


Остановите войну!
for scientists:


default search action
Michaël Rusinowitch
Person information

- affiliation: INRIA, France
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c123]Wafik Zahwa, Abdelkader Lahmadi, Michaël Rusinowitch, Mondher Ayadi:
Automated Placement of In-Network ACL Rules. NetSoft 2023: 486-491 - 2022
- [c122]Kamalkumar Macwan, Abdessamad Imine, Michaël Rusinowitch:
Differentially Private Friends Recommendation. FPS 2022: 236-251 - [c121]Ahmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula, Mondher Ayadi:
Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks. NOMS 2022: 1-9 - [c120]Kamalkumar Macwan, Abdessamad Imine, Michaël Rusinowitch:
Privacy Preserving Recommendations for Social Networks. SNAMS 2022: 1-8 - [c119]Yannick Chevalier, Michaël Rusinowitch:
Deciding Whether two Codes Have the Same Ambiguities is in co-NP. SYNASC 2022: 84-91 - 2021
- [c118]Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine, Michaël Rusinowitch:
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks. DBSec 2021: 338-354 - [c117]Noreddine Belhadj Cheikh, Abdessamad Imine, Michaël Rusinowitch:
FOX: Fooling with Explanations : Privacy Protection with Adversarial Reactions in Social Media. PST 2021: 1-10 - [c116]Yannick Chevalier, Michaël Rusinowitch:
Implementing Security Protocol Monitors. SCSS 2021: 22-34 - 2020
- [c115]Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine, Michaël Rusinowitch:
Your Age Revealed by Facebook Picture Metadata. ADBIS/TPDL/EDA Workshops 2020: 259-270 - [c114]Ahmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula:
R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks. CNSM 2020: 1-4 - [c113]Bizhan Alipour Pijani, Abdessamad Imine, Michaël Rusinowitch:
Online Attacks on Picture Owner Privacy. DEXA (2) 2020: 33-47 - [c112]Ahmad Abboud, Abdelkader Lahmadi, Michaël Rusinowitch, Miguel Couceiro, Adel Bouhoula, Mondher Avadi:
Double Mask: An Efficient Rule Encoding for Software Defined Networking. ICIN 2020: 186-193 - [c111]Ahmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula:
Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks. NCA 2020: 1-10 - [c110]Bizhan Alipour Pijani, Abdessamad Imine, Michaël Rusinowitch:
You are what emojis say about your pictures: language-independent gender inference attack on Facebook. SAC 2020: 1826-1834
2010 – 2019
- 2019
- [j53]Florent Jacquemard, Michaël Rusinowitch:
One-variable context-free hedge automata. J. Comput. Syst. Sci. 104: 278-296 (2019) - [c109]Siva Anantharaman, Peter Hibbs, Paliath Narendran, Michaël Rusinowitch:
Unification Modulo Lists with Reverse Relation with Certain Word Equations. CADE 2019: 1-17 - [c108]Ahmad Abboud, Abdelkader Lahmadi, Michaël Rusinowitch, Miguel Couceiro, Adel Bouhoula:
Poster : Minimizing range rules for packet filtering using a double mask representation. Networking 2019: 1-2 - [c107]Bizhan Alipour, Abdessamad Imine, Michaël Rusinowitch:
Gender Inference for Facebook Picture Owners. TrustBus 2019: 145-160 - 2018
- [c106]Younes Abid, Abdessamad Imine, Michaël Rusinowitch:
Online Testing of User Profile Resilience Against Inference Attacks in Social Networks. ADBIS (Short Papers and Workshops) 2018: 105-117 - [c105]Younes Abid, Abdessamad Imine, Michaël Rusinowitch:
Sensitive Attribute Prediction for Social Networks Users. EDBT/ICDT Workshops 2018: 28-35 - 2017
- [j52]Tigran Avanesov, Yannick Chevalier
, Michaël Rusinowitch, Mathieu Turuani:
Intruder deducibility constraints with negation. Decidