  Serena Elisa Ponta and
                  Marco Rocchetto and
                  Micha{\"{e}}l Rusinowitch and
                  Mohammad Torabi Dashti and
                  Mathieu Turuani and
                  Luca Vigan{\`{o}}},
  editor       = {Cormac Flanagan and
                  Barbara K{\"{o}}nig},
  title        = {The {AVANTSSAR} Platform for the Automated Validation of Trust and
                  Security of Service-Oriented Architectures},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 18th International Conference, {TACAS} 2012, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7214},
  pages        = {267--282},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28756-5\_19},
  doi          = {10.1007/978-3-642-28756-5\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/GhabriMR13,
  author       = {Hatem Ghabri and
                  Ghazi Maatoug and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Adel Bouhoula and
                  Tetsuo Ida and
                  Fairouz Kamareddine},
  title        = {Compiling symbolic attacks to protocol implementation tests},
  booktitle    = {Proceedings Fourth International Symposium on Symbolic Computation
                  in Software Science, {SCSS} 2012, Gammarth, Tunisia, 15-17 December
                  2012},
  series       = {{EPTCS}},
  volume       = {122},
  pages        = {39--49},
  year         = {2012},
  url          = {https://doi.org/10.4204/EPTCS.122.4},
  doi          = {10.4204/EPTCS.122.4},
  timestamp    = {Wed, 12 Sep 2018 01:05:15 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GhabriMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-4871,
  author       = {Tigran Avanesov and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {Intruder deducibility constraints with negation. Decidability and
                  application to secured service compositions},
  journal      = {CoRR},
  volume       = {abs/1207.4871},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.4871},
  eprinttype    = {arXiv},
  eprint       = {1207.4871},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-4871.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1212-5108,
  author       = {Florent Jacquemard and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Rewrite Closure and {CF} Hedge Automata},
  journal      = {CoRR},
  volume       = {abs/1212.5108},
  year         = {2012},
  url          = {http://arxiv.org/abs/1212.5108},
  eprinttype    = {arXiv},
  eprint       = {1212.5108},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1212-5108.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jalc/AnantharamanNR11,
  author       = {Siva Anantharaman and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  title        = {String Rewriting and Security Analysis: An Extension of a Result of
                  Book and Otto},
  journal      = {J. Autom. Lang. Comb.},
  volume       = {16},
  number       = {2-4},
  pages        = {75--90},
  year         = {2011},
  url          = {https://doi.org/10.25596/jalc-2011-075},
  doi          = {10.25596/JALC-2011-075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jalc/AnantharamanNR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AvanesovCMR11,
  author       = {Tigran Avanesov and
                  Yannick Chevalier and
                  Mohammed Anis Mekki and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nora Cuppens{-}Boulahia and
                  Sabrina De Capitani di Vimercati},
  title        = {Web Services Verification and Prudent Implementation},
  booktitle    = {Data Privacy Management and Autonomous Spontaneus Security - 6th International
                  Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,
                  Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7122},
  pages        = {173--189},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28879-1\_12},
  doi          = {10.1007/978-3-642-28879-1\_12},
  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AvanesovCMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AvanesovCMRT11,
  author       = {Tigran Avanesov and
                  Yannick Chevalier and
                  Mohammed Anis Mekki and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nora Cuppens{-}Boulahia and
                  Sabrina De Capitani di Vimercati},
  title        = {Distributed Orchestration of Web Services under Security Constraints},
  booktitle    = {Data Privacy Management and Autonomous Spontaneus Security - 6th International
                  Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,
                  Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7122},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28879-1\_16},
  doi          = {10.1007/978-3-642-28879-1\_16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AvanesovCMRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispdc/AcharaIR11,
  author       = {Jagdish Prasad Achara and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  title        = {DeSCal - Decentralized Shared Calendar for {P2P} and Ad-Hoc Networks},
  booktitle    = {10th International Symposium on Parallel and Distributed Computing,
                  {ISPDC} 2011, Cluj-Napoca, Romania, July 6-8, 2011},
  pages        = {223--231},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISPDC.2011.40},
  doi          = {10.1109/ISPDC.2011.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispdc/AcharaIR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/CherifIR11,
  author       = {Asma Cherif and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {William C. Chu and
                  W. Eric Wong and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Optimistic access control for distributed collaborative editors},
  booktitle    = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC),
                  TaiChung, Taiwan, March 21 - 24, 2011},
  pages        = {861--868},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982185.1982374},
  doi          = {10.1145/1982185.1982374},
  timestamp    = {Thu, 30 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/CherifIR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/RusinowitchT11,
  author       = {Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Verifying a bounded number of sessions and its complexity},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {13--34},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-13},
  doi          = {10.3233/978-1-60750-714-7-13},
  timestamp    = {Fri, 15 May 2020 12:11:04 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/RusinowitchT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-0220,
  author       = {Tigran Avanesov and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {Satisfiability of General Intruder Constraints with and without a
                  Set Constructor},
  journal      = {CoRR},
  volume       = {abs/1103.0220},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.0220},
  eprinttype    = {arXiv},
  eprint       = {1103.0220},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-0220.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/NicoliniRR10,
  author       = {Enrica Nicolini and
                  Christophe Ringeissen and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Combining Satisfiability Procedures for Unions of Theories with a
                  Shared Counting Operator},
  journal      = {Fundam. Informaticae},
  volume       = {105},
  number       = {1-2},
  pages        = {163--187},
  year         = {2010},
  url          = {https://doi.org/10.3233/FI-2010-362},
  doi          = {10.3233/FI-2010-362},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/NicoliniRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AbbesBR10,
  author       = {Tarek Abbes and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Efficient decision tree for protocol analysis in intrusion detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {220--235},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037661},
  doi          = {10.1504/IJSN.2010.037661},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbbesBR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ChevalierR10,
  author       = {Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Compiling and securing cryptographic protocols},
  journal      = {Inf. Process. Lett.},
  volume       = {110},
  number       = {3},
  pages        = {116--122},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ipl.2009.11.004},
  doi          = {10.1016/J.IPL.2009.11.004},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/ChevalierR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ChevalierR10,
  author       = {Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Symbolic protocol analysis in the union of disjoint intruder theories:
                  Combining decision procedures},
  journal      = {Theor. Comput. Sci.},
  volume       = {411},
  number       = {10},
  pages        = {1261--1282},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.tcs.2009.10.022},
  doi          = {10.1016/J.TCS.2009.10.022},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ChevalierR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AnantharamanLLNR10,
  author       = {Siva Anantharaman and
                  Hai Lin and
                  Christopher Lynch and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Cap unification: application to protocol security modulo homomorphic
                  encryption},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {192--203},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755713},
  doi          = {10.1145/1755688.1755713},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AnantharamanLLNR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/AvanesovCRT10,
  author       = {Tigran Avanesov and
                  Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {Satisfiability of general intruder constraints with a set constructor},
  booktitle    = {CRiSIS 2010, Proceedings of the Fifth International Conference on
                  Risks and Security of Internet and Systems, Montreal, QC, Canada,
                  October 10-13, 2010},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CRISIS.2010.5764919},
  doi          = {10.1109/CRISIS.2010.5764919},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/AvanesovCRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmco/ChevalierMR10,
  author       = {Yannick Chevalier and
                  Mohammed Anis Mekki and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Bernhard K. Aichernig and
                  Frank S. de Boer and
                  Marcello M. Bonsangue},
  title        = {Orchestration under Security Constraints},
  booktitle    = {Formal Methods for Components and Objects - 9th International Symposium,
                  {FMCO} 2010, Graz, Austria, November 29 - December 1, 2010. Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6957},
  pages        = {23--44},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25271-6\_2},
  doi          = {10.1007/978-3-642-25271-6\_2},
  timestamp    = {Thu, 14 Oct 2021 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fmco/ChevalierMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppdp/JacquemardR10,
  author       = {Florent Jacquemard and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Temur Kutsia and
                  Wolfgang Schreiner and
                  Maribel Fern{\'{a}}ndez},
  title        = {Rewrite-based verification of {XML} updates},
  booktitle    = {Proceedings of the 12th International {ACM} {SIGPLAN} Conference on
