Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Michaël Rusinowitch
@inproceedings{DBLP:conf/netsoft/ZahwaLRA23, author = {Wafik Zahwa and Abdelkader Lahmadi and Micha{\"{e}}l Rusinowitch and Mondher Ayadi}, editor = {Carlos J. Bernardos and Barbara Martini and Elisa Rojas and F{\'{a}}bio Luciano Verdii and Zuqing Zhu and Eiji Oki and Helge Parzyjegla}, title = {Automated Placement of In-Network {ACL} Rules}, booktitle = {9th {IEEE} International Conference on Network Softwarization, NetSoft 2023, Madrid, Spain, June 19-23, 2023}, pages = {486--491}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/NetSoft57336.2023.10175436}, doi = {10.1109/NETSOFT57336.2023.10175436}, timestamp = {Thu, 20 Jul 2023 12:34:37 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/ZahwaLRA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/MacwanIR22, author = {Kamalkumar Macwan and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Guy{-}Vincent Jourdan and Laurent Mounier and Carlisle M. Adams and Florence S{\`{e}}des and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Differentially Private Friends Recommendation}, booktitle = {Foundations and Practice of Security - 15th International Symposium, {FPS} 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13877}, pages = {236--251}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-30122-3\_15}, doi = {10.1007/978-3-031-30122-3\_15}, timestamp = {Sat, 27 May 2023 15:23:45 +0200}, biburl = {https://dblp.org/rec/conf/fps/MacwanIR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/AbboudGLRBA22, author = {Ahmad Abboud and R{\'{e}}mi Garcia and Abdelkader Lahmadi and Micha{\"{e}}l Rusinowitch and Adel Bouhoula and Mondher Ayadi}, title = {Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789807}, doi = {10.1109/NOMS54207.2022.9789807}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/AbboudGLRBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snams/MacwanIR22, author = {Kamalkumar Macwan and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Paolo Ceravolo and Christian Guetl and Yaser Jararweh and Elhadj Benkhelifa}, title = {Privacy Preserving Recommendations for Social Networks}, booktitle = {Ninth International Conference on Social Networks Analysis, Management and Security, {SNAMS} 2022, Milan, Italy, November 29 - Dec. 1, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SNAMS58071.2022.10062760}, doi = {10.1109/SNAMS58071.2022.10062760}, timestamp = {Mon, 27 Mar 2023 16:44:42 +0200}, biburl = {https://dblp.org/rec/conf/snams/MacwanIR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/synasc/ChevalierR22, author = {Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, editor = {Bruno Buchberger and Mircea Marin and Viorel Negru and Daniela Zaharie}, title = {Deciding Whether two Codes Have the Same Ambiguities is in co-NP}, booktitle = {24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, {SYNASC} 2022, Hagenberg / Linz, Austria, September 12-15, 2022}, pages = {84--91}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SYNASC57785.2022.00023}, doi = {10.1109/SYNASC57785.2022.00023}, timestamp = {Fri, 09 Jun 2023 15:18:17 +0200}, biburl = {https://dblp.org/rec/conf/synasc/ChevalierR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Eidizadehakhcheloo21, author = {Sanaz Eidizadehakhcheloo and Bizhan Alipour Pijani and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Ken Barker and Kambiz Ghazinour}, title = {Divide-and-Learn: {A} Random Indexing Approach to Attribute Inference Attacks in Online Social Networks}, booktitle = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP} {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12840}, pages = {338--354}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81242-3\_20}, doi = {10.1007/978-3-030-81242-3\_20}, timestamp = {Tue, 27 Jul 2021 09:02:51 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Eidizadehakhcheloo21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/CheikhIR21, author = {Noreddine Belhadj Cheikh and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, title = {{FOX:} Fooling with Explanations : Privacy Protection with Adversarial Reactions in Social Media}, booktitle = {18th International Conference on Privacy, Security and Trust, {PST} 2021, Auckland, New Zealand, December 13-15, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PST52912.2021.9647778}, doi = {10.1109/PST52912.2021.9647778}, timestamp = {Tue, 28 Dec 2021 14:39:32 +0100}, biburl = {https://dblp.org/rec/conf/pst/CheikhIR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-2109-02802, author = {Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, editor = {Temur Kutsia}, title = {Implementing Security Protocol Monitors}, booktitle = {Proceedings of the 9th International Symposium on Symbolic Computation in Software Science, {SCSS} 2021, Hagenberg, Austria, September 8-10, 2021}, series = {{EPTCS}}, volume = {342}, pages = {22--34}, year = {2021}, url = {https://doi.org/10.4204/EPTCS.342.3}, doi = {10.4204/EPTCS.342.3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-02802.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adbis/Eidizadehakhcheloo20, author = {Sanaz Eidizadehakhcheloo and Bizhan Alipour Pijani and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Ladjel Bellatreche and M{\'{a}}ria Bielikov{\'{a}} and Omar Boussa{\"{\i}}d and Barbara Catania and J{\'{e}}r{\^{o}}me Darmont and Elena Demidova and Fabien Duchateau and Mark M. Hall and Tanja Mercun and Boris Novikov and Christos Papatheodorou and Thomas Risse and Oscar Romero and Lucile Sautot and Guilaine Talens and Robert Wrembel and Maja Zumer}, title = {Your Age Revealed by Facebook Picture Metadata}, booktitle = {ADBIS, {TPDL} and {EDA} 2020 Common Workshops and Doctoral Consortium - International Workshops: DOING, MADEISD, SKG, BBIGAP, SIMPDA, AIMinScience 2020 and Doctoral Consortium, Lyon, France, August 25-27, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1260}, pages = {259--270}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55814-7\_22}, doi = {10.1007/978-3-030-55814-7\_22}, timestamp = {Thu, 23 Sep 2021 11:47:12 +0200}, biburl = {https://dblp.org/rec/conf/adbis/Eidizadehakhcheloo20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/AbboudGLRB20, author = {Ahmad Abboud and R{\'{e}}mi Garcia and Abdelkader Lahmadi and Micha{\"{e}}l Rusinowitch and Adel Bouhoula}, editor = {Nur Zincir{-}Heywood and Mehmet Ulema and M{\"{u}}ge Sayit and Stuart Clayman and Myung{-}Sup Kim and Cihat Cetinkaya}, title = {{R2-D2:} Filter Rule set Decomposition and Distribution in Software Defined Networks}, booktitle = {16th International Conference on Network and Service Management, {CNSM} 2020, Izmir, Turkey, November 2-6, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/CNSM50824.2020.9269074}, doi = {10.23919/CNSM50824.2020.9269074}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/AbboudGLRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/PijaniIR20, author = {Bizhan Alipour Pijani and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Sven Hartmann and Josef K{\"{u}}ng and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {Online Attacks on Picture Owner Privacy}, booktitle = {Database and Expert Systems Applications - 31st International Conference, {DEXA} 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12392}, pages = {33--47}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59051-2\_3}, doi = {10.1007/978-3-030-59051-2\_3}, timestamp = {Tue, 29 Dec 2020 18:31:18 +0100}, biburl = {https://dblp.org/rec/conf/dexa/PijaniIR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icin/AbboudLRCBA20, author = {Ahmad Abboud and Abdelkader Lahmadi and Micha{\"{e}}l Rusinowitch and Miguel Couceiro and Adel Bouhoula and Mondher Avadi}, title = {Double Mask: An Efficient Rule Encoding for Software Defined Networking}, booktitle = {23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, {ICIN} 2020, Paris, France, February 24-27, 2020}, pages = {186--193}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICIN48450.2020.9059433}, doi = {10.1109/ICIN48450.2020.9059433}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icin/AbboudLRCBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/AbboudGLRB20, author = {Ahmad Abboud and R{\'{e}}mi Garcia and Abdelkader Lahmadi and Micha{\"{e}}l Rusinowitch and Adel Bouhoula}, title = {Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks}, booktitle = {19th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2020, Cambridge, MA, USA, November 24-27, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NCA51143.2020.9306746}, doi = {10.1109/NCA51143.2020.9306746}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nca/AbboudGLRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/PijaniIR20, author = {Bizhan Alipour Pijani and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {You are what emojis say about your pictures: language-independent gender inference attack on Facebook}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {1826--1834}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3373943}, doi = {10.1145/3341105.3373943}, timestamp = {Thu, 02 Apr 2020 17:08:04 +0200}, biburl = {https://dblp.org/rec/conf/sac/PijaniIR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/JacquemardR19, author = {Florent Jacquemard and Micha{\"{e}}l Rusinowitch}, title = {One-variable context-free hedge automata}, journal = {J. Comput. Syst. Sci.}, volume = {104}, pages = {278--296}, year = {2019}, url = {https://doi.org/10.1016/j.jcss.2016.10.006}, doi = {10.1016/J.JCSS.2016.10.006}, timestamp = {Fri, 14 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/JacquemardR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/AnantharamanHNR19, author = {Siva Anantharaman and Peter Hibbs and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {Pascal Fontaine}, title = {Unification Modulo Lists with Reverse Relation with Certain Word Equations}, booktitle = {Automated Deduction - {CADE} 27 - 27th International Conference on Automated Deduction, Natal, Brazil, August 27-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11716}, pages = {1--17}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29436-6\_1}, doi = {10.1007/978-3-030-29436-6\_1}, timestamp = {Wed, 21 Aug 2019 13:34:20 +0200}, biburl = {https://dblp.org/rec/conf/cade/AnantharamanHNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/AbboudLRCB19, author = {Ahmad Abboud and Abdelkader Lahmadi and Micha{\"{e}}l Rusinowitch and Miguel Couceiro and Adel Bouhoula}, title = {Poster : Minimizing range rules for packet filtering using a double mask representation}, booktitle = {2019 {IFIP} Networking Conference, Networking 2019, Warsaw, Poland, May 20-22, 2019}, pages = {1--2}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/IFIPNetworking46909.2019.8999466}, doi = {10.23919/IFIPNETWORKING46909.2019.8999466}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/networking/AbboudLRCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AlipourIR19, author = {Bizhan Alipour and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Stefanos Gritzalis and Edgar R. Weippl and Sokratis K. Katsikas and Gabriele Anderst{-}Kotsis and A Min Tjoa and Ismail Khalil}, title = {Gender Inference for Facebook Picture Owners}, booktitle = {Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11711}, pages = {145--160}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27813-7\_10}, doi = {10.1007/978-3-030-27813-7\_10}, timestamp = {Tue, 29 Dec 2020 18:28:24 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/AlipourIR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adbis/AbidIR18, author = {Younes Abid and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Andr{\'{a}}s Bencz{\'{u}}r and Bernhard Thalheim and Tom{\'{a}}s Horv{\'{a}}th and Silvia Chiusano and Tania Cerquitelli and Csaba Istv{\'{a}}n Sidl{\'{o}} and Peter Z. Revesz}, title = {Online Testing of User Profile Resilience Against Inference Attacks in Social Networks}, booktitle = {New Trends in Databases and Information Systems - {ADBIS} 2018 Short Papers and Workshops, AI*QA, BIGPMED, CSACDB, M2U, BigDataMAPS, ISTREND, DC, Budapest, Hungary, September, 2-5, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {909}, pages = {105--117}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00063-9\_12}, doi = {10.1007/978-3-030-00063-9\_12}, timestamp = {Mon, 03 Sep 2018 16:52:13 +0200}, biburl = {https://dblp.org/rec/conf/adbis/AbidIR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/AbidIR18, author = {Younes Abid and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Nikolaus Augsten}, title = {Sensitive Attribute Prediction for Social Networks Users}, booktitle = {Proceedings of the Workshops of the {EDBT/ICDT} 2018 Joint Conference {(EDBT/ICDT} 2018), Vienna, Austria, March 26, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2083}, pages = {28--35}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2083/paper-05.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:44 +0100}, biburl = {https://dblp.org/rec/conf/edbt/AbidIR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/AvanesovCRT17, author = {Tigran Avanesov and Yannick Chevalier and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {Intruder deducibility constraints with negation. Decidability and application to secured service compositions}, journal = {J. Symb. Comput.}, volume = {80}, pages = {4--26}, year = {2017}, url = {https://doi.org/10.1016/j.jsc.2016.07.008}, doi = {10.1016/J.JSC.2016.07.008}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/AvanesovCRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/AvanesovCRT17a, author = {Tigran Avanesov and Yannick Chevalier and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {Satisfiability of general intruder constraints with and without a set constructor}, journal = {J. Symb. Comput.}, volume = {80}, pages = {27--61}, year = {2017}, url = {https://doi.org/10.1016/j.jsc.2016.07.009}, doi = {10.1016/J.JSC.2016.07.009}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/AvanesovCRT17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/AbidINRR17, author = {Younes Abid and Abdessamad Imine and Amedeo Napoli and Chedy Ra{\"{\i}}ssi and Micha{\"{e}}l Rusinowitch}, editor = {Djamal Benslimane and Ernesto Damiani and William I. Grosky and Abdelkader Hameurlain and Amit P. Sheth and Roland R. Wagner}, title = {Two-Phase Preference Disclosure in Attributed Social Networks}, booktitle = {Database and Expert Systems Applications - 28th International Conference, {DEXA} 2017, Lyon, France, August 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10438}, pages = {249--263}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64468-4\_19}, doi = {10.1007/978-3-319-64468-4\_19}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/dexa/AbidINRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sycss/2017, editor = {Mohamed Mosbah and Micha{\"{e}}l Rusinowitch}, title = {{SCSS} 2017, The 8th International Symposium on Symbolic Computation in Software Science 2017, April 6-9, 2017, Gammarth, Tunisia}, series = {EPiC Series in Computing}, volume = {45}, publisher = {EasyChair}, year = {2017}, url = {https://easychair.org/publications/volume/SCSS\_2017}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sycss/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AbbesBR16, author = {Tarek Abbes and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, title = {Detection of firewall configuration errors with updatable tree}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {3}, pages = {301--317}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0290-0}, doi = {10.1007/S10207-015-0290-0}, timestamp = {Wed, 26 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AbbesBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/NguyenIR16, author = {Hiep H. Nguyen and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, title = {Network Structure Release under Differential Privacy}, journal = {Trans. Data Priv.}, volume = {9}, number = {3}, pages = {215--241}, year = {2016}, url = {http://www.tdp.cat/issues16/abs.a248a16.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/NguyenIR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/AbidINRR16, author = {Younes Abid and Abdessamad Imine and Amedeo Napoli and Chedy Ra{\"{\i}}ssi and Micha{\"{e}}l Rusinowitch}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Jean{-}Louis Lanet and Axel Legay}, title = {Online Link Disclosure Strategies for Social Networks}, booktitle = {Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10158}, pages = {153--168}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54876-0\_13}, doi = {10.1007/978-3-319-54876-0\_13}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/crisis/AbidINRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/HeamDKMR16, author = {Pierre{-}Cyrille H{\'{e}}am and Fr{\'{e}}d{\'{e}}ric Dadeau and Rafik Kheddam and Ghazi Maatoug and Micha{\"{e}}l Rusinowitch}, title = {A Model-Based Testing Approach for Security Protocols}, booktitle = {2016 {IEEE} Intl Conference on Computational Science and Engineering, {CSE} 2016, and {IEEE} Intl Conference on Embedded and Ubiquitous Computing, {EUC} 2016, and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering, {DCABES} 2016, Paris, France, August 24-26, 2016}, pages = {553--556}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSE-EUC-DCABES.2016.240}, doi = {10.1109/CSE-EUC-DCABES.2016.240}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/HeamDKMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/f-egc/AbidINRRR16, author = {Younes Abid and Abdessamad Imine and Amedeo Napoli and Chedy Ra{\"{\i}}ssi and Marc Rigolot and Micha{\"{e}}l Rusinowitch}, editor = {Cyril de Runz and Bruno Cr{\'{e}}milleux}, title = {Analyse d'activit{\'{e}} et exposition de la vie priv{\'{e}}e sur les m{\'{e}}dias sociaux}, booktitle = {16{\`{e}}me Journ{\'{e}}es Francophones Extraction et Gestion des Connaissances, {EGC} 2016, 18-22 Janvier 2016, Reims, France}, series = {Revue des Nouvelles Technologies de l'Information}, volume = {{E-30}}, pages = {545--546}, publisher = {{\'{E}}ditions {RNTI}}, year = {2016}, url = {http://editions-rnti.fr/?inprocid=1002223}, timestamp = {Tue, 26 Nov 2019 17:10:42 +0100}, biburl = {https://dblp.org/rec/conf/f-egc/AbidINRRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TuruaniVR16, author = {Mathieu Turuani and Thomas Voegtlin and Micha{\"{e}}l Rusinowitch}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Automated Verification of Electrum Wallet}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {27--42}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_3}, doi = {10.1007/978-3-662-53357-4\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/TuruaniVR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/NguyenIR16, author = {Hiep H. Nguyen and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Sabrina De Capitani di Vimercati}, title = {Detecting Communities under Differential Privacy}, booktitle = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016}, pages = {83--93}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994624}, timestamp = {Tue, 06 Nov 2018 16:59:07 +0100}, biburl = {https://dblp.org/rec/conf/wpes/NguyenIR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2016iwspa, editor = {Rakesh M. Verma and Micha{\"{e}}l Rusinowitch}, title = {Proceedings of the 2016 {ACM} on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2016, New Orleans, LA, USA, March 11, 2016}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2875475}, isbn = {978-1-4503-4077-9}, timestamp = {Tue, 15 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2016iwspa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NguyenIR16, author = {Hiep H. Nguyen and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, title = {Detecting Communities under Differential Privacy}, journal = {CoRR}, volume = {abs/1607.02060}, year = {2016}, url = {http://arxiv.org/abs/1607.02060}, eprinttype = {arXiv}, eprint = {1607.02060}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NguyenIR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NguyenIR16a, author = {Hiep H. Nguyen and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, title = {Private Link Exchange over Social Graphs}, journal = {CoRR}, volume = {abs/1609.01616}, year = {2016}, url = {http://arxiv.org/abs/1609.01616}, eprinttype = {arXiv}, eprint = {1609.01616}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NguyenIR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/BelkhirCR15, author = {Walid Belkhir and Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, title = {Parametrized automata simulation and application to service composition}, journal = {J. Symb. Comput.}, volume = {69}, pages = {40--60}, year = {2015}, url = {https://doi.org/10.1016/j.jsc.2014.09.029}, doi = {10.1016/J.JSC.2014.09.029}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/BelkhirCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stvr/DadeauHKMR15, author = {Fr{\'{e}}d{\'{e}}ric Dadeau and Pierre{-}Cyrille H{\'{e}}am and Rafik Kheddam and Ghazi Maatoug and Micha{\"{e}}l Rusinowitch}, title = {Model-based mutation testing from security protocols in {HLPSL}}, journal = {Softw. Test. Verification Reliab.}, volume = {25}, number = {5-7}, pages = {684--711}, year = {2015}, url = {https://doi.org/10.1002/stvr.1531}, doi = {10.1002/STVR.1531}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stvr/DadeauHKMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/NguyenIR15, author = {Hiep H. Nguyen and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {Differentially Private Publication of Social Graphs at Linear Cost}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {596--599}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2809385}, doi = {10.1145/2808797.2809385}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/asunam/NguyenIR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NguyenIR15, author = {Hiep H. Nguyen and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Anonymizing Social Graphs via Uncertainty Semantics}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {495--506}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714584}, doi = {10.1145/2714576.2714584}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NguyenIR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/JhaBCR15, author = {Tushant Jha and Walid Belkhir and Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, editor = {Alex Norta and Walid Gaaloul and G. R. Gangadharan and Hoa Khanh Dam}, title = {Expressive Equivalence and Succinctness of Parametrized Automata with Respect to Finite Memory Automata}, booktitle = {Service-Oriented Computing - {ICSOC} 2015 Workshops - WESOA, RMSOC, ISC, DISCO, WESE, BSCI, FOR-MOVES, Goa, India, November 16-19, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9586}, pages = {145--156}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-50539-7\_12}, doi = {10.1007/978-3-662-50539-7\_12}, timestamp = {Wed, 25 Sep 2019 18:15:01 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/JhaBCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AnantharamanBNR14, author = {Siva Anantharaman and Christopher Bouchard and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, title = {Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining}, journal = {Log. Methods Comput. Sci.}, volume = {10}, number = {1}, year = {2014}, url = {https://doi.org/10.2168/LMCS-10(1:5)2014}, doi = {10.2168/LMCS-10(1:5)2014}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AnantharamanBNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/CherifIR14, author = {Asma Cherif and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, title = {Practical access control management for distributed collaborative editors}, journal = {Pervasive Mob. Comput.}, volume = {15}, pages = {62--86}, year = {2014}, url = {https://doi.org/10.1016/j.pmcj.2013.09.004}, doi = {10.1016/J.PMCJ.2013.09.004}, timestamp = {Thu, 30 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/CherifIR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiml/BelkhirRR14, author = {Walid Belkhir and Gisela Rossi and Micha{\"{e}}l Rusinowitch}, editor = {Rajeev Gor{\'{e}} and Barteld P. Kooi and Agi Kurucz}, title = {A Parametrized Propositional Dynamic Logic with Application to Service Synthesis}, booktitle = {Advances in Modal Logic 10, invited and contributed papers from the tenth conference on "Advances in Modal Logic," held in Groningen, The Netherlands, August 5-8, 2014}, pages = {34--53}, publisher = {College Publications}, year = {2014}, url = {http://www.aiml.net/volumes/volume10/Belkhir-Rossi-Rusinowitch.pdf}, timestamp = {Tue, 16 Jan 2024 17:18:03 +0100}, biburl = {https://dblp.org/rec/conf/aiml/BelkhirRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/NguyenIR14, author = {Hiep H. Nguyen and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Wouter Joosen and Fabio Martinelli and Thomas Heyman}, title = {Enforcing Privacy in Decentralized Mobile Social Networks}, booktitle = {Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1298}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1298/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:23 +0100}, biburl = {https://dblp.org/rec/conf/essos/NguyenIR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/NguyenIR14, author = {Hiep H. Nguyen and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood and Philip W. L. Fong}, title = {A Maximum Variance Approach for Graph Anonymization}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8930}, pages = {49--64}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17040-4\_4}, doi = {10.1007/978-3-319-17040-4\_4}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/NguyenIR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/BelkhirCR14, author = {Walid Belkhir and Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, editor = {Farouk Toumani and Barbara Pernici and Daniela Grigori and Djamal Benslimane and Jan Mendling and Nejib Ben Hadj{-}Alouane and M. Brian Blake and Olivier Perrin and Iman Saleh and Sami Bhiri}, title = {An {EXPTIME} Algorithm for Data-Aware Service Simulation Using Parametrized Automata}, booktitle = {Service-Oriented Computing - {ICSOC} 2014 Workshops - WESOA; SeMaPS, RMSOC, KASA, ISC, FOR-MOVES, {CCSA} and Satellite Events, Paris, France, November 3-6, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8954}, pages = {295--307}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-22885-3\_26}, doi = {10.1007/978-3-319-22885-3\_26}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/BelkhirCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NguyenIR14, author = {Hiep H. Nguyen and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, title = {Anonymizing Social Graphs via Uncertainty Semantics}, journal = {CoRR}, volume = {abs/1408.1209}, year = {2014}, url = {http://arxiv.org/abs/1408.1209}, eprinttype = {arXiv}, eprint = {1408.1209}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NguyenIR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideas/MahfoudIR13, author = {Houari Mahfoud and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Bipin C. Desai and Josep Llu{\'{\i}}s Larriba{-}Pey and Jorge Bernardino}, title = {\emph{SVMAX}: a system for secure and valid manipulation of {XML} data}, booktitle = {17th International Database Engineering {\&} Applications Symposium, {IDEAS} '13, Barcelona, Spain - October 09 - 11, 2013}, pages = {154--161}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2513591.2513657}, doi = {10.1145/2513591.2513657}, timestamp = {Thu, 10 Dec 2020 13:35:15 +0100}, biburl = {https://dblp.org/rec/conf/ideas/MahfoudIR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lata/JacquemardR13, author = {Florent Jacquemard and Micha{\"{e}}l Rusinowitch}, editor = {Adrian{-}Horia Dediu and Carlos Mart{\'{\i}}n{-}Vide and Bianca Truthe}, title = {Rewrite Closure and {CF} Hedge Automata}, booktitle = {Language and Automata Theory and Applications - 7th International Conference, {LATA} 2013, Bilbao, Spain, April 2-5, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7810}, pages = {371--382}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37064-9\_33}, doi = {10.1007/978-3-642-37064-9\_33}, timestamp = {Mon, 16 Sep 2019 15:27:03 +0200}, biburl = {https://dblp.org/rec/conf/lata/JacquemardR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/synasc/BelkhirCR13, author = {Walid Belkhir and Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, editor = {Nikolaj S. Bj{\o}rner and Viorel Negru and Tetsuo Ida and Tudor Jebelean and Dana Petcu and Stephen M. Watt and Daniela Zaharie}, title = {Fresh-Variable Automata: Application to Service Composition}, booktitle = {15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, {SYNASC} 2013, Timisoara, Romania, September 23-26, 2013}, pages = {153--160}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SYNASC.2013.28}, doi = {10.1109/SYNASC.2013.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/synasc/BelkhirCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-4205, author = {Walid Belkhir and Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, title = {Fresh-Variable Automata for Service Composition}, journal = {CoRR}, volume = {abs/1302.4205}, year = {2013}, url = {http://arxiv.org/abs/1302.4205}, eprinttype = {arXiv}, eprint = {1302.4205}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-4205.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1304-6297, author = {Walid Belkhir and Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, title = {Guarded Variable Automata over Infinite Alphabets}, journal = {CoRR}, volume = {abs/1304.6297}, year = {2013}, url = {http://arxiv.org/abs/1304.6297}, eprinttype = {arXiv}, eprint = {1304.6297}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1304-6297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/ImineR13, author = {Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, title = {Secure Collaboration for Smartphones}, journal = {{ERCIM} News}, volume = {2013}, number = {93}, year = {2013}, url = {http://ercim-news.ercim.eu/en93/special/secure-collaboration-for-smartphones}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/ImineR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/AnantharamanLLNR12, author = {Siva Anantharaman and Hai Lin and Christopher Lynch and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, title = {Unification Modulo Homomorphic Encryption}, journal = {J. Autom. Reason.}, volume = {48}, number = {2}, pages = {135--158}, year = {2012}, url = {https://doi.org/10.1007/s10817-010-9205-y}, doi = {10.1007/S10817-010-9205-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/AnantharamanLLNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/ChevalierR12, author = {Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, title = {Decidability of Equivalence of Symbolic Derivations}, journal = {J. Autom. Reason.}, volume = {48}, number = {2}, pages = {263--292}, year = {2012}, url = {https://doi.org/10.1007/s10817-010-9199-5}, doi = {10.1007/S10817-010-9199-5}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/ChevalierR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/AnantharamanELNR12, author = {Siva Anantharaman and Serdar Erbatur and Christopher Lynch and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {Bernhard Gramlich and Dale Miller and Uli Sattler}, title = {Unification Modulo Synchronous Distributivity}, booktitle = {Automated Reasoning - 6th International Joint Conference, {IJCAR} 2012, Manchester, UK, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7364}, pages = {14--29}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31365-3\_4}, doi = {10.1007/978-3-642-31365-3\_4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cade/AnantharamanELNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lata/AnantharamanBNR12, author = {Siva Anantharaman and Christopher Bouchard and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {Adrian{-}Horia Dediu and Carlos Mart{\'{\i}}n{-}Vide}, title = {Unification Modulo Chaining}, booktitle = {Language and Automata Theory and Applications - 6th International Conference, {LATA} 2012, {A} Coru{\~{n}}a, Spain, March 5-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7183}, pages = {70--82}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28332-1\_7}, doi = {10.1007/978-3-642-28332-1\_7}, timestamp = {Sun, 02 Oct 2022 16:11:11 +0200}, biburl = {https://dblp.org/rec/conf/lata/AnantharamanBNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/AvanesovCRT12, author = {Tigran Avanesov and Yannick Chevalier and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Towards the Orchestration of Secured Services under Non-disclosure Policies}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {130--145}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_12}, doi = {10.1007/978-3-642-33704-8\_12}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/AvanesovCRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12, author = {Alessandro Armando and Wihem Arsac and Tigran Avanesov and Michele Barletta and Alberto Calvi and Alessandro Cappai and Roberto Carbone and Yannick Chevalier and Luca Compagna and Jorge Cu{\'{e}}llar and Gabriel Erzse and Simone Frau and Marius Minea and Sebastian M{\"{o}}dersheim and David von Oheimb and Giancarlo Pellegrino and Serena Elisa Ponta and Marco Rocchetto and Micha{\"{e}}l Rusinowitch and Mohammad Torabi Dashti and Mathieu Turuani and Luca Vigan{\`{o}}}, editor = {Cormac Flanagan and Barbara K{\"{o}}nig}, title = {The {AVANTSSAR} Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, {TACAS} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7214}, pages = {267--282}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28756-5\_19}, doi = {10.1007/978-3-642-28756-5\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/GhabriMR13, author = {Hatem Ghabri and Ghazi Maatoug and Micha{\"{e}}l Rusinowitch}, editor = {Adel Bouhoula and Tetsuo Ida and Fairouz Kamareddine}, title = {Compiling symbolic attacks to protocol implementation tests}, booktitle = {Proceedings Fourth International Symposium on Symbolic Computation in Software Science, {SCSS} 2012, Gammarth, Tunisia, 15-17 December 2012}, series = {{EPTCS}}, volume = {122}, pages = {39--49}, year = {2012}, url = {https://doi.org/10.4204/EPTCS.122.4}, doi = {10.4204/EPTCS.122.4}, timestamp = {Wed, 12 Sep 2018 01:05:15 +0200}, biburl = {https://dblp.org/rec/journals/corr/GhabriMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-4871, author = {Tigran Avanesov and Yannick Chevalier and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {Intruder deducibility constraints with negation. Decidability and application to secured service compositions}, journal = {CoRR}, volume = {abs/1207.4871}, year = {2012}, url = {http://arxiv.org/abs/1207.4871}, eprinttype = {arXiv}, eprint = {1207.4871}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-4871.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1212-5108, author = {Florent Jacquemard and Micha{\"{e}}l Rusinowitch}, title = {Rewrite Closure and {CF} Hedge Automata}, journal = {CoRR}, volume = {abs/1212.5108}, year = {2012}, url = {http://arxiv.org/abs/1212.5108}, eprinttype = {arXiv}, eprint = {1212.5108}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1212-5108.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jalc/AnantharamanNR11, author = {Siva Anantharaman and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, title = {String Rewriting and Security Analysis: An Extension of a Result of Book and Otto}, journal = {J. Autom. Lang. Comb.}, volume = {16}, number = {2-4}, pages = {75--90}, year = {2011}, url = {https://doi.org/10.25596/jalc-2011-075}, doi = {10.25596/JALC-2011-075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jalc/AnantharamanNR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AvanesovCMR11, author = {Tigran Avanesov and Yannick Chevalier and Mohammed Anis Mekki and Micha{\"{e}}l Rusinowitch}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Sabrina De Capitani di Vimercati}, title = {Web Services Verification and Prudent Implementation}, booktitle = {Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7122}, pages = {173--189}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28879-1\_12}, doi = {10.1007/978-3-642-28879-1\_12}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AvanesovCMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AvanesovCMRT11, author = {Tigran Avanesov and Yannick Chevalier and Mohammed Anis Mekki and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Sabrina De Capitani di Vimercati}, title = {Distributed Orchestration of Web Services under Security Constraints}, booktitle = {Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7122}, pages = {235--252}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28879-1\_16}, doi = {10.1007/978-3-642-28879-1\_16}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AvanesovCMRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispdc/AcharaIR11, author = {Jagdish Prasad Achara and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, title = {DeSCal - Decentralized Shared Calendar for {P2P} and Ad-Hoc Networks}, booktitle = {10th International Symposium on Parallel and Distributed Computing, {ISPDC} 2011, Cluj-Napoca, Romania, July 6-8, 2011}, pages = {223--231}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ISPDC.2011.40}, doi = {10.1109/ISPDC.2011.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispdc/AcharaIR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/CherifIR11, author = {Asma Cherif and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {William C. Chu and W. Eric Wong and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Optimistic access control for distributed collaborative editors}, booktitle = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}, pages = {861--868}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1982185.1982374}, doi = {10.1145/1982185.1982374}, timestamp = {Thu, 30 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/CherifIR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/RusinowitchT11, author = {Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Verifying a bounded number of sessions and its complexity}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {13--34}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-13}, doi = {10.3233/978-1-60750-714-7-13}, timestamp = {Fri, 15 May 2020 12:11:04 +0200}, biburl = {https://dblp.org/rec/books/ios/11/RusinowitchT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-0220, author = {Tigran Avanesov and Yannick Chevalier and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {Satisfiability of General Intruder Constraints with and without a Set Constructor}, journal = {CoRR}, volume = {abs/1103.0220}, year = {2011}, url = {http://arxiv.org/abs/1103.0220}, eprinttype = {arXiv}, eprint = {1103.0220}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-0220.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/NicoliniRR10, author = {Enrica Nicolini and Christophe Ringeissen and Micha{\"{e}}l Rusinowitch}, title = {Combining Satisfiability Procedures for Unions of Theories with a Shared Counting Operator}, journal = {Fundam. Informaticae}, volume = {105}, number = {1-2}, pages = {163--187}, year = {2010}, url = {https://doi.org/10.3233/FI-2010-362}, doi = {10.3233/FI-2010-362}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/NicoliniRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AbbesBR10, author = {Tarek Abbes and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, title = {Efficient decision tree for protocol analysis in intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {220--235}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037661}, doi = {10.1504/IJSN.2010.037661}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbbesBR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ChevalierR10, author = {Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, title = {Compiling and securing cryptographic protocols}, journal = {Inf. Process. Lett.}, volume = {110}, number = {3}, pages = {116--122}, year = {2010}, url = {https://doi.org/10.1016/j.ipl.2009.11.004}, doi = {10.1016/J.IPL.2009.11.004}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/ChevalierR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ChevalierR10, author = {Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, title = {Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures}, journal = {Theor. Comput. Sci.}, volume = {411}, number = {10}, pages = {1261--1282}, year = {2010}, url = {https://doi.org/10.1016/j.tcs.2009.10.022}, doi = {10.1016/J.TCS.2009.10.022}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ChevalierR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AnantharamanLLNR10, author = {Siva Anantharaman and Hai Lin and Christopher Lynch and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Cap unification: application to protocol security modulo homomorphic encryption}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {192--203}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755713}, doi = {10.1145/1755688.1755713}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AnantharamanLLNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/AvanesovCRT10, author = {Tigran Avanesov and Yannick Chevalier and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {Satisfiability of general intruder constraints with a set constructor}, booktitle = {CRiSIS 2010, Proceedings of the Fifth International Conference on Risks and Security of Internet and Systems, Montreal, QC, Canada, October 10-13, 2010}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CRISIS.2010.5764919}, doi = {10.1109/CRISIS.2010.5764919}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/AvanesovCRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmco/ChevalierMR10, author = {Yannick Chevalier and Mohammed Anis Mekki and Micha{\"{e}}l Rusinowitch}, editor = {Bernhard K. Aichernig and Frank S. de Boer and Marcello M. Bonsangue}, title = {Orchestration under Security Constraints}, booktitle = {Formal Methods for Components and Objects - 9th International Symposium, {FMCO} 2010, Graz, Austria, November 29 - December 1, 2010. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {6957}, pages = {23--44}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25271-6\_2}, doi = {10.1007/978-3-642-25271-6\_2}, timestamp = {Thu, 14 Oct 2021 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fmco/ChevalierMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppdp/JacquemardR10, author = {Florent Jacquemard and Micha{\"{e}}l Rusinowitch}, editor = {Temur Kutsia and Wolfgang Schreiner and Maribel Fern{\'{a}}ndez}, title = {Rewrite-based verification of {XML} updates}, booktitle = {Proceedings of the 12th International {ACM} {SIGPLAN} Conference on Principles and Practice of Declarative Programming, July 26-28, 2010, Hagenberg, Austria}, pages = {119--130}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1836089.1836105}, doi = {10.1145/1836089.1836105}, timestamp = {Tue, 27 Nov 2018 15:52:28 +0100}, biburl = {https://dblp.org/rec/conf/ppdp/JacquemardR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AhmedIR10, author = {Zeeshan Ahmed and Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Miguel Soriano}, title = {Safe and Efficient Strategies for Updating Firewall Policies}, booktitle = {Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6264}, pages = {45--57}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15152-1\_5}, doi = {10.1007/978-3-642-15152-1\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/AhmedIR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/NicoliniRR09, author = {Enrica Nicolini and Christophe Ringeissen and Micha{\"{e}}l Rusinowitch}, editor = {Renate A. Schmidt}, title = {Combinable Extensions of Abelian Groups}, booktitle = {Automated Deduction - CADE-22, 22nd International Conference on Automated Deduction, Montreal, Canada, August 2-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5663}, pages = {51--66}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02959-2\_4}, doi = {10.1007/978-3-642-02959-2\_4}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/NicoliniRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChridiTR09, author = {Najah Chridi and Mathieu Turuani and Micha{\"{e}}l Rusinowitch}, title = {Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {277--289}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.10}, doi = {10.1109/CSF.2009.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChridiTR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/AnantharamanLLNR09, author = {Siva Anantharaman and Hai Lin and Christopher Lynch and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {Silvio Ghilardi and Roberto Sebastiani}, title = {Unification Modulo Homomorphic Encryption}, booktitle = {Frontiers of Combining Systems, 7th International Symposium, FroCoS 2009, Trento, Italy, September 16-18, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5749}, pages = {100--116}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04222-5\_6}, doi = {10.1007/978-3-642-04222-5\_6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/frocos/AnantharamanLLNR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/NicoliniRR09, author = {Enrica Nicolini and Christophe Ringeissen and Micha{\"{e}}l Rusinowitch}, editor = {Silvio Ghilardi and Roberto Sebastiani}, title = {Data Structures with Arithmetic Constraints: {A} Non-disjoint Combination}, booktitle = {Frontiers of Combining Systems, 7th International Symposium, FroCoS 2009, Trento, Italy, September 16-18, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5749}, pages = {319--334}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04222-5\_20}, doi = {10.1007/978-3-642-04222-5\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/frocos/NicoliniRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ImineCR09, author = {Abdessamad Imine and Asma Cherif and Micha{\"{e}}l Rusinowitch}, editor = {Willem Jonker and Milan Petkovic}, title = {A Flexible Access Control Model for Distributed Collaborative Editors}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {89--106}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_6}, doi = {10.1007/978-3-642-04219-5\_6}, timestamp = {Thu, 30 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ImineCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/NicoliniRR09, author = {Enrica Nicolini and Christophe Ringeissen and Micha{\"{e}}l Rusinowitch}, editor = {Stefan Kowalewski and Anna Philippou}, title = {Satisfiability Procedures for Combination of Theories Sharing Integer Offsets}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 15th International Conference, {TACAS} 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2009, York, UK, March 22-29, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5505}, pages = {428--442}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00768-2\_35}, doi = {10.1007/978-3-642-00768-2\_35}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/NicoliniRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0907-5125, author = {Florent Jacquemard and Micha{\"{e}}l Rusinowitch}, title = {Rewrite based Verification of {XML} Updates}, journal = {CoRR}, volume = {abs/0907.5125}, year = {2009}, url = {http://arxiv.org/abs/0907.5125}, eprinttype = {arXiv}, eprint = {0907.5125}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0907-5125.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0910-5099, author = {Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, title = {Compiling and securing cryptographic protocols}, journal = {CoRR}, volume = {abs/0910.5099}, year = {2009}, url = {http://arxiv.org/abs/0910.5099}, eprinttype = {arXiv}, eprint = {0910.5099}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-5099.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ChevalierR08, author = {Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, title = {Hierarchical combination of intruder theories}, journal = {Inf. Comput.}, volume = {206}, number = {2-4}, pages = {352--377}, year = {2008}, url = {https://doi.org/10.1016/j.ic.2007.07.004}, doi = {10.1016/J.IC.2007.07.004}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ChevalierR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/JacquemardRV08, author = {Florent Jacquemard and Micha{\"{e}}l Rusinowitch and Laurent Vigneron}, title = {Tree automata with equality constraints modulo equational theories}, journal = {J. Log. Algebraic Methods Program.}, volume = {75}, number = {2}, pages = {182--208}, year = {2008}, url = {https://doi.org/10.1016/j.jlap.2007.10.006}, doi = {10.1016/J.JLAP.2007.10.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/JacquemardRV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/ChevalierKRT08, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption}, journal = {{ACM} Trans. Comput. Log.}, volume = {9}, number = {4}, pages = {24:1--24:52}, year = {2008}, url = {https://doi.org/10.1145/1380572.1380573}, doi = {10.1145/1380572.1380573}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/ChevalierKRT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AbdelnurARS08, author = {Humberto J. Abdelnur and Tigran Avanesov and Micha{\"{e}}l Rusinowitch and Radu State}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Abusing {SIP} Authentication}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {237--242}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.29}, doi = {10.1109/IAS.2008.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AbdelnurARS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/JacquemardR08, author = {Florent Jacquemard and Micha{\"{e}}l Rusinowitch}, editor = {Andrei Voronkov}, title = {Closure of Hedge-Automata Languages by Hedge Rewriting}, booktitle = {Rewriting Techniques and Applications, 19th International Conference, {RTA} 2008, Hagenberg, Austria, July 15-17, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5117}, pages = {157--171}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70590-1\_11}, doi = {10.1007/978-3-540-70590-1\_11}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/JacquemardR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/AbbesBR08, author = {Tarek Abbes and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, editor = {Roger L. Wainwright and Hisham Haddad}, title = {An inference system for detecting firewall filtering rules anomalies}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008}, pages = {2122--2128}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1363686.1364197}, doi = {10.1145/1363686.1364197}, timestamp = {Tue, 06 Nov 2018 11:06:48 +0100}, biburl = {https://dblp.org/rec/conf/sac/AbbesBR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/ChevalierMR08, author = {Yannick Chevalier and Mohammed Anis Mekki and Micha{\"{e}}l Rusinowitch}, title = {Automatic Composition of Services with Security Policies}, booktitle = {2008 {IEEE} Congress on Services, Part I, {SERVICES} {I} 2008, Honolulu, Hawaii, USA, July 6-11, 2008}, pages = {529--537}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SERVICES-1.2008.13}, doi = {10.1109/SERVICES-1.2008.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/ChevalierMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/unif/AnantharamanLLNR08, author = {Siva Anantharaman and Hai Lin and Christopher Lynch and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {Mircea Marin}, title = {Unification modulo Homomorphic Encryption is Decidable}, booktitle = {Proceedings of the 22nd International Workshop on Unification, {UNIF} 2008, Castle of Hagenberg, Austria, July 18, 2008}, pages = {1--15}, year = {2008}, url = {https://www3.risc.jku.at/publications/download/risc\_3454/UNIF\_proceedings.pdf\#page=9}, timestamp = {Tue, 19 Sep 2023 14:44:31 +0200}, biburl = {https://dblp.org/rec/conf/unif/AnantharamanLLNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2008P8171, editor = {Anca Muscholl and Ramaswamy Ramanujam and Micha{\"{e}}l Rusinowitch and Thomas Schwentick and Victor Vianu}, title = {Beyond the Finite: New Challenges in Verification and Semistructured Data, 20.04. - 25.04.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08171}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/portals/08171/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2008P8171.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/MuschollRRSV08, author = {Anca Muscholl and Ramaswamy Ramanujam and Micha{\"{e}}l Rusinowitch and Thomas Schwentick and Victor Vianu}, editor = {Anca Muscholl and Ramaswamy Ramanujam and Micha{\"{e}}l Rusinowitch and Thomas Schwentick and Victor Vianu}, title = {08171 Abstracts Collection - Beyond the Finite: New Challenges in Verification and Semistructured Data}, booktitle = {Beyond the Finite: New Challenges in Verification and Semistructured Data, 20.04. - 25.04.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08171}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1560/}, timestamp = {Thu, 10 Jun 2021 13:02:04 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/MuschollRRSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/MuschollRRSV08a, author = {Anca Muscholl and Ramaswamy Ramanujam and Micha{\"{e}}l Rusinowitch and Thomas Schwentick and Victor Vianu}, editor = {Anca Muscholl and Ramaswamy Ramanujam and Micha{\"{e}}l Rusinowitch and Thomas Schwentick and Victor Vianu}, title = {08171 Summary - Beyond the Finite: New Challenges in Verification and Semistructured Data}, booktitle = {Beyond the Finite: New Challenges in Verification and Semistructured Data, 20.04. - 25.04.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08171}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1558/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/MuschollRRSV08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmcs/CortierRZ07, author = {V{\'{e}}ronique Cortier and Micha{\"{e}}l Rusinowitch and Eugen Zalinescu}, title = {Relating two standard notions of secrecy}, journal = {Log. Methods Comput. Sci.}, volume = {3}, number = {3}, year = {2007}, url = {https://doi.org/10.2168/LMCS-3(3:2)2007}, doi = {10.2168/LMCS-3(3:2)2007}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lmcs/CortierRZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/AbbesBR07, author = {Tarek Abbes and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, title = {A Traffic Classification Algorithm for Intrusion Detection}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, pages = {188--193}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.62}, doi = {10.1109/AINAW.2007.