                  Principles and Practice of Declarative Programming, July 26-28, 2010,
                  Hagenberg, Austria},
  pages        = {119--130},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1836089.1836105},
  doi          = {10.1145/1836089.1836105},
  timestamp    = {Tue, 27 Nov 2018 15:52:28 +0100},
  biburl       = {https://dblp.org/rec/conf/ppdp/JacquemardR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/AhmedIR10,
  author       = {Zeeshan Ahmed and
                  Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Miguel Soriano},
  title        = {Safe and Efficient Strategies for Updating Firewall Policies},
  booktitle    = {Trust, Privacy and Security in Digital Business, 7th International
                  Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6264},
  pages        = {45--57},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15152-1\_5},
  doi          = {10.1007/978-3-642-15152-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/AhmedIR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/NicoliniRR09,
  author       = {Enrica Nicolini and
                  Christophe Ringeissen and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Renate A. Schmidt},
  title        = {Combinable Extensions of Abelian Groups},
  booktitle    = {Automated Deduction - CADE-22, 22nd International Conference on Automated
                  Deduction, Montreal, Canada, August 2-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5663},
  pages        = {51--66},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02959-2\_4},
  doi          = {10.1007/978-3-642-02959-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/NicoliniRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChridiTR09,
  author       = {Najah Chridi and
                  Mathieu Turuani and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Decidable Analysis for a Class of Cryptographic Group Protocols with
                  Unbounded Lists},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {277--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.10},
  doi          = {10.1109/CSF.2009.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChridiTR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/AnantharamanLLNR09,
  author       = {Siva Anantharaman and
                  Hai Lin and
                  Christopher Lynch and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Silvio Ghilardi and
                  Roberto Sebastiani},
  title        = {Unification Modulo Homomorphic Encryption},
  booktitle    = {Frontiers of Combining Systems, 7th International Symposium, FroCoS
                  2009, Trento, Italy, September 16-18, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5749},
  pages        = {100--116},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04222-5\_6},
  doi          = {10.1007/978-3-642-04222-5\_6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/frocos/AnantharamanLLNR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/NicoliniRR09,
  author       = {Enrica Nicolini and
                  Christophe Ringeissen and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Silvio Ghilardi and
                  Roberto Sebastiani},
  title        = {Data Structures with Arithmetic Constraints: {A} Non-disjoint Combination},
  booktitle    = {Frontiers of Combining Systems, 7th International Symposium, FroCoS
                  2009, Trento, Italy, September 16-18, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5749},
  pages        = {319--334},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04222-5\_20},
  doi          = {10.1007/978-3-642-04222-5\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/frocos/NicoliniRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ImineCR09,
  author       = {Abdessamad Imine and
                  Asma Cherif and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Flexible Access Control Model for Distributed Collaborative Editors},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_6},
  doi          = {10.1007/978-3-642-04219-5\_6},
  timestamp    = {Thu, 30 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ImineCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/NicoliniRR09,
  author       = {Enrica Nicolini and
                  Christophe Ringeissen and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Stefan Kowalewski and
                  Anna Philippou},
  title        = {Satisfiability Procedures for Combination of Theories Sharing Integer
                  Offsets},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems,
                  15th International Conference, {TACAS} 2009, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2009,
                  York, UK, March 22-29, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5505},
  pages        = {428--442},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00768-2\_35},
  doi          = {10.1007/978-3-642-00768-2\_35},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/NicoliniRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-5125,
  author       = {Florent Jacquemard and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Rewrite based Verification of {XML} Updates},
  journal      = {CoRR},
  volume       = {abs/0907.5125},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.5125},
  eprinttype    = {arXiv},
  eprint       = {0907.5125},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-5125.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0910-5099,
  author       = {Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Compiling and securing cryptographic protocols},
  journal      = {CoRR},
  volume       = {abs/0910.5099},
  year         = {2009},
  url          = {http://arxiv.org/abs/0910.5099},
  eprinttype    = {arXiv},
  eprint       = {0910.5099},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-5099.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ChevalierR08,
  author       = {Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Hierarchical combination of intruder theories},
  journal      = {Inf. Comput.},
  volume       = {206},
  number       = {2-4},
  pages        = {352--377},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ic.2007.07.004},
  doi          = {10.1016/J.IC.2007.07.004},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ChevalierR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/JacquemardRV08,
  author       = {Florent Jacquemard and
                  Micha{\"{e}}l Rusinowitch and
                  Laurent Vigneron},
  title        = {Tree automata with equality constraints modulo equational theories},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {75},
  number       = {2},
  pages        = {182--208},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jlap.2007.10.006},
  doi          = {10.1016/J.JLAP.2007.10.006},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/JacquemardRV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/ChevalierKRT08,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {Complexity results for security protocols with Diffie-Hellman exponentiation
                  and commuting public key encryption},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {9},
  number       = {4},
  pages        = {24:1--24:52},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380572.1380573},
  doi          = {10.1145/1380572.1380573},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocl/ChevalierKRT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AbdelnurARS08,
  author       = {Humberto J. Abdelnur and
                  Tigran Avanesov and
                  Micha{\"{e}}l Rusinowitch and
                  Radu State},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Abusing {SIP} Authentication},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {237--242},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.29},
  doi          = {10.1109/IAS.2008.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AbdelnurARS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/JacquemardR08,
  author       = {Florent Jacquemard and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Andrei Voronkov},
  title        = {Closure of Hedge-Automata Languages by Hedge Rewriting},
  booktitle    = {Rewriting Techniques and Applications, 19th International Conference,
                  {RTA} 2008, Hagenberg, Austria, July 15-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5117},
  pages        = {157--171},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70590-1\_11},
  doi          = {10.1007/978-3-540-70590-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/JacquemardR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/AbbesBR08,
  author       = {Tarek Abbes and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Roger L. Wainwright and
                  Hisham Haddad},
  title        = {An inference system for detecting firewall filtering rules anomalies},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC),
                  Fortaleza, Ceara, Brazil, March 16-20, 2008},
  pages        = {2122--2128},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1363686.1364197},
  doi          = {10.1145/1363686.1364197},
  timestamp    = {Tue, 06 Nov 2018 11:06:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/AbbesBR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/ChevalierMR08,
  author       = {Yannick Chevalier and
                  Mohammed Anis Mekki and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Automatic Composition of Services with Security Policies},
  booktitle    = {2008 {IEEE} Congress on Services, Part I, {SERVICES} {I} 2008, Honolulu,
                  Hawaii, USA, July 6-11, 2008},
  pages        = {529--537},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SERVICES-1.2008.13},
  doi          = {10.1109/SERVICES-1.2008.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/ChevalierMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/unif/AnantharamanLLNR08,
  author       = {Siva Anantharaman and
                  Hai Lin and
                  Christopher Lynch and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Mircea Marin},
  title        = {Unification modulo Homomorphic Encryption is Decidable},
  booktitle    = {Proceedings of the 22nd International Workshop on Unification, {UNIF}
                  2008, Castle of Hagenberg, Austria, July 18, 2008},
  pages        = {1--15},
  year         = {2008},
  url          = {https://www3.risc.jku.at/publications/download/risc\_3454/UNIF\_proceedings.pdf\#page=9},
  timestamp    = {Tue, 19 Sep 2023 14:44:31 +0200},
  biburl       = {https://dblp.org/rec/conf/unif/AnantharamanLLNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2008P8171,
  editor       = {Anca Muscholl and
                  Ramaswamy Ramanujam and
                  Micha{\"{e}}l Rusinowitch and
                  Thomas Schwentick and
                  Victor Vianu},
  title        = {Beyond the Finite: New Challenges in Verification and Semistructured
                  Data, 20.04. - 25.04.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08171},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/08171/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2008P8171.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/MuschollRRSV08,
  author       = {Anca Muscholl and
                  Ramaswamy Ramanujam and
                  Micha{\"{e}}l Rusinowitch and
                  Thomas Schwentick and
                  Victor Vianu},
  editor       = {Anca Muscholl and
                  Ramaswamy Ramanujam and
                  Micha{\"{e}}l Rusinowitch and
                  Thomas Schwentick and
                  Victor Vianu},
  title        = {08171 Abstracts Collection - Beyond the Finite: New Challenges in
                  Verification and Semistructured Data},
  booktitle    = {Beyond the Finite: New Challenges in Verification and Semistructured
                  Data, 20.04. - 25.04.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08171},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1560/},
  timestamp    = {Thu, 10 Jun 2021 13:02:04 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/MuschollRRSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/MuschollRRSV08a,
  author       = {Anca Muscholl and
                  Ramaswamy Ramanujam and
                  Micha{\"{e}}l Rusinowitch and
                  Thomas Schwentick and
                  Victor Vianu},
  editor       = {Anca Muscholl and
                  Ramaswamy Ramanujam and
                  Micha{\"{e}}l Rusinowitch and
                  Thomas Schwentick and
                  Victor Vianu},
  title        = {08171 Summary - Beyond the Finite: New Challenges in Verification
                  and Semistructured Data},
  booktitle    = {Beyond the Finite: New Challenges in Verification and Semistructured
                  Data, 20.04. - 25.04.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08171},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1558/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/MuschollRRSV08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmcs/CortierRZ07,
  author       = {V{\'{e}}ronique Cortier and
                  Micha{\"{e}}l Rusinowitch and
                  Eugen Zalinescu},
  title        = {Relating two standard notions of secrecy},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {3},
  number       = {3},
  year         = {2007},
  url          = {https://doi.org/10.2168/LMCS-3(3:2)2007},
  doi          = {10.2168/LMCS-3(3:2)2007},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lmcs/CortierRZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/AbbesBR07,
  author       = {Tarek Abbes and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  title        = {A Traffic Classification Algorithm for Intrusion Detection},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {188--193},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.62},
  doi          = {10.1109/AINAW.2007.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/AbbesBR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ImineR07,
  author       = {Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Hubert Comon{-}Lundh and
                  Claude Kirchner and
                  H{\'{e}}l{\`{e}}ne Kirchner},
  title        = {Applying a Theorem Prover to the Verification of Optimistic Replication
                  Algorithms},
  booktitle    = {Rewriting, Computation and Proof, Essays Dedicated to Jean-Pierre
                  Jouannaud on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {4600},
  pages        = {213--234},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73147-4\_11},
  doi          = {10.1007/978-3-540-73147-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ImineR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/ChevalierLR07,
  author       = {Yannick Chevalier and
                  Denis Lugiez and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Boris Konev and
                  Frank Wolter},
  title        = {Towards an Automatic Analysis of Web Service Security},
  booktitle    = {Frontiers of Combining Systems, 6th International Symposium, FroCoS
                  2007, Liverpool, UK, September 10-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4720},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74621-8\_9},
  doi          = {10.1007/978-3-540-74621-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/frocos/ChevalierLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/ChevalierLR07,
  author       = {Yannick Chevalier and
                  Denis Lugiez and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Nachum Dershowitz and
                  Andrei Voronkov},
  title        = {Verifying Cryptographic Protocols with Subterms Constraints},
  booktitle    = {Logic for Programming, Artificial Intelligence, and Reasoning, 14th
                  International Conference, {LPAR} 2007, Yerevan, Armenia, October 15-19,
                  2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4790},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75560-9\_15},
  doi          = {10.1007/978-3-540-75560-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/ChevalierLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/AnantharamanNR07,
  author       = {Siva Anantharaman and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Franz Baader},
  title        = {Intruders with Caps},
  booktitle    = {Term Rewriting and Applications, 18th International Conference, {RTA}
                  2007, Paris, France, June 26-28, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4533},
  pages        = {20--35},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73449-9\_4},
  doi          = {10.1007/978-3-540-73449-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/AnantharamanNR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0706-0502,
  author       = {V{\'{e}}ronique Cortier and
                  Micha{\"{e}}l Rusinowitch and
                  Eugen Zalinescu},
  title        = {Relating two standard notions of secrecy},
  journal      = {CoRR},
  volume       = {abs/0706.0502},
  year         = {2007},
  url          = {http://arxiv.org/abs/0706.0502},
  eprinttype    = {arXiv},
  eprint       = {0706.0502},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0706-0502.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jalc/AnantharamanGHM06,
  author       = {Siva Anantharaman and
                  Paul Gastin and
                  Ga{\'{e}}tan Hains and
                  John Mullins and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Editorial},
  journal      = {J. Autom. Lang. Comb.},
  volume       = {11},
  number       = {1},
  pages        = {5--6},
  year         = {2006},
  url          = {https://doi.org/10.25596/jalc-2006-005},
  doi          = {10.25596/JALC-2006-005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jalc/AnantharamanGHM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/ArmandoBCRV06,
  author       = {Alessandro Armando and
                  David A. Basin and
                  Jorge Cu{\'{e}}llar and
                  Micha{\"{e}}l Rusinowitch and
                  Luca Vigan{\`{o}}},
  title        = {Automated Reasoning for Security Protocol Analysis},
  journal      = {J. Autom. Reason.},
  volume       = {36},
  number       = {1-2},
  pages        = {1--3},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10817-005-9014-x},
  doi          = {10.1007/S10817-005-9014-X},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/ArmandoBCRV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ImineROM06,
  author       = {Abdessamad Imine and
                  Micha{\"{e}}l Rusinowitch and
                  G{\'{e}}rald Oster and
                  Pascal Molli},
  title        = {Formal design and verification of operational transformation algorithms
                  for copies convergence},
  journal      = {Theor. Comput. Sci.},
  volume       = {351},
  number       = {2},
  pages        = {167--183},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2005.09.066},
  doi          = {10.1016/J.TCS.2005.09.066},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ImineROM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/JacquemardRV06,
  author       = {Florent Jacquemard and
                  Micha{\"{e}}l Rusinowitch and
                  Laurent Vigneron},
  editor       = {Ulrich Furbach and
                  Natarajan Shankar},
  title        = {Tree Automata with Equality Constraints Modulo Equational Theories},
  booktitle    = {Automated Reasoning, Third International Joint Conference, {IJCAR}
                  2006, Seattle, WA, USA, August 17-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4130},
  pages        = {557--571},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11814771\_45},
  doi          = {10.1007/11814771\_45},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/JacquemardRV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/CortierRZ06,
  author       = {V{\'{e}}ronique Cortier and
                  Micha{\"{e}}l Rusinowitch and
                  Eugen Zalinescu},
  editor       = {Zolt{\'{a}}n {\'{E}}sik},
  title        = {Relating Two Standard Notions of Secrecy},
  booktitle    = {Computer Science Logic, 20th International Workshop, {CSL} 2006, 15th
                  Annual Conference of the EACSL, Szeged, Hungary, September 25-29,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4207},
  pages        = {303--318},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11874683\_20},
  doi          = {10.1007/11874683\_20},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/CortierRZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ZalinescuCR06,
  author       = {Eugen Zalinescu and
                  V{\'{e}}ronique Cortier and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Serge Autexier and
                  Stephan Merz and
                  Leendert W. N. van der Torre and
                  Reinhard Wilhelm and
                  Pierre Wolper},
  title        = {Relating two standard notions of secrecy},
  booktitle    = {Workshop "Trustworthy Software" 2006, May 18-19, 2006, Saarland University,
                  Saarbr{\"{u}}cken, Germany},
  series       = {OASIcs},
  volume       = {3},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2006},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2006/691},
  timestamp    = {Tue, 15 Feb 2022 09:40:05 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ZalinescuCR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/ChevalierR06,
  author       = {Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Frank Pfenning},
  title        = {Hierarchical Combination of Intruder Theories},
  booktitle    = {Term Rewriting and Applications, 17th International Conference, {RTA}
                  2006, Seattle, WA, USA, August 12-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4098},
  pages        = {108--122},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805618\_9},
  doi          = {10.1007/11805618\_9},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/ChevalierR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AnantharamanNR05,
  author       = {Siva Anantharaman and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Closure properties and decision problems of dag automata},
  journal      = {Inf. Process. Lett.},
  volume       = {94},
  number       = {5},
  pages        = {231--240},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.ipl.2005.02.004},
  doi          = {10.1016/J.IPL.2005.02.004},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/AnantharamanNR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ChevalierKRT05,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {An {NP} decision procedure for protocol insecurity with {XOR}},
  journal      = {Theor. Comput. Sci.},
  volume       = {338},
  number       = {1-3},
  pages        = {247--274},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.tcs.2005.01.015},
  doi          = {10.1016/J.TCS.2005.01.015},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ChevalierKRT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ArmandoBBCCCDHKMMORSTVV05,
  author       = {Alessandro Armando and