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/AbbesBR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ImineR07, author = {Abdessamad Imine and Micha{\"{e}}l Rusinowitch}, editor = {Hubert Comon{-}Lundh and Claude Kirchner and H{\'{e}}l{\`{e}}ne Kirchner}, title = {Applying a Theorem Prover to the Verification of Optimistic Replication Algorithms}, booktitle = {Rewriting, Computation and Proof, Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {4600}, pages = {213--234}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73147-4\_11}, doi = {10.1007/978-3-540-73147-4\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ImineR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/ChevalierLR07, author = {Yannick Chevalier and Denis Lugiez and Micha{\"{e}}l Rusinowitch}, editor = {Boris Konev and Frank Wolter}, title = {Towards an Automatic Analysis of Web Service Security}, booktitle = {Frontiers of Combining Systems, 6th International Symposium, FroCoS 2007, Liverpool, UK, September 10-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4720}, pages = {133--147}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74621-8\_9}, doi = {10.1007/978-3-540-74621-8\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/frocos/ChevalierLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/ChevalierLR07, author = {Yannick Chevalier and Denis Lugiez and Micha{\"{e}}l Rusinowitch}, editor = {Nachum Dershowitz and Andrei Voronkov}, title = {Verifying Cryptographic Protocols with Subterms Constraints}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning, 14th International Conference, {LPAR} 2007, Yerevan, Armenia, October 15-19, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4790}, pages = {181--195}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75560-9\_15}, doi = {10.1007/978-3-540-75560-9\_15}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/lpar/ChevalierLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/AnantharamanNR07, author = {Siva Anantharaman and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {Franz Baader}, title = {Intruders with Caps}, booktitle = {Term Rewriting and Applications, 18th International Conference, {RTA} 2007, Paris, France, June 26-28, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4533}, pages = {20--35}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73449-9\_4}, doi = {10.1007/978-3-540-73449-9\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/AnantharamanNR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0706-0502, author = {V{\'{e}}ronique Cortier and Micha{\"{e}}l Rusinowitch and Eugen Zalinescu}, title = {Relating two standard notions of secrecy}, journal = {CoRR}, volume = {abs/0706.0502}, year = {2007}, url = {http://arxiv.org/abs/0706.0502}, eprinttype = {arXiv}, eprint = {0706.0502}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0706-0502.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jalc/AnantharamanGHM06, author = {Siva Anantharaman and Paul Gastin and Ga{\'{e}}tan Hains and John Mullins and Micha{\"{e}}l Rusinowitch}, title = {Editorial}, journal = {J. Autom. Lang. Comb.}, volume = {11}, number = {1}, pages = {5--6}, year = {2006}, url = {https://doi.org/10.25596/jalc-2006-005}, doi = {10.25596/JALC-2006-005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jalc/AnantharamanGHM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/ArmandoBCRV06, author = {Alessandro Armando and David A. Basin and Jorge Cu{\'{e}}llar and Micha{\"{e}}l Rusinowitch and Luca Vigan{\`{o}}}, title = {Automated Reasoning for Security Protocol Analysis}, journal = {J. Autom. Reason.}, volume = {36}, number = {1-2}, pages = {1--3}, year = {2006}, url = {https://doi.org/10.1007/s10817-005-9014-x}, doi = {10.1007/S10817-005-9014-X}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/ArmandoBCRV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ImineROM06, author = {Abdessamad Imine and Micha{\"{e}}l Rusinowitch and G{\'{e}}rald Oster and Pascal Molli}, title = {Formal design and verification of operational transformation algorithms for copies convergence}, journal = {Theor. Comput. Sci.}, volume = {351}, number = {2}, pages = {167--183}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2005.09.066}, doi = {10.1016/J.TCS.2005.09.066}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ImineROM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/JacquemardRV06, author = {Florent Jacquemard and Micha{\"{e}}l Rusinowitch and Laurent Vigneron}, editor = {Ulrich Furbach and Natarajan Shankar}, title = {Tree Automata with Equality Constraints Modulo Equational Theories}, booktitle = {Automated Reasoning, Third International Joint Conference, {IJCAR} 2006, Seattle, WA, USA, August 17-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4130}, pages = {557--571}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11814771\_45}, doi = {10.1007/11814771\_45}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/JacquemardRV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/CortierRZ06, author = {V{\'{e}}ronique Cortier and Micha{\"{e}}l Rusinowitch and Eugen Zalinescu}, editor = {Zolt{\'{a}}n {\'{E}}sik}, title = {Relating Two Standard Notions of Secrecy}, booktitle = {Computer Science Logic, 20th International Workshop, {CSL} 2006, 15th Annual Conference of the EACSL, Szeged, Hungary, September 25-29, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4207}, pages = {303--318}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11874683\_20}, doi = {10.1007/11874683\_20}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/CortierRZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ZalinescuCR06, author = {Eugen Zalinescu and V{\'{e}}ronique Cortier and Micha{\"{e}}l Rusinowitch}, editor = {Serge Autexier and Stephan Merz and Leendert W. N. van der Torre and Reinhard Wilhelm and Pierre Wolper}, title = {Relating two standard notions of secrecy}, booktitle = {Workshop "Trustworthy Software" 2006, May 18-19, 2006, Saarland University, Saarbr{\"{u}}cken, Germany}, series = {OASIcs}, volume = {3}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2006}, url = {http://drops.dagstuhl.de/opus/volltexte/2006/691}, timestamp = {Tue, 15 Feb 2022 09:40:05 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/ZalinescuCR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/ChevalierR06, author = {Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, editor = {Frank Pfenning}, title = {Hierarchical Combination of Intruder Theories}, booktitle = {Term Rewriting and Applications, 17th International Conference, {RTA} 2006, Seattle, WA, USA, August 12-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4098}, pages = {108--122}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805618\_9}, doi = {10.1007/11805618\_9}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/ChevalierR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/AnantharamanNR05, author = {Siva Anantharaman and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, title = {Closure properties and decision problems of dag automata}, journal = {Inf. Process. Lett.}, volume = {94}, number = {5}, pages = {231--240}, year = {2005}, url = {https://doi.org/10.1016/j.ipl.2005.02.004}, doi = {10.1016/J.IPL.2005.02.004}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/AnantharamanNR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ChevalierKRT05, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {An {NP} decision procedure for protocol insecurity with {XOR}}, journal = {Theor. Comput. Sci.}, volume = {338}, number = {1-3}, pages = {247--274}, year = {2005}, url = {https://doi.org/10.1016/j.tcs.2005.01.015}, doi = {10.1016/J.TCS.2005.01.015}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ChevalierKRT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ArmandoBBCCCDHKMMORSTVV05, author = {Alessandro Armando and David A. Basin and Yohan Boichut and Yannick Chevalier and Luca Compagna and Jorge Cu{\'{e}}llar and Paul Hankes Drielsma and Pierre{-}Cyrille H{\'{e}}am and Olga Kouchnarenko and Jacopo Mantovani and Sebastian M{\"{o}}dersheim and David von Oheimb and Micha{\"{e}}l Rusinowitch and Judson Santiago and Mathieu Turuani and Luca Vigan{\`{o}} and Laurent Vigneron}, editor = {Kousha Etessami and Sriram K. Rajamani}, title = {The {AVISPA} Tool for the Automated Validation of Internet Security Protocols and Applications}, booktitle = {Computer Aided Verification, 17th International Conference, {CAV} 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3576}, pages = {281--285}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11513988\_27}, doi = {10.1007/11513988\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/ArmandoBBCCCDHKMMORSTVV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/ImineMOR05, author = {Abdessamad Imine and Pascal Molli and G{\'{e}}rald Oster and Micha{\"{e}}l Rusinowitch}, editor = {Farn Wang}, title = {Towards Synchronizing Linear Collaborative Objects with Operational Transformation}, booktitle = {Formal Techniques for Networked and Distributed Systems - {FORTE} 2005, 25th {IFIP} {WG} 6.1 International Conference, Taipei, Taiwan, October 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3731}, pages = {411--427}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11562436\_30}, doi = {10.1007/11562436\_30}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/forte/ImineMOR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/ChevalierR05, author = {Yannick Chevalier and Micha{\"{e}}l Rusinowitch}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Combining Intruder Theories}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {639--651}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_52}, doi = {10.1007/11523468\_52}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/ChevalierR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppdp/CortierRZ05, author = {V{\'{e}}ronique Cortier and Micha{\"{e}}l Rusinowitch and Eugen Zalinescu}, editor = {Pedro Barahona and Amy P. Felty}, title = {A resolution strategy for verifying cryptographic protocols with {CBC} encryption and blind signatures}, booktitle = {Proceedings of the 7th International {ACM} {SIGPLAN} Conference on Principles and Practice of Declarative Programming, July 11-13 2005, Lisbon, Portugal}, pages = {12--22}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1069774.1069776}, doi = {10.1145/1069774.1069776}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ppdp/CortierRZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/AbbesBR04, author = {Tarek Abbes and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, title = {On the fly pattern matching for intrusion detection with Snort}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {59}, number = {9-10}, pages = {1045--1071}, year = {2004}, url = {https://doi.org/10.1007/BF03179710}, doi = {10.1007/BF03179710}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/AbbesBR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/AnantharamanNR04, author = {Siva Anantharaman and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, title = {Unification Modulo \emph{ACUI} Plus Distributivity Axioms}, journal = {J. Autom. Reason.}, volume = {33}, number = {1}, pages = {1--28}, year = {2004}, url = {https://doi.org/10.1007/s10817-004-2279-7}, doi = {10.1007/S10817-004-2279-7}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/AnantharamanNR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/GottlobHR04, author = {Georg Gottlob and Miki Hermann and Micha{\"{e}}l Rusinowitch}, title = {2nd International Workshop on Complexity in Automated Deduction (CiAD) - Foreword}, journal = {Theory Comput. Syst.}, volume = {37}, number = {6}, pages = {639--640}, year = {2004}, url = {https://doi.org/10.1007/s00224-004-3706-1}, doi = {10.1007/S00224-004-3706-1}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mst/GottlobHR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/Rusinowitch04, author = {Micha{\"{e}}l Rusinowitch}, title = {{\'{E}}ditorial}, journal = {Tech. Sci. Informatiques}, volume = {23}, number = {3}, pages = {289--290}, year = {2004}, url = {http://tsi.revuesonline.com/article.jsp?articleId=3239}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/Rusinowitch04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/ImineMOR04, author = {Abdessamad Imine and Pascal Molli and G{\'{e}}rald Oster and Micha{\"{e}}l Rusinowitch}, editor = {Charles Rattray and Savi Maharaj and Carron Shankland}, title = {Deductive Verification of Distributed Groupware Systems}, booktitle = {Algebraic Methodology and Software Technology, 10th International Conference, {AMAST} 2004, Stirling, Scotland, UK, July 12-16, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3116}, pages = {226--240}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27815-3\_20}, doi = {10.1007/978-3-540-27815-3\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/amast/ImineMOR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifipTCS/Rusinowitch04, author = {Micha{\"{e}}l Rusinowitch}, editor = {Jean{-}Jacques L{\'{e}}vy and Ernst W. Mayr and John C. Mitchell}, title = {A Decidable Analysis of Security Protocols}, booktitle = {Exploring New Frontiers of Theoretical Informatics, {IFIP} 18th World Computer Congress, {TC1} 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {155}, pages = {21}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8141-3\_4}, doi = {10.1007/1-4020-8141-3\_4}, timestamp = {Fri, 27 Sep 2019 10:35:17 +0200}, biburl = {https://dblp.org/rec/conf/ifipTCS/Rusinowitch04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/AbbesBR04, author = {Tarek Abbes and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, title = {Protocol Analysis in Intrusion Detection Using Decision Tree}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {404--408}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286488}, doi = {10.1109/ITCC.2004.1286488}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/AbbesBR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ChevalierKRT05, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Deciding the Security of Protocols with Commuting Public Key Encryption}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {55--66}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.019}, doi = {10.1016/J.ENTCS.2004.05.019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/ChevalierKRT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cade/2004, editor = {David A. Basin and Micha{\"{e}}l Rusinowitch}, title = {Automated Reasoning - Second International Joint Conference, {IJCAR} 2004, Cork, Ireland, July 4-8, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3097}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98691}, doi = {10.1007/B98691}, isbn = {3-540-22345-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cade/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ArmandoRR03, author = {Alessandro Armando and Silvio Ranise and Micha{\"{e}}l Rusinowitch}, title = {A rewriting approach to satisfiability procedures}, journal = {Inf. Comput.}, volume = {183}, number = {2}, pages = {140--164}, year = {2003}, url = {https://doi.org/10.1016/S0890-5401(03)00020-8}, doi = {10.1016/S0890-5401(03)00020-8}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ArmandoRR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/RusinowitchSK03, author = {Micha{\"{e}}l Rusinowitch and Sorin Stratulat and Francis Klay}, title = {Mechanical Verification of an Ideal Incremental {ABR} Conformance Algorithm}, journal = {J. Autom. Reason.}, volume = {30}, number = {2}, pages = {53--177}, year = {2003}, url = {https://doi.org/10.1023/A:1023251327012}, doi = {10.1023/A:1023251327012}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/RusinowitchSK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/RusinowitchT03, author = {Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {Protocol insecurity with a finite number of sessions, composed keys is NP-complete}, journal = {Theor. Comput. Sci.}, volume = {299}, number = {1-3}, pages = {451--475}, year = {2003}, url = {https://doi.org/10.1016/S0304-3975(02)00490-5}, doi = {10.1016/S0304-3975(02)00490-5}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/RusinowitchT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/ComonNNR03, author = {Hubert Comon and Paliath Narendran and Robert Nieuwenhuis and Micha{\"{e}}l Rusinowitch}, title = {Deciding the confluence of ordered term rewrite systems}, journal = {{ACM} Trans. Comput. Log.}, volume = {4}, number = {1}, pages = {33--55}, year = {2003}, url = {https://doi.org/10.1145/601775.601777}, doi = {10.1145/601775.601777}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/ComonNNR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/AnantharamanNR03, author = {Siva Anantharaman and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {Franz Baader}, title = {Unification Modulo {ACU} {I} Plus Homomorphisms/Distributivity}, booktitle = {Automated Deduction - CADE-19, 19th International Conference on Automated Deduction Miami Beach, FL, USA, July 28 - August 2, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2741}, pages = {442--457}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45085-6\_38}, doi = {10.1007/978-3-540-45085-6\_38}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/AnantharamanNR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/ChevalierKRTV03, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani and Laurent Vigneron}, editor = {Matthias Baaz and Johann A. Makowsky}, title = {Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions}, booktitle = {Computer Science Logic, 17th International Workshop, {CSL} 2003, 12th Annual Conference of the EACSL, and 8th Kurt G{\"{o}}del Colloquium, {KGC} 2003, Vienna, Austria, August 25-30, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2803}, pages = {128--141}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45220-1\_13}, doi = {10.1007/978-3-540-45220-1\_13}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/ChevalierKRTV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecscw/ImineMOR03, author = {Abdessamad Imine and Pascal Molli and G{\'{e}}rald Oster and Micha{\"{e}}l Rusinowitch}, editor = {Kari Kuutti and Eija Helena Karsten and Geraldine Fitzpatrick and Paul Dourish and Kjeld Schmidt}, title = {Proving Correctness of Transformation Functions in Real-Time Groupware}, booktitle = {Proceedings of the Eighth European Conference on Computer Supported Cooperative Work, 14-18 September 2003, Helsinki, Finland}, pages = {277--293}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-94-010-0068-0\_15}, doi = {10.1007/978-94-010-0068-0\_15}, timestamp = {Wed, 25 Sep 2019 18:03:52 +0200}, biburl = {https://dblp.org/rec/conf/ecscw/ImineMOR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/MussetR03, author = {Julien Musset and Micha{\"{e}}l Rusinowitch}, editor = {Keijiro Araki and Stefania Gnesi and Dino Mandrioli}, title = {Computing Meta-transitions for Linear Transition Systems with Polynomials}, booktitle = {{FME} 2003: Formal Methods, International Symposium of Formal Methods Europe, Pisa, Italy, September 8-14, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2805}, pages = {562--581}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45236-2\_31}, doi = {10.1007/978-3-540-45236-2\_31}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/MussetR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/ChevalierKRT03, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {Paritosh K. Pandya and Jaikumar Radhakrishnan}, title = {Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents}, booktitle = {{FST} {TCS} 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Mumbai, India, December 15-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2914}, pages = {124--135}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24597-1\_11}, doi = {10.1007/978-3-540-24597-1\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/ChevalierKRT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/ChevalierKRT03, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {An {NP} Decision Procedure for Protocol Insecurity with {XOR}}, booktitle = {18th {IEEE} Symposium on Logic in Computer Science {(LICS} 2003), 22-25 June 2003, Ottawa, Canada, Proceedings}, pages = {261--270}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/LICS.2003.1210066}, doi = {10.1109/LICS.2003.1210066}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/ChevalierKRT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/AnantharamanNR03, author = {Siva Anantharaman and Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {Branislav Rovan and Peter Vojt{\'{a}}s}, title = {ACID-Unification Is NEXPTIME-Decidable}, booktitle = {Mathematical Foundations of Computer Science 2003, 28th International Symposium, {MFCS} 2003, Bratislava, Slovakia, August 25-29, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2747}, pages = {169--178}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45138-9\_11}, doi = {10.1007/978-3-540-45138-9\_11}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/AnantharamanNR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Rusinowitch03, author = {Micha{\"{e}}l Rusinowitch}, editor = {Lubos Brim and Orna Grumberg}, title = {Automated analysis of security protocols}, booktitle = {12th International Workshop on Functional and Constraint Logic Programming, {WFLP} 2003, in connection with RDP'03, Federated Conference on Rewriting, Deduction and Programming, Boulder, Colorado, USA, July 14, 2003}, series = {Electronic Notes in Theoretical Computer Science}, volume = {86}, number = {3}, pages = {12--15}, publisher = {Elsevier}, year = {2003}, url = {https://doi.org/10.1016/S1571-0661(04)80690-X}, doi = {10.1016/S1571-0661(04)80690-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/Rusinowitch03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/NarendranR02, author = {Paliath Narendran and Micha{\"{e}}l Rusinowitch}, title = {Guest Editorial}, journal = {Inf. Comput.}, volume = {178}, number = {2}, pages = {345}, year = {2002}, url = {https://doi.org/10.1006/inco.2002.3159}, doi = {10.1006/INCO.2002.3159}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/NarendranR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/ArmandoRS02, author = {Alessandro Armando and Micha{\"{e}}l Rusinowitch and Sorin Stratulat}, title = {Incorporating Decision Procedures in Implicit Induction}, journal = {J. Symb. Comput.}, volume = {34}, number = {4}, pages = {241--258}, year = {2002}, url = {https://doi.org/10.1006/jsco.2002.0549}, doi = {10.1006/JSCO.2002.0549}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/ArmandoRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BouhoulaR02, author = {Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, title = {Observational proofs by rewriting}, journal = {Theor. Comput. Sci.}, volume = {275}, number = {1-2}, pages = {675--698}, year = {2002}, url = {https://doi.org/10.1016/S0304-3975(01)00333-4}, doi = {10.1016/S0304-3975(01)00333-4}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BouhoulaR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ArmandoBBCCMRTVV02, author = {Alessandro Armando and David A. Basin and Mehdi Bouallagui and Yannick Chevalier and Luca Compagna and Sebastian M{\"{o}}dersheim and Micha{\"{e}}l Rusinowitch and Mathieu Turuani and Luca Vigan{\`{o}} and Laurent Vigneron}, editor = {Ed Brinksma and Kim Guldstrand Larsen}, title = {The {AVISS} Security Protocol Analysis Tool}, booktitle = {Computer Aided Verification, 14th International Conference, {CAV} 2002,Copenhagen, Denmark, July 27-31, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2404}, pages = {349--353}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45657-0\_27}, doi = {10.1007/3-540-45657-0\_27}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/ArmandoBBCCMRTVV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/VermaRL01, author = {Rakesh M. Verma and Micha{\"{e}}l Rusinowitch and Denis Lugiez}, title = {Algorithms and Reductions for Rewriting Problems}, journal = {Fundam. Informaticae}, volume = {46}, number = {3}, pages = {257--276}, year = {2001}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi46-3-05}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/VermaRL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RusinowitchT01, author = {Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, title = {Protocol Insecurity with Finite Number of Sessions is NP-Complete}, booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, pages = {174--187}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSFW.2001.930145}, doi = {10.1109/CSFW.2001.930145}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RusinowitchT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/ArmandoRR01, author = {Alessandro Armando and Silvio Ranise and Micha{\"{e}}l Rusinowitch}, editor = {Laurent Fribourg}, title = {Uniform Derivation of Decision Procedures by Superposition}, booktitle = {Computer Science Logic, 15th International Workshop, {CSL} 2001. 10th Annual Conference of the EACSL, Paris, France, September 10-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2142}, pages = {513--527}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44802-0\_36}, doi = {10.1007/3-540-44802-0\_36}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/ArmandoRR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/Rusinowitch01, author = {Micha{\"{e}}l Rusinowitch}, editor = {Aart Middeldorp}, title = {Rewriting for Deduction and Verification}, booktitle = {Rewriting Techniques and Applications, 12th International Conference, {RTA} 2001, Utrecht, The Netherlands, May 22-24, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2051}, pages = {2}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45127-7\_2}, doi = {10.1007/3-540-45127-7\_2}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/Rusinowitch01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Rusinowitch01, author = {Micha{\"{e}}l Rusinowitch}, editor = {Jean Goubault{-}Larrecq}, title = {The practice of cryptographic protocol verification}, booktitle = {Logical Aspects of Cryptographic Protocol Verification, {LACPV} 2001, in connection with {CAV} 2001, Paris, France, July 23, 2001}, series = {Electronic Notes in Theoretical Computer Science}, volume = {55}, number = {1}, pages = {3--4}, publisher = {Elsevier}, year = {2001}, url = {https://doi.org/10.1016/S1571-0661(04)00241-5}, doi = {10.1016/S1571-0661(04)00241-5}, timestamp = {Mon, 05 Dec 2022 12:31:03 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Rusinowitch01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/RusinowitchSK00, author = {Micha{\"{e}}l Rusinowitch and Sorin Stratulat and Francis Klay}, editor = {E. Allen Emerson and A. Prasad Sistla}, title = {Mechanical Verification of an Ideal Incremental \emph{ABR} Conformance}, booktitle = {Computer Aided Verification, 12th International Conference, {CAV} 2000, Chicago, IL, USA, July 15-19, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1855}, pages = {344--357}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722167\_27}, doi = {10.1007/10722167\_27}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/RusinowitchSK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cl/NarendranR00, author = {Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {John W. Lloyd and Ver{\'{o}}nica Dahl and Ulrich Furbach and Manfred Kerber and Kung{-}Kiu Lau and Catuscia Palamidessi and Lu{\'{\i}}s Moniz Pereira and Yehoshua Sagiv and Peter J. Stuckey}, title = {The Theory of Total Unary {RPO} Is Decidable}, booktitle = {Computational Logic - {CL} 2000, First International Conference, London, UK, 24-28 July, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1861}, pages = {660--672}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44957-4\_44}, doi = {10.1007/3-540-44957-4\_44}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cl/NarendranR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/JacquemardRV00, author = {Florent Jacquemard and Micha{\"{e}}l Rusinowitch and Laurent Vigneron}, editor = {Michel Parigot and Andrei Voronkov}, title = {Compiling and Verifying Security Protocols}, booktitle = {Logic for Programming and Automated Reasoning, 7th International Conference, {LPAR} 2000, Reunion Island, France, November 11-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1955}, pages = {131--160}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44404-1\_10}, doi = {10.1007/3-540-44404-1\_10}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/lpar/JacquemardRV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ershov/KucherovR99, author = {Gregory Kucherov and Micha{\"{e}}l Rusinowitch}, editor = {Dines Bj{\o}rner and Manfred Broy and Alexandre V. Zamulin}, title = {Patterns in Words versus Patterns in Trees: {A} Brief Survey and New Results}, booktitle = {Perspectives of System Informatics, Third International Andrei Ershov Memorial Conference, PSI'99, Akademgorodok, Novosibirsk, Russia, July 6-9, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1755}, pages = {283--296}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46562-6\_25}, doi = {10.1007/3-540-46562-6\_25}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/ershov/KucherovR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rta/1999, editor = {Paliath Narendran and Micha{\"{e}}l Rusinowitch}, title = {Rewriting Techniques and Applications, 10th International Conference, RTA-99, Trento, Italy, July 2-4, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1631}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48685-2}, doi = {10.1007/3-540-48685-2}, isbn = {3-540-66201-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rta/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/NarendranRV98, author = {Paliath Narendran and Micha{\"{e}}l Rusinowitch and Rakesh M. Verma}, editor = {Georg Gottlob and Etienne Grandjean and Katrin Seyr}, title = {{RPO} Constraint Solving Is in {NP}}, booktitle = {Computer Science Logic, 12th International Workshop, {CSL} '98, Annual Conference of the EACSL, Brno, Czech Republic, August 24-28, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1584}, pages = {385--398}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10703163\_26}, doi = {10.1007/10703163\_26}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/NarendranRV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/BerregebBR98, author = {Narjes Berregeb and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, editor = {Egidio Astesiano}, title = {Observational Proofs with Critical Contexts}, booktitle = {Fundamental Approaches to Software Engineering, 1st Internationsl Conference, FASE'98, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1382}, pages = {38--53}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053582}, doi = {10.1007/BFB0053582}, timestamp = {Sat, 07 Sep 2019 11:59:24 +0200}, biburl = {https://dblp.org/rec/conf/fase/BerregebBR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/ComonNNR98, author = {Hubert Comon and Paliath Narendran and Robert Nieuwenhuis and Micha{\"{e}}l Rusinowitch}, title = {Decision Problems in Ordered Rewriting}, booktitle = {Thirteenth Annual {IEEE} Symposium on Logic in Computer Science, Indianapolis, Indiana, USA, June 21-24, 1998}, pages = {276--286}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/LICS.1998.705664}, doi = {10.1109/LICS.1998.705664}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/ComonNNR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/VermaRL98, author = {Rakesh M. Verma and Micha{\"{e}}l Rusinowitch and Denis Lugiez}, editor = {Tobias Nipkow}, title = {Algorithms and Reductions for Rewriting Problems}, booktitle = {Rewriting Techniques and Applications, 9th International Conference, RTA-98, Tsukuba, Japan, March 30 - April 1, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1379}, pages = {166--180}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0052369}, doi = {10.1007/BFB0052369}, timestamp = {Sat, 05 Sep 2020 18:07:52 +0200}, biburl = {https://dblp.org/rec/conf/rta/VermaRL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/KucherovR97, author = {Gregory Kucherov and Micha{\"{e}}l Rusinowitch}, title = {Matching a Set of Strings with Variable Length don't Cares}, journal = {Theor. Comput. Sci.}, volume = {178}, number = {1-2}, pages = {129--154}, year = {1997}, url = {https://doi.org/10.1016/S0304-3975(97)88195-9}, doi = {10.1016/S0304-3975(97)88195-9}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/KucherovR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/NarendranR96, author = {Paliath Narendran and Micha{\"{e}}l Rusinowitch}, title = {Any Ground Associative-Commutative Theory Has a Finite Canonical System}, journal = {J. Autom. Reason.}, volume = {17}, number = {1}, pages = {131--143}, year = {1996}, url = {https://doi.org/10.1007/BF00247671}, doi = {10.1007/BF00247671}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/NarendranR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/BerregebBR96, author = {Narjes Berregeb and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, editor = {Rajeev Alur and Thomas A. Henzinger}, title = {Automated Verification by Induction with Associative-Commutative Operators}, booktitle = {Computer Aided Verification, 8th International Conference, {CAV} '96, New Brunswick, NJ, USA, July 31 - August 3, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1102}, pages = {220--231}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61474-5\_71}, doi = {10.1007/3-540-61474-5\_71}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/BerregebBR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/BerregebBR96, author = {Narjes Berregeb and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, editor = {Harald Ganzinger}, title = {{SPIKE-AC:} {A} System for Proofs by Induction in Associative-Commutative Theories}, booktitle = {Rewriting Techniques and Applications, 7th International Conference, RTA-96, New Brunswick, NJ, USA, July 27-30, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1103}, pages = {428--431}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61464-8\_73}, doi = {10.1007/3-540-61464-8\_73}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/BerregebBR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/MonfroyRS96, author = {{\'{E}}ric Monfroy and Micha{\"{e}}l Rusinowitch and Ren{\'{e}} Schott}, editor = {K. M. George and Janice H. Carroll and Dave Oppenheim and Jim Hightower}, title = {Implementing non-linear constraints with cooperative solvers}, booktitle = {Proceedings of the 1996 {ACM} Symposium on Applied Computing, SAC'96, Philadelphia, PA, USA, February 17-19, 1996}, pages = {63--72}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/331119.331147}, doi = {10.1145/331119.331147}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/MonfroyRS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/RusinowitchV95, author = {Micha{\"{e}}l Rusinowitch and Laurent Vigneron}, title = {Automated deduction with associative-commutative operators}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {6}, pages = {23--56}, year = {1995}, url = {https://doi.org/10.1007/BF01270929}, doi = {10.1007/BF01270929}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/RusinowitchV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amai/KounalisR95, author = {Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, title = {Reasoning with Conditional Axioms}, journal = {Ann. Math. Artif. Intell.}, volume = {15}, number = {2}, pages = {125--149}, year = {1995}, url = {https://doi.org/10.1007/BF01534452}, doi = {10.1007/BF01534452}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amai/KounalisR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/KucherovR95, author = {Gregory Kucherov and Micha{\"{e}}l Rusinowitch}, title = {Undecidability of Ground Reducibility for Word Rewriting Systems with Variables}, journal = {Inf. Process. Lett.}, volume = {53}, number = {4}, pages = {209--215}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(94)00188-5}, doi = {10.1016/0020-0190(94)00188-5}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/KucherovR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/BouhoulaR95, author = {Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, title = {Implicit Induction in Conditional Theories}, journal = {J. Autom. Reason.}, volume = {14}, number = {2}, pages = {189--235}, year = {1995}, url = {https://doi.org/10.1007/BF00881856}, doi = {10.1007/BF00881856}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/BouhoulaR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/BouhoulaKR95, author = {Adel Bouhoula and Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, title = {Automated Mathematical Induction}, journal = {J. Log. Comput.}, volume = {5}, number = {5}, pages = {631--668}, year = {1995}, url = {https://doi.org/10.1093/logcom/5.5.631}, doi = {10.1093/LOGCOM/5.5.631}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/BouhoulaKR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/BouhoulaR95, author = {Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, editor = {Vangalur S. Alagar and Maurice Nivat}, title = {{SPIKE:} {A} System for Automatic Inductive Proofs}, booktitle = {Algebraic Methodology and Software Technology, 4th International Conference, {AMAST} '95, Montreal, Canada, July 3-7, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {936}, pages = {576--577}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60043-4\_79}, doi = {10.1007/3-540-60043-4\_79}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/amast/BouhoulaR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpm/KucherovR95, author = {Gregory Kucherov and Micha{\"{e}}l Rusinowitch}, editor = {Zvi Galil and Esko Ukkonen}, title = {Matching a Set of Strings with Variable Length Don't Cares}, booktitle = {Combinatorial Pattern Matching, 6th Annual Symposium, {CPM} 95, Espoo, Finland, July 5-7, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {937}, pages = {230--247}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60044-2\_46}, doi = {10.1007/3-540-60044-2\_46}, timestamp = {Thu, 29 Aug 2019 15:20:22 +0200}, biburl = {https://dblp.org/rec/conf/cpm/KucherovR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrs/KucherovR94, author = {Gregory Kucherov and Micha{\"{e}}l Rusinowitch}, editor = {Nachum Dershowitz and Naomi Lindenstrauss}, title = {The Complexity of Testing Ground Reducibility for Linear Word Rewriting Systems with Variables}, booktitle = {Conditional and Typed Rewriting Systems, 4th International Workshop, CTRS-94, Jerusalem, Israel, July 13-15, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {968}, pages = {262--275}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60381-6\_16}, doi = {10.1007/3-540-60381-6\_16}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrs/KucherovR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KucherovR94, author = {Gregory Kucherov and Micha{\"{e}}l Rusinowitch}, editor = {Hal Berghel and Terry Hlengl and Joseph E. Urban}, title = {On ground reducibility problem for word rewriting systems with variables}, booktitle = {Proceedings of the 1994 {ACM} Symposium on Applied Computing, SAC'94, Phoenix, AZ, USA, March 6-8, 1994}, pages = {271--276}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/326619.326745}, doi = {10.1145/326619.326745}, timestamp = {Tue, 06 Nov 2018 11:06:48 +0100}, biburl = {https://dblp.org/rec/conf/sac/KucherovR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijait/KounalisR93, author = {Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, title = {A Logical Framework for Concept Learning with Background Knowledge}, journal = {Int. J. Artif. Intell. Tools}, volume = {2}, number = {3}, pages = {329--348}, year = {1993}, url = {https://doi.org/10.1142/S0218213093000175}, doi = {10.1142/S0218213093000175}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijait/KounalisR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/AyebMR93, author = {B{\'{e}}chir el Ayeb and Pierre Marquis and Micha{\"{e}}l Rusinowitch}, title = {Preferring diagnoses by abduction}, journal = {{IEEE} Trans. Syst. Man Cybern.}, volume = {23}, number = {3}, pages = {792--808}, year = {1993}, url = {https://doi.org/10.1109/21.256550}, doi = {10.1109/21.256550}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/AyebMR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/BouhoulaR93, author = {Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, editor = {Ruzena Bajcsy}, title = {Automatic Case Analysis in Proof by Induction}, booktitle = {Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chamb{\'{e}}ry, France, August 28 - September 3, 1993}, pages = {88--94}, publisher = {Morgan Kaufmann}, year = {1993}, url = {http://ijcai.org/Proceedings/93-1/Papers/013.pdf}, timestamp = {Tue, 20 Aug 2019 16:18:33 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/BouhoulaR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/NarendranR93, author = {Paliath Narendran and Micha{\"{e}}l Rusinowitch}, title = {The Unifiability Problem in Ground {AC} Theories}, booktitle = {Proceedings of the Eighth Annual Symposium on Logic in Computer Science {(LICS} '93), Montreal, Canada, June 19-23, 1993}, pages = {364--370}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/LICS.1993.287572}, doi = {10.1109/LICS.1993.287572}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/NarendranR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrs/1992, editor = {Micha{\"{e}}l Rusinowitch and Jean{-}Luc R{\'{e}}my}, title = {Conditional Term Rewriting Systems, Third International Workshop, CTRS-92, Pont-{\`{a}}-Mousson, France, July 8-10, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {656}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-56393-8}, doi = {10.1007/3-540-56393-8}, isbn = {3-540-56393-8}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrs/1992.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/HsiangKLR92, author = {Jieh Hsiang and H{\'{e}}l{\`{e}}ne Kirchner and Pierre Lescanne and Micha{\"{e}}l Rusinowitch}, title = {The Term Rewriting Approach to Automated Theorem Proving}, journal = {J. Log. Program.}, volume = {14}, number = {1{\&}2}, pages = {71--99}, year = {1992}, url = {https://doi.org/10.1016/0743-1066(92)90047-7}, doi = {10.1016/0743-1066(92)90047-7}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/HsiangKLR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/BouhoulaKR92, author = {Adel Bouhoula and Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, editor = {Andrei Voronkov}, title = {SPIKE, an Automatic Theorem Prover}, booktitle = {Logic Programming and Automated Reasoning,International Conference LPAR'92, St. Petersburg, Russia, July 15-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {624}, pages = {460--462}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0013087}, doi = {10.1007/BFB0013087}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/lpar/BouhoulaKR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/HsiangR91, author = {Jieh Hsiang and Micha{\"{e}}l Rusinowitch}, title = {Proving Refutational Completeness of Theorem-Proving Strategies: The Transfinite Semantic Tree Method}, journal = {J. {ACM}}, volume = {38}, number = {3}, pages = {559--587}, year = {1991}, url = {https://doi.org/10.1145/116825.116833}, doi = {10.1145/116825.116833}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/HsiangR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/Rusinowitch91, author = {Micha{\"{e}}l Rusinowitch}, title = {Theorem-Proving with Resolution and Superposition}, journal = {J. Symb. Comput.}, volume = {11}, number = {1/2}, pages = {21--49}, year = {1991}, url = {https://doi.org/10.1016/S0747-7171(08)80131-9}, doi = {10.1016/S0747-7171(08)80131-9}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/Rusinowitch91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/KounalisR91, author = {Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, title = {On Word Problems in Horn Theories}, journal = {J. Symb. Comput.}, volume = {11}, number = {1/2}, pages = {113--127}, year = {1991}, url = {https://doi.org/10.1016/S0747-7171(08)80134-4}, doi = {10.1016/S0747-7171(08)80134-4}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/KounalisR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/KounalisR91, author = {Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, editor = {Maurice Nivat and Charles Rattray and Teodor Rus and Giuseppe Scollo}, title = {Studies on the Ground Convergence Property of Conditional Theories}, booktitle = {Algebraic Methodology and Software Technology {(AMAST} '91), Proceedings of the Second International Conference on Methodology and Software Technology, Iowa City, USA, 22-25 May 1991}, series = {Workshops in Computing}, pages = {363--376}, publisher = {Springer}, year = {1991}, timestamp = {Tue, 18 Feb 2003 11:01:41 +0100}, biburl = {https://dblp.org/rec/conf/amast/KounalisR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fair/RusinowitchV91, author = {Micha{\"{e}}l Rusinowitch and Laurent Vigneron}, editor = {Philippe Jorrand and Jozef Kelemen}, title = {Automated deduction with associative commutative operators}, booktitle = {Fundamentals of Artificial Intelligence Research, International Workshop {FAIR} '91, Smolenice, Czechoslovakia, September 8-13, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {535}, pages = {185--199}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54507-7\_15}, doi = {10.1007/3-540-54507-7\_15}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/fair/RusinowitchV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fct/KounalisR91, author = {Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, editor = {Lothar Budach}, title = {Automatic Proof Methods for Algebraic Specifications}, booktitle = {Fundamentals of Computation Theory, 8th International Symposium, {FCT} '91, Gosen, Germany, September 9-13, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {529}, pages = {307--317}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54458-5\_75}, doi = {10.1007/3-540-54458-5\_75}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fct/KounalisR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/NarendranR91, author = {Paliath Narendran and Micha{\"{e}}l Rusinowitch}, editor = {Ronald V. Book}, title = {Any Gound Associative-Commutative Theory Has a Finite Canonical System}, booktitle = {Rewriting Techniques and Applications, 4th International Conference, RTA-91, Como, Italy, April 10-12, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {488}, pages = {423--434}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-53904-2\_115}, doi = {10.1007/3-540-53904-2\_115}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/NarendranR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eatcs/KounalisR90, author = {Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, title = {Mechanizing inductive reasoning}, journal = {Bull. {EATCS}}, volume = {41}, pages = {216--226}, year = {1990}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eatcs/KounalisR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/KounalisR90, author = {Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, editor = {Howard E. Shrobe and Thomas G. Dietterich and William R. Swartout}, title = {Mechanizing Inductive Reasoning}, booktitle = {Proceedings of the 8th National Conference on Artificial Intelligence. Boston, Massachusetts, USA, July 29 - August 3, 1990, 2 Volumes}, pages = {240--245}, publisher = {{AAAI} Press / The {MIT} Press}, year = {1990}, url = {http://www.aaai.org/Library/AAAI/1990/aaai90-037.php}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/KounalisR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrs/KounalisR90, author = {Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, editor = {St{\'{e}}phane Kaplan and Mitsuhiro Okada}, title = {A Proof System for Conditional Algebraic Specifications}, booktitle = {Conditional and Typed Rewriting Systems, 2nd International {CTRS} Workshop, Montreal, Canada, June 11-14, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {516}, pages = {51--63}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-54317-1\_80}, doi = {10.1007/3-540-54317-1\_80}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ctrs/KounalisR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/AyebMR90, author = {B{\'{e}}chir el Ayeb and Pierre Marquis and Micha{\"{e}}l Rusinowitch}, title = {Deductive/Abductvie Diagnosis: The DA-Principles}, booktitle = {9th European Conference on Artificial Intelligence, {ECAI} 1990, Stockholm, Sweden, 1990}, pages = {47--52}, year = {1990}, timestamp = {Tue, 30 Jul 2019 13:42:21 +0200}, biburl = {https://dblp.org/rec/conf/ecai/AyebMR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ese/AyebMR90, author = {B{\'{e}}chir el Ayeb and Pierre Marquis and Micha{\"{e}}l Rusinowitch}, editor = {Georg Gottlob and Wolfgang Nejdl}, title = {A New Diagnosis Approach by Deduction and Abduction}, booktitle = {Expert Systems in Engineering, Principles and Applications, International Workshop, Vienna, Austria, September 24-26, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {462}, pages = {32--46}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-53104-1\_29}, doi = {10.1007/3-540-53104-1\_29}, timestamp = {Sat, 09 Apr 2022 12:45:45 +0200}, biburl = {https://dblp.org/rec/conf/ese/AyebMR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/KounalisR88, author = {Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, editor = {Ewing L. Lusk and Ross A. Overbeek}, title = {On Word Problems in Horn Theories}, booktitle = {9th International Conference on Automated Deduction, Argonne, Illinois, USA, May 23-26, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {310}, pages = {527--537}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/BFb0012854}, doi = {10.1007/BFB0012854}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/KounalisR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcs/Rusinowitch88, author = {Micha{\"{e}}l Rusinowitch}, title = {Theorem-Proving with Resolution and Superposition: An Extension of the Knuth and Bendic Procedure to a Complete Set of Inference Rules}, booktitle = {Proceedings of the International Conference on Fifth Generation Computer Systems, {FGCS} 1988, Tokyo, Japan, November 28-December 2, 1988}, pages = {524--531}, publisher = {{OHMSHA} Ltd. Tokyo and Springer-Verlag}, year = {1988}, timestamp = {Mon, 05 Aug 2019 17:00:40 +0200}, biburl = {https://dblp.org/rec/conf/fgcs/Rusinowitch88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Rusinowitch87, author = {Micha{\"{e}}l Rusinowitch}, title = {On Termination of the Direct Sum of Term-Rewriting Systems}, journal = {Inf. Process. Lett.}, volume = {26}, number = {2}, pages = {65--70}, year = {1987}, url = {https://doi.org/10.1016/0020-0190(87)90039-1}, doi = {10.1016/0020-0190(87)90039-1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Rusinowitch87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/Rusinowitch87, author = {Micha{\"{e}}l Rusinowitch}, title = {Path of Subterms Ordering and Recursive Decomposition Ordering Revisited}, journal = {J. Symb. Comput.}, volume = {3}, number = {1/2}, pages = {117--131}, year = {1987}, url = {https://doi.org/10.1016/S0747-7171(87)80023-8}, doi = {10.1016/S0747-7171(87)80023-8}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/Rusinowitch87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrs/KounalisR87, author = {Emmanuel Kounalis and Micha{\"{e}}l Rusinowitch}, editor = {St{\'{e}}phane Kaplan and Jean{-}Pierre Jouannaud}, title = {On Word Problems in Horn Theories}, booktitle = {Conditional Term Rewriting Systems, 1st International Workshop, Orsay, France, July 8-10, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {308}, pages = {144--160}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-19242-5\_12}, doi = {10.1007/3-540-19242-5\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ctrs/KounalisR87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HsiangR87, author = {Jieh Hsiang and Micha{\"{e}}l Rusinowitch}, editor = {Thomas Ottmann}, title = {On Word Problems in Equational Theories}, booktitle = {Automata, Languages and Programming, 14th International Colloquium, ICALP87, Karlsruhe, Germany, July 13-17, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {267}, pages = {54--71}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-18088-5\_6}, doi = {10.1007/3-540-18088-5\_6}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/HsiangR87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/HsiangRS87, author = {Jieh Hsiang and Micha{\"{e}}l Rusinowitch and K{\^{o}} Sakai}, editor = {John P. McDermott}, title = {Complete Inference Rules for the Cancellation Laws}, booktitle = {Proceedings of the 10th International Joint Conference on Artificial Intelligence. Milan, Italy, August 23-28, 1987}, pages = {990--992}, publisher = {Morgan Kaufmann}, year = {1987}, url = {http://ijcai.org/Proceedings/87-2/Papers/086.pdf}, timestamp = {Tue, 20 Aug 2019 16:17:29 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/HsiangRS87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/HsiangR86, author = {Jieh Hsiang and Micha{\"{e}}l Rusinowitch}, editor = {J{\"{o}}rg H. Siekmann}, title = {A New Method for Establishing Refutational Completeness in Theorem Proving}, booktitle = {8th International Conference on Automated Deduction, Oxford, England, July 27 - August 1, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {230}, pages = {141--152}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-16780-3\_86}, doi = {10.1007/3-540-16780-3\_86}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/HsiangR86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/Rusinowitch85, author = {Micha{\"{e}}l Rusinowitch}, editor = {Jean{-}Pierre Jouannaud}, title = {Path of Subterms Ordering and Recursive Decomposition Ordering Revisited}, booktitle = {Rewriting Techniques and Applications, First International Conference, RTA-85, Dijon, France, May 20-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {202}, pages = {225--240}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-15976-2\_10}, doi = {10.1007/3-540-15976-2\_10}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/Rusinowitch85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.