                  David A. Basin and
                  Yohan Boichut and
                  Yannick Chevalier and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Paul Hankes Drielsma and
                  Pierre{-}Cyrille H{\'{e}}am and
                  Olga Kouchnarenko and
                  Jacopo Mantovani and
                  Sebastian M{\"{o}}dersheim and
                  David von Oheimb and
                  Micha{\"{e}}l Rusinowitch and
                  Judson Santiago and
                  Mathieu Turuani and
                  Luca Vigan{\`{o}} and
                  Laurent Vigneron},
  editor       = {Kousha Etessami and
                  Sriram K. Rajamani},
  title        = {The {AVISPA} Tool for the Automated Validation of Internet Security
                  Protocols and Applications},
  booktitle    = {Computer Aided Verification, 17th International Conference, {CAV}
                  2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3576},
  pages        = {281--285},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11513988\_27},
  doi          = {10.1007/11513988\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ArmandoBBCCCDHKMMORSTVV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/ImineMOR05,
  author       = {Abdessamad Imine and
                  Pascal Molli and
                  G{\'{e}}rald Oster and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Farn Wang},
  title        = {Towards Synchronizing Linear Collaborative Objects with Operational
                  Transformation},
  booktitle    = {Formal Techniques for Networked and Distributed Systems - {FORTE}
                  2005, 25th {IFIP} {WG} 6.1 International Conference, Taipei, Taiwan,
                  October 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3731},
  pages        = {411--427},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11562436\_30},
  doi          = {10.1007/11562436\_30},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/ImineMOR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ChevalierR05,
  author       = {Yannick Chevalier and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Combining Intruder Theories},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {639--651},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_52},
  doi          = {10.1007/11523468\_52},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/ChevalierR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppdp/CortierRZ05,
  author       = {V{\'{e}}ronique Cortier and
                  Micha{\"{e}}l Rusinowitch and
                  Eugen Zalinescu},
  editor       = {Pedro Barahona and
                  Amy P. Felty},
  title        = {A resolution strategy for verifying cryptographic protocols with {CBC}
                  encryption and blind signatures},
  booktitle    = {Proceedings of the 7th International {ACM} {SIGPLAN} Conference on
                  Principles and Practice of Declarative Programming, July 11-13 2005,
                  Lisbon, Portugal},
  pages        = {12--22},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1069774.1069776},
  doi          = {10.1145/1069774.1069776},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ppdp/CortierRZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/AbbesBR04,
  author       = {Tarek Abbes and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  title        = {On the fly pattern matching for intrusion detection with Snort},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {59},
  number       = {9-10},
  pages        = {1045--1071},
  year         = {2004},
  url          = {https://doi.org/10.1007/BF03179710},
  doi          = {10.1007/BF03179710},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/AbbesBR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/AnantharamanNR04,
  author       = {Siva Anantharaman and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Unification Modulo \emph{ACUI} Plus Distributivity Axioms},
  journal      = {J. Autom. Reason.},
  volume       = {33},
  number       = {1},
  pages        = {1--28},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10817-004-2279-7},
  doi          = {10.1007/S10817-004-2279-7},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/AnantharamanNR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/GottlobHR04,
  author       = {Georg Gottlob and
                  Miki Hermann and
                  Micha{\"{e}}l Rusinowitch},
  title        = {2nd International Workshop on Complexity in Automated Deduction (CiAD)
                  - Foreword},
  journal      = {Theory Comput. Syst.},
  volume       = {37},
  number       = {6},
  pages        = {639--640},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00224-004-3706-1},
  doi          = {10.1007/S00224-004-3706-1},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mst/GottlobHR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/Rusinowitch04,
  author       = {Micha{\"{e}}l Rusinowitch},
  title        = {{\'{E}}ditorial},
  journal      = {Tech. Sci. Informatiques},
  volume       = {23},
  number       = {3},
  pages        = {289--290},
  year         = {2004},
  url          = {http://tsi.revuesonline.com/article.jsp?articleId=3239},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/Rusinowitch04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/ImineMOR04,
  author       = {Abdessamad Imine and
                  Pascal Molli and
                  G{\'{e}}rald Oster and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Charles Rattray and
                  Savi Maharaj and
                  Carron Shankland},
  title        = {Deductive Verification of Distributed Groupware Systems},
  booktitle    = {Algebraic Methodology and Software Technology, 10th International
                  Conference, {AMAST} 2004, Stirling, Scotland, UK, July 12-16, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3116},
  pages        = {226--240},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27815-3\_20},
  doi          = {10.1007/978-3-540-27815-3\_20},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/amast/ImineMOR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifipTCS/Rusinowitch04,
  author       = {Micha{\"{e}}l Rusinowitch},
  editor       = {Jean{-}Jacques L{\'{e}}vy and
                  Ernst W. Mayr and
                  John C. Mitchell},
  title        = {A Decidable Analysis of Security Protocols},
  booktitle    = {Exploring New Frontiers of Theoretical Informatics, {IFIP} 18th World
                  Computer Congress, {TC1} 3rd International Conference on Theoretical
                  Computer Science (TCS2004), 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {155},
  pages        = {21},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8141-3\_4},
  doi          = {10.1007/1-4020-8141-3\_4},
  timestamp    = {Fri, 27 Sep 2019 10:35:17 +0200},
  biburl       = {https://dblp.org/rec/conf/ifipTCS/Rusinowitch04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/AbbesBR04,
  author       = {Tarek Abbes and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Protocol Analysis in Intrusion Detection Using Decision Tree},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {404--408},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286488},
  doi          = {10.1109/ITCC.2004.1286488},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/AbbesBR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ChevalierKRT05,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Deciding the Security of Protocols with Commuting Public Key Encryption},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {55--66},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.019},
  doi          = {10.1016/J.ENTCS.2004.05.019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/ChevalierKRT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cade/2004,
  editor       = {David A. Basin and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Automated Reasoning - Second International Joint Conference, {IJCAR}
                  2004, Cork, Ireland, July 4-8, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3097},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98691},
  doi          = {10.1007/B98691},
  isbn         = {3-540-22345-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ArmandoRR03,
  author       = {Alessandro Armando and
                  Silvio Ranise and
                  Micha{\"{e}}l Rusinowitch},
  title        = {A rewriting approach to satisfiability procedures},
  journal      = {Inf. Comput.},
  volume       = {183},
  number       = {2},
  pages        = {140--164},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0890-5401(03)00020-8},
  doi          = {10.1016/S0890-5401(03)00020-8},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ArmandoRR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/RusinowitchSK03,
  author       = {Micha{\"{e}}l Rusinowitch and
                  Sorin Stratulat and
                  Francis Klay},
  title        = {Mechanical Verification of an Ideal Incremental {ABR} Conformance
                  Algorithm},
  journal      = {J. Autom. Reason.},
  volume       = {30},
  number       = {2},
  pages        = {53--177},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1023251327012},
  doi          = {10.1023/A:1023251327012},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/RusinowitchSK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/RusinowitchT03,
  author       = {Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {Protocol insecurity with a finite number of sessions, composed keys
                  is NP-complete},
  journal      = {Theor. Comput. Sci.},
  volume       = {299},
  number       = {1-3},
  pages        = {451--475},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0304-3975(02)00490-5},
  doi          = {10.1016/S0304-3975(02)00490-5},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/RusinowitchT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/ComonNNR03,
  author       = {Hubert Comon and
                  Paliath Narendran and
                  Robert Nieuwenhuis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Deciding the confluence of ordered term rewrite systems},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {4},
  number       = {1},
  pages        = {33--55},
  year         = {2003},
  url          = {https://doi.org/10.1145/601775.601777},
  doi          = {10.1145/601775.601777},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocl/ComonNNR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/AnantharamanNR03,
  author       = {Siva Anantharaman and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Franz Baader},
  title        = {Unification Modulo {ACU} {I} Plus Homomorphisms/Distributivity},
  booktitle    = {Automated Deduction - CADE-19, 19th International Conference on Automated
                  Deduction Miami Beach, FL, USA, July 28 - August 2, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2741},
  pages        = {442--457},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45085-6\_38},
  doi          = {10.1007/978-3-540-45085-6\_38},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/AnantharamanNR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/ChevalierKRTV03,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani and
                  Laurent Vigneron},
  editor       = {Matthias Baaz and
                  Johann A. Makowsky},
  title        = {Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number
                  of Sessions},
  booktitle    = {Computer Science Logic, 17th International Workshop, {CSL} 2003, 12th
                  Annual Conference of the EACSL, and 8th Kurt G{\"{o}}del Colloquium,
                  {KGC} 2003, Vienna, Austria, August 25-30, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2803},
  pages        = {128--141},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45220-1\_13},
  doi          = {10.1007/978-3-540-45220-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/ChevalierKRTV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecscw/ImineMOR03,
  author       = {Abdessamad Imine and
                  Pascal Molli and
                  G{\'{e}}rald Oster and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Kari Kuutti and
                  Eija Helena Karsten and
                  Geraldine Fitzpatrick and
                  Paul Dourish and
                  Kjeld Schmidt},
  title        = {Proving Correctness of Transformation Functions in Real-Time Groupware},
  booktitle    = {Proceedings of the Eighth European Conference on Computer Supported
                  Cooperative Work, 14-18 September 2003, Helsinki, Finland},
  pages        = {277--293},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-94-010-0068-0\_15},
  doi          = {10.1007/978-94-010-0068-0\_15},
  timestamp    = {Wed, 25 Sep 2019 18:03:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ecscw/ImineMOR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/MussetR03,
  author       = {Julien Musset and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Keijiro Araki and
                  Stefania Gnesi and
                  Dino Mandrioli},
  title        = {Computing Meta-transitions for Linear Transition Systems with Polynomials},
  booktitle    = {{FME} 2003: Formal Methods, International Symposium of Formal Methods
                  Europe, Pisa, Italy, September 8-14, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2805},
  pages        = {562--581},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45236-2\_31},
  doi          = {10.1007/978-3-540-45236-2\_31},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/MussetR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/ChevalierKRT03,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {Paritosh K. Pandya and
                  Jaikumar Radhakrishnan},
  title        = {Deciding the Security of Protocols with Diffie-Hellman Exponentiation
                  and Products in Exponents},
  booktitle    = {{FST} {TCS} 2003: Foundations of Software Technology and Theoretical
                  Computer Science, 23rd Conference, Mumbai, India, December 15-17,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2914},
  pages        = {124--135},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24597-1\_11},
  doi          = {10.1007/978-3-540-24597-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/ChevalierKRT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/ChevalierKRT03,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {An {NP} Decision Procedure for Protocol Insecurity with {XOR}},
  booktitle    = {18th {IEEE} Symposium on Logic in Computer Science {(LICS} 2003),
                  22-25 June 2003, Ottawa, Canada, Proceedings},
  pages        = {261--270},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/LICS.2003.1210066},
  doi          = {10.1109/LICS.2003.1210066},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/ChevalierKRT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/AnantharamanNR03,
  author       = {Siva Anantharaman and
                  Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Branislav Rovan and
                  Peter Vojt{\'{a}}s},
  title        = {ACID-Unification Is NEXPTIME-Decidable},
  booktitle    = {Mathematical Foundations of Computer Science 2003, 28th International
                  Symposium, {MFCS} 2003, Bratislava, Slovakia, August 25-29, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2747},
  pages        = {169--178},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45138-9\_11},
  doi          = {10.1007/978-3-540-45138-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/AnantharamanNR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Rusinowitch03,
  author       = {Micha{\"{e}}l Rusinowitch},
  editor       = {Lubos Brim and
                  Orna Grumberg},
  title        = {Automated analysis of security protocols},
  booktitle    = {12th International Workshop on Functional and Constraint Logic Programming,
                  {WFLP} 2003, in connection with RDP'03, Federated Conference on Rewriting,
                  Deduction and Programming, Boulder, Colorado, USA, July 14, 2003},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {86},
  number       = {3},
  pages        = {12--15},
  publisher    = {Elsevier},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1571-0661(04)80690-X},
  doi          = {10.1016/S1571-0661(04)80690-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/Rusinowitch03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/NarendranR02,
  author       = {Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Guest Editorial},
  journal      = {Inf. Comput.},
  volume       = {178},
  number       = {2},
  pages        = {345},
  year         = {2002},
  url          = {https://doi.org/10.1006/inco.2002.3159},
  doi          = {10.1006/INCO.2002.3159},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/NarendranR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/ArmandoRS02,
  author       = {Alessandro Armando and
                  Micha{\"{e}}l Rusinowitch and
                  Sorin Stratulat},
  title        = {Incorporating Decision Procedures in Implicit Induction},
  journal      = {J. Symb. Comput.},
  volume       = {34},
  number       = {4},
  pages        = {241--258},
  year         = {2002},
  url          = {https://doi.org/10.1006/jsco.2002.0549},
  doi          = {10.1006/JSCO.2002.0549},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/ArmandoRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BouhoulaR02,
  author       = {Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Observational proofs by rewriting},
  journal      = {Theor. Comput. Sci.},
  volume       = {275},
  number       = {1-2},
  pages        = {675--698},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0304-3975(01)00333-4},
  doi          = {10.1016/S0304-3975(01)00333-4},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BouhoulaR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ArmandoBBCCMRTVV02,
  author       = {Alessandro Armando and
                  David A. Basin and
                  Mehdi Bouallagui and
                  Yannick Chevalier and
                  Luca Compagna and
                  Sebastian M{\"{o}}dersheim and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani and
                  Luca Vigan{\`{o}} and
                  Laurent Vigneron},
  editor       = {Ed Brinksma and
                  Kim Guldstrand Larsen},
  title        = {The {AVISS} Security Protocol Analysis Tool},
  booktitle    = {Computer Aided Verification, 14th International Conference, {CAV}
                  2002,Copenhagen, Denmark, July 27-31, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2404},
  pages        = {349--353},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45657-0\_27},
  doi          = {10.1007/3-540-45657-0\_27},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ArmandoBBCCMRTVV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/VermaRL01,
  author       = {Rakesh M. Verma and
                  Micha{\"{e}}l Rusinowitch and
                  Denis Lugiez},
  title        = {Algorithms and Reductions for Rewriting Problems},
  journal      = {Fundam. Informaticae},
  volume       = {46},
  number       = {3},
  pages        = {257--276},
  year         = {2001},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi46-3-05},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/VermaRL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RusinowitchT01,
  author       = {Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  title        = {Protocol Insecurity with Finite Number of Sessions is NP-Complete},
  booktitle    = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
                  11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages        = {174--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSFW.2001.930145},
  doi          = {10.1109/CSFW.2001.930145},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RusinowitchT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/ArmandoRR01,
  author       = {Alessandro Armando and
                  Silvio Ranise and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Laurent Fribourg},
  title        = {Uniform Derivation of Decision Procedures by Superposition},
  booktitle    = {Computer Science Logic, 15th International Workshop, {CSL} 2001. 10th
                  Annual Conference of the EACSL, Paris, France, September 10-13, 2001,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2142},
  pages        = {513--527},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44802-0\_36},
  doi          = {10.1007/3-540-44802-0\_36},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/ArmandoRR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/Rusinowitch01,
  author       = {Micha{\"{e}}l Rusinowitch},
  editor       = {Aart Middeldorp},
  title        = {Rewriting for Deduction and Verification},
  booktitle    = {Rewriting Techniques and Applications, 12th International Conference,
                  {RTA} 2001, Utrecht, The Netherlands, May 22-24, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2051},
  pages        = {2},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45127-7\_2},
  doi          = {10.1007/3-540-45127-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/Rusinowitch01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Rusinowitch01,
  author       = {Micha{\"{e}}l Rusinowitch},
  editor       = {Jean Goubault{-}Larrecq},
  title        = {The practice of cryptographic protocol verification},
  booktitle    = {Logical Aspects of Cryptographic Protocol Verification, {LACPV} 2001,
                  in connection with {CAV} 2001, Paris, France, July 23, 2001},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {55},
  number       = {1},
  pages        = {3--4},
  publisher    = {Elsevier},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0661(04)00241-5},
  doi          = {10.1016/S1571-0661(04)00241-5},
  timestamp    = {Mon, 05 Dec 2022 12:31:03 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Rusinowitch01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/RusinowitchSK00,
  author       = {Micha{\"{e}}l Rusinowitch and
                  Sorin Stratulat and
                  Francis Klay},
  editor       = {E. Allen Emerson and
                  A. Prasad Sistla},
  title        = {Mechanical Verification of an Ideal Incremental \emph{ABR} Conformance},
  booktitle    = {Computer Aided Verification, 12th International Conference, {CAV}
                  2000, Chicago, IL, USA, July 15-19, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1855},
  pages        = {344--357},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722167\_27},
  doi          = {10.1007/10722167\_27},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/RusinowitchSK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cl/NarendranR00,
  author       = {Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {John W. Lloyd and
                  Ver{\'{o}}nica Dahl and
                  Ulrich Furbach and
                  Manfred Kerber and
                  Kung{-}Kiu Lau and
                  Catuscia Palamidessi and
                  Lu{\'{\i}}s Moniz Pereira and
                  Yehoshua Sagiv and
                  Peter J. Stuckey},
  title        = {The Theory of Total Unary {RPO} Is Decidable},
  booktitle    = {Computational Logic - {CL} 2000, First International Conference, London,
                  UK, 24-28 July, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1861},
  pages        = {660--672},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44957-4\_44},
  doi          = {10.1007/3-540-44957-4\_44},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cl/NarendranR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/JacquemardRV00,
  author       = {Florent Jacquemard and
                  Micha{\"{e}}l Rusinowitch and
                  Laurent Vigneron},
  editor       = {Michel Parigot and
                  Andrei Voronkov},
  title        = {Compiling and Verifying Security Protocols},
  booktitle    = {Logic for Programming and Automated Reasoning, 7th International Conference,
                  {LPAR} 2000, Reunion Island, France, November 11-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1955},
  pages        = {131--160},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44404-1\_10},
  doi          = {10.1007/3-540-44404-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/JacquemardRV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ershov/KucherovR99,
  author       = {Gregory Kucherov and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Dines Bj{\o}rner and
                  Manfred Broy and
                  Alexandre V. Zamulin},
  title        = {Patterns in Words versus Patterns in Trees: {A} Brief Survey and New
                  Results},
  booktitle    = {Perspectives of System Informatics, Third International Andrei Ershov
                  Memorial Conference, PSI'99, Akademgorodok, Novosibirsk, Russia, July
                  6-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1755},
  pages        = {283--296},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46562-6\_25},
  doi          = {10.1007/3-540-46562-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ershov/KucherovR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rta/1999,
  editor       = {Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Rewriting Techniques and Applications, 10th International Conference,
                  RTA-99, Trento, Italy, July 2-4, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1631},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48685-2},
  doi          = {10.1007/3-540-48685-2},
  isbn         = {3-540-66201-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/NarendranRV98,
  author       = {Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch and
                  Rakesh M. Verma},
  editor       = {Georg Gottlob and
                  Etienne Grandjean and
                  Katrin Seyr},
  title        = {{RPO} Constraint Solving Is in {NP}},
  booktitle    = {Computer Science Logic, 12th International Workshop, {CSL} '98, Annual
                  Conference of the EACSL, Brno, Czech Republic, August 24-28, 1998,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1584},
  pages        = {385--398},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10703163\_26},
  doi          = {10.1007/10703163\_26},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/NarendranRV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fase/BerregebBR98,
  author       = {Narjes Berregeb and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Egidio Astesiano},
  title        = {Observational Proofs with Critical Contexts},
  booktitle    = {Fundamental Approaches to Software Engineering, 1st Internationsl
                  Conference, FASE'98, Held as Part of the European Joint Conferences
                  on the Theory and Practice of Software, ETAPS'98, Lisbon, Portugal,
                  March 28 - April 4, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1382},
  pages        = {38--53},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053582},
  doi          = {10.1007/BFB0053582},
  timestamp    = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl       = {https://dblp.org/rec/conf/fase/BerregebBR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/ComonNNR98,
  author       = {Hubert Comon and
                  Paliath Narendran and
                  Robert Nieuwenhuis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Decision Problems in Ordered Rewriting},
  booktitle    = {Thirteenth Annual {IEEE} Symposium on Logic in Computer Science, Indianapolis,
                  Indiana, USA, June 21-24, 1998},
  pages        = {276--286},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/LICS.1998.705664},
  doi          = {10.1109/LICS.1998.705664},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/ComonNNR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/VermaRL98,
  author       = {Rakesh M. Verma and
                  Micha{\"{e}}l Rusinowitch and
                  Denis Lugiez},
  editor       = {Tobias Nipkow},
  title        = {Algorithms and Reductions for Rewriting Problems},
  booktitle    = {Rewriting Techniques and Applications, 9th International Conference,
                  RTA-98, Tsukuba, Japan, March 30 - April 1, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1379},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0052369},
  doi          = {10.1007/BFB0052369},
  timestamp    = {Sat, 05 Sep 2020 18:07:52 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/VermaRL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/KucherovR97,
  author       = {Gregory Kucherov and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Matching a Set of Strings with Variable Length don't Cares},
  journal      = {Theor. Comput. Sci.},
  volume       = {178},
  number       = {1-2},
  pages        = {129--154},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0304-3975(97)88195-9},
  doi          = {10.1016/S0304-3975(97)88195-9},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/KucherovR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/NarendranR96,
  author       = {Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Any Ground Associative-Commutative Theory Has a Finite Canonical System},
  journal      = {J. Autom. Reason.},
  volume       = {17},
  number       = {1},
  pages        = {131--143},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF00247671},
  doi          = {10.1007/BF00247671},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/NarendranR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/BerregebBR96,
  author       = {Narjes Berregeb and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Rajeev Alur and
                  Thomas A. Henzinger},
  title        = {Automated Verification by Induction with Associative-Commutative Operators},
  booktitle    = {Computer Aided Verification, 8th International Conference, {CAV} '96,
                  New Brunswick, NJ, USA, July 31 - August 3, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1102},
  pages        = {220--231},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61474-5\_71},
  doi          = {10.1007/3-540-61474-5\_71},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/BerregebBR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/BerregebBR96,
  author       = {Narjes Berregeb and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Harald Ganzinger},
  title        = {{SPIKE-AC:} {A} System for Proofs by Induction in Associative-Commutative
                  Theories},
  booktitle    = {Rewriting Techniques and Applications, 7th International Conference,
                  RTA-96, New Brunswick, NJ, USA, July 27-30, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1103},
  pages        = {428--431},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61464-8\_73},
  doi          = {10.1007/3-540-61464-8\_73},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/BerregebBR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/MonfroyRS96,
  author       = {{\'{E}}ric Monfroy and
                  Micha{\"{e}}l Rusinowitch and
                  Ren{\'{e}} Schott},
  editor       = {K. M. George and
                  Janice H. Carroll and
                  Dave Oppenheim and
                  Jim Hightower},
  title        = {Implementing non-linear constraints with cooperative solvers},
  booktitle    = {Proceedings of the 1996 {ACM} Symposium on Applied Computing, SAC'96,
                  Philadelphia, PA, USA, February 17-19, 1996},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/331119.331147},
  doi          = {10.1145/331119.331147},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/MonfroyRS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/RusinowitchV95,
  author       = {Micha{\"{e}}l Rusinowitch and
                  Laurent Vigneron},
  title        = {Automated deduction with associative-commutative operators},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {6},
  pages        = {23--56},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01270929},
  doi          = {10.1007/BF01270929},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/RusinowitchV95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amai/KounalisR95,
  author       = {Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Reasoning with Conditional Axioms},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {15},
  number       = {2},
  pages        = {125--149},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01534452},
  doi          = {10.1007/BF01534452},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amai/KounalisR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KucherovR95,
  author       = {Gregory Kucherov and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Undecidability of Ground Reducibility for Word Rewriting Systems with
                  Variables},
  journal      = {Inf. Process. Lett.},
  volume       = {53},
  number       = {4},
  pages        = {209--215},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(94)00188-5},
  doi          = {10.1016/0020-0190(94)00188-5},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/KucherovR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/BouhoulaR95,
  author       = {Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Implicit Induction in Conditional Theories},
  journal      = {J. Autom. Reason.},
  volume       = {14},
  number       = {2},
  pages        = {189--235},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00881856},
  doi          = {10.1007/BF00881856},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/BouhoulaR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/BouhoulaKR95,
  author       = {Adel Bouhoula and
                  Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Automated Mathematical Induction},
  journal      = {J. Log. Comput.},
  volume       = {5},
  number       = {5},
  pages        = {631--668},
  year         = {1995},
  url          = {https://doi.org/10.1093/logcom/5.5.631},
  doi          = {10.1093/LOGCOM/5.5.631},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/BouhoulaKR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/BouhoulaR95,
  author       = {Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Vangalur S. Alagar and
                  Maurice Nivat},
  title        = {{SPIKE:} {A} System for Automatic Inductive Proofs},
  booktitle    = {Algebraic Methodology and Software Technology, 4th International Conference,
                  {AMAST} '95, Montreal, Canada, July 3-7, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {936},
  pages        = {576--577},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60043-4\_79},
  doi          = {10.1007/3-540-60043-4\_79},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/amast/BouhoulaR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpm/KucherovR95,
  author       = {Gregory Kucherov and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Zvi Galil and
                  Esko Ukkonen},
  title        = {Matching a Set of Strings with Variable Length Don't Cares},
  booktitle    = {Combinatorial Pattern Matching, 6th Annual Symposium, {CPM} 95, Espoo,
                  Finland, July 5-7, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {937},
  pages        = {230--247},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60044-2\_46},
  doi          = {10.1007/3-540-60044-2\_46},
  timestamp    = {Thu, 29 Aug 2019 15:20:22 +0200},
  biburl       = {https://dblp.org/rec/conf/cpm/KucherovR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrs/KucherovR94,
  author       = {Gregory Kucherov and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Nachum Dershowitz and
                  Naomi Lindenstrauss},
  title        = {The Complexity of Testing Ground Reducibility for Linear Word Rewriting
                  Systems with Variables},
  booktitle    = {Conditional and Typed Rewriting Systems, 4th International Workshop,
                  CTRS-94, Jerusalem, Israel, July 13-15, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {968},
  pages        = {262--275},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60381-6\_16},
  doi          = {10.1007/3-540-60381-6\_16},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrs/KucherovR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KucherovR94,
  author       = {Gregory Kucherov and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Hal Berghel and
                  Terry Hlengl and
                  Joseph E. Urban},
  title        = {On ground reducibility problem for word rewriting systems with variables},
  booktitle    = {Proceedings of the 1994 {ACM} Symposium on Applied Computing, SAC'94,
                  Phoenix, AZ, USA, March 6-8, 1994},
  pages        = {271--276},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/326619.326745},
  doi          = {10.1145/326619.326745},
  timestamp    = {Tue, 06 Nov 2018 11:06:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KucherovR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijait/KounalisR93,
  author       = {Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {A Logical Framework for Concept Learning with Background Knowledge},
  journal      = {Int. J. Artif. Intell. Tools},
  volume       = {2},
  number       = {3},
  pages        = {329--348},
  year         = {1993},
  url          = {https://doi.org/10.1142/S0218213093000175},
  doi          = {10.1142/S0218213093000175},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijait/KounalisR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/AyebMR93,
  author       = {B{\'{e}}chir el Ayeb and
                  Pierre Marquis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Preferring diagnoses by abduction},
  journal      = {{IEEE} Trans. Syst. Man Cybern.},
  volume       = {23},
  number       = {3},
  pages        = {792--808},
  year         = {1993},
  url          = {https://doi.org/10.1109/21.256550},
  doi          = {10.1109/21.256550},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/AyebMR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/BouhoulaR93,
  author       = {Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Ruzena Bajcsy},
  title        = {Automatic Case Analysis in Proof by Induction},
  booktitle    = {Proceedings of the 13th International Joint Conference on Artificial
                  Intelligence. Chamb{\'{e}}ry, France, August 28 - September 3,
                  1993},
  pages        = {88--94},
  publisher    = {Morgan Kaufmann},
  year         = {1993},
  url          = {http://ijcai.org/Proceedings/93-1/Papers/013.pdf},
  timestamp    = {Tue, 20 Aug 2019 16:18:33 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/BouhoulaR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/NarendranR93,
  author       = {Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  title        = {The Unifiability Problem in Ground {AC} Theories},
  booktitle    = {Proceedings of the Eighth Annual Symposium on Logic in Computer Science
                  {(LICS} '93), Montreal, Canada, June 19-23, 1993},
  pages        = {364--370},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/LICS.1993.287572},
  doi          = {10.1109/LICS.1993.287572},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/NarendranR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrs/1992,
  editor       = {Micha{\"{e}}l Rusinowitch and
                  Jean{-}Luc R{\'{e}}my},
  title        = {Conditional Term Rewriting Systems, Third International Workshop,
                  CTRS-92, Pont-{\`{a}}-Mousson, France, July 8-10, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {656},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-56393-8},
  doi          = {10.1007/3-540-56393-8},
  isbn         = {3-540-56393-8},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrs/1992.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/HsiangKLR92,
  author       = {Jieh Hsiang and
                  H{\'{e}}l{\`{e}}ne Kirchner and
                  Pierre Lescanne and
                  Micha{\"{e}}l Rusinowitch},
  title        = {The Term Rewriting Approach to Automated Theorem Proving},
  journal      = {J. Log. Program.},
  volume       = {14},
  number       = {1{\&}2},
  pages        = {71--99},
  year         = {1992},
  url          = {https://doi.org/10.1016/0743-1066(92)90047-7},
  doi          = {10.1016/0743-1066(92)90047-7},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/HsiangKLR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/BouhoulaKR92,
  author       = {Adel Bouhoula and
                  Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Andrei Voronkov},
  title        = {SPIKE, an Automatic Theorem Prover},
  booktitle    = {Logic Programming and Automated Reasoning,International Conference
                  LPAR'92, St. Petersburg, Russia, July 15-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {624},
  pages        = {460--462},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/BFb0013087},
  doi          = {10.1007/BFB0013087},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/BouhoulaKR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/HsiangR91,
  author       = {Jieh Hsiang and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Proving Refutational Completeness of Theorem-Proving Strategies: The
                  Transfinite Semantic Tree Method},
  journal      = {J. {ACM}},
  volume       = {38},
  number       = {3},
  pages        = {559--587},
  year         = {1991},
  url          = {https://doi.org/10.1145/116825.116833},
  doi          = {10.1145/116825.116833},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/HsiangR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/Rusinowitch91,
  author       = {Micha{\"{e}}l Rusinowitch},
  title        = {Theorem-Proving with Resolution and Superposition},
  journal      = {J. Symb. Comput.},
  volume       = {11},
  number       = {1/2},
  pages        = {21--49},
  year         = {1991},
  url          = {https://doi.org/10.1016/S0747-7171(08)80131-9},
  doi          = {10.1016/S0747-7171(08)80131-9},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/Rusinowitch91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/KounalisR91,
  author       = {Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {On Word Problems in Horn Theories},
  journal      = {J. Symb. Comput.},
  volume       = {11},
  number       = {1/2},
  pages        = {113--127},
  year         = {1991},
  url          = {https://doi.org/10.1016/S0747-7171(08)80134-4},
  doi          = {10.1016/S0747-7171(08)80134-4},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/KounalisR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/KounalisR91,
  author       = {Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Maurice Nivat and
                  Charles Rattray and
                  Teodor Rus and
                  Giuseppe Scollo},
  title        = {Studies on the Ground Convergence Property of Conditional Theories},
  booktitle    = {Algebraic Methodology and Software Technology {(AMAST} '91), Proceedings
                  of the Second International Conference on Methodology and Software
                  Technology, Iowa City, USA, 22-25 May 1991},
  series       = {Workshops in Computing},
  pages        = {363--376},
  publisher    = {Springer},
  year         = {1991},
  timestamp    = {Tue, 18 Feb 2003 11:01:41 +0100},
  biburl       = {https://dblp.org/rec/conf/amast/KounalisR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fair/RusinowitchV91,
  author       = {Micha{\"{e}}l Rusinowitch and
                  Laurent Vigneron},
  editor       = {Philippe Jorrand and
                  Jozef Kelemen},
  title        = {Automated deduction with associative commutative operators},
  booktitle    = {Fundamentals of Artificial Intelligence Research, International Workshop
                  {FAIR} '91, Smolenice, Czechoslovakia, September 8-13, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {535},
  pages        = {185--199},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54507-7\_15},
  doi          = {10.1007/3-540-54507-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/fair/RusinowitchV91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fct/KounalisR91,
  author       = {Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Lothar Budach},
  title        = {Automatic Proof Methods for Algebraic Specifications},
  booktitle    = {Fundamentals of Computation Theory, 8th International Symposium, {FCT}
                  '91, Gosen, Germany, September 9-13, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {529},
  pages        = {307--317},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54458-5\_75},
  doi          = {10.1007/3-540-54458-5\_75},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fct/KounalisR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/NarendranR91,
  author       = {Paliath Narendran and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Ronald V. Book},
  title        = {Any Gound Associative-Commutative Theory Has a Finite Canonical System},
  booktitle    = {Rewriting Techniques and Applications, 4th International Conference,
                  RTA-91, Como, Italy, April 10-12, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {488},
  pages        = {423--434},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-53904-2\_115},
  doi          = {10.1007/3-540-53904-2\_115},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/NarendranR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eatcs/KounalisR90,
  author       = {Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Mechanizing inductive reasoning},
  journal      = {Bull. {EATCS}},
  volume       = {41},
  pages        = {216--226},
  year         = {1990},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eatcs/KounalisR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/KounalisR90,
  author       = {Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Howard E. Shrobe and
                  Thomas G. Dietterich and
                  William R. Swartout},
  title        = {Mechanizing Inductive Reasoning},
  booktitle    = {Proceedings of the 8th National Conference on Artificial Intelligence.
                  Boston, Massachusetts, USA, July 29 - August 3, 1990, 2 Volumes},
  pages        = {240--245},
  publisher    = {{AAAI} Press / The {MIT} Press},
  year         = {1990},
  url          = {http://www.aaai.org/Library/AAAI/1990/aaai90-037.php},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/KounalisR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrs/KounalisR90,
  author       = {Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {St{\'{e}}phane Kaplan and
                  Mitsuhiro Okada},
  title        = {A Proof System for Conditional Algebraic Specifications},
  booktitle    = {Conditional and Typed Rewriting Systems, 2nd International {CTRS}
                  Workshop, Montreal, Canada, June 11-14, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {516},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-54317-1\_80},
  doi          = {10.1007/3-540-54317-1\_80},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrs/KounalisR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/AyebMR90,
  author       = {B{\'{e}}chir el Ayeb and
                  Pierre Marquis and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Deductive/Abductvie Diagnosis: The DA-Principles},
  booktitle    = {9th European Conference on Artificial Intelligence, {ECAI} 1990, Stockholm,
                  Sweden, 1990},
  pages        = {47--52},
  year         = {1990},
  timestamp    = {Tue, 30 Jul 2019 13:42:21 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/AyebMR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ese/AyebMR90,
  author       = {B{\'{e}}chir el Ayeb and
                  Pierre Marquis and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Georg Gottlob and
                  Wolfgang Nejdl},
  title        = {A New Diagnosis Approach by Deduction and Abduction},
  booktitle    = {Expert Systems in Engineering, Principles and Applications, International
                  Workshop, Vienna, Austria, September 24-26, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {462},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-53104-1\_29},
  doi          = {10.1007/3-540-53104-1\_29},
  timestamp    = {Sat, 09 Apr 2022 12:45:45 +0200},
  biburl       = {https://dblp.org/rec/conf/ese/AyebMR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/KounalisR88,
  author       = {Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Ewing L. Lusk and
                  Ross A. Overbeek},
  title        = {On Word Problems in Horn Theories},
  booktitle    = {9th International Conference on Automated Deduction, Argonne, Illinois,
                  USA, May 23-26, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {310},
  pages        = {527--537},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/BFb0012854},
  doi          = {10.1007/BFB0012854},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/KounalisR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgcs/Rusinowitch88,
  author       = {Micha{\"{e}}l Rusinowitch},
  title        = {Theorem-Proving with Resolution and Superposition: An Extension of
                  the Knuth and Bendic Procedure to a Complete Set of Inference Rules},
  booktitle    = {Proceedings of the International Conference on Fifth Generation Computer
                  Systems, {FGCS} 1988, Tokyo, Japan, November 28-December 2, 1988},
  pages        = {524--531},
  publisher    = {{OHMSHA} Ltd. Tokyo and Springer-Verlag},
  year         = {1988},
  timestamp    = {Mon, 05 Aug 2019 17:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/fgcs/Rusinowitch88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Rusinowitch87,
  author       = {Micha{\"{e}}l Rusinowitch},
  title        = {On Termination of the Direct Sum of Term-Rewriting Systems},
  journal      = {Inf. Process. Lett.},
  volume       = {26},
  number       = {2},
  pages        = {65--70},
  year         = {1987},
  url          = {https://doi.org/10.1016/0020-0190(87)90039-1},
  doi          = {10.1016/0020-0190(87)90039-1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Rusinowitch87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/Rusinowitch87,
  author       = {Micha{\"{e}}l Rusinowitch},
  title        = {Path of Subterms Ordering and Recursive Decomposition Ordering Revisited},
  journal      = {J. Symb. Comput.},
  volume       = {3},
  number       = {1/2},
  pages        = {117--131},
  year         = {1987},
  url          = {https://doi.org/10.1016/S0747-7171(87)80023-8},
  doi          = {10.1016/S0747-7171(87)80023-8},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/Rusinowitch87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrs/KounalisR87,
  author       = {Emmanuel Kounalis and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {St{\'{e}}phane Kaplan and
                  Jean{-}Pierre Jouannaud},
  title        = {On Word Problems in Horn Theories},
  booktitle    = {Conditional Term Rewriting Systems, 1st International Workshop, Orsay,
                  France, July 8-10, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {308},
  pages        = {144--160},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-19242-5\_12},
  doi          = {10.1007/3-540-19242-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrs/KounalisR87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HsiangR87,
  author       = {Jieh Hsiang and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Thomas Ottmann},
  title        = {On Word Problems in Equational Theories},
  booktitle    = {Automata, Languages and Programming, 14th International Colloquium,
                  ICALP87, Karlsruhe, Germany, July 13-17, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {267},
  pages        = {54--71},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-18088-5\_6},
  doi          = {10.1007/3-540-18088-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/HsiangR87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/HsiangRS87,
  author       = {Jieh Hsiang and
                  Micha{\"{e}}l Rusinowitch and
                  K{\^{o}} Sakai},
  editor       = {John P. McDermott},
  title        = {Complete Inference Rules for the Cancellation Laws},
  booktitle    = {Proceedings of the 10th International Joint Conference on Artificial
                  Intelligence. Milan, Italy, August 23-28, 1987},
  pages        = {990--992},
  publisher    = {Morgan Kaufmann},
  year         = {1987},
  url          = {http://ijcai.org/Proceedings/87-2/Papers/086.pdf},
  timestamp    = {Tue, 20 Aug 2019 16:17:29 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/HsiangRS87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/HsiangR86,
  author       = {Jieh Hsiang and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {J{\"{o}}rg H. Siekmann},
  title        = {A New Method for Establishing Refutational Completeness in Theorem
                  Proving},
  booktitle    = {8th International Conference on Automated Deduction, Oxford, England,
                  July 27 - August 1, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {230},
  pages        = {141--152},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-16780-3\_86},
  doi          = {10.1007/3-540-16780-3\_86},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/HsiangR86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/Rusinowitch85,
  author       = {Micha{\"{e}}l Rusinowitch},
  editor       = {Jean{-}Pierre Jouannaud},
  title        = {Path of Subterms Ordering and Recursive Decomposition Ordering Revisited},
  booktitle    = {Rewriting Techniques and Applications, First International Conference,
                  RTA-85, Dijon, France, May 20-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {202},
  pages        = {225--240},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-15976-2\_10},
  doi          = {10.1007/3-540-15976-2\_10},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/Rusinowitch85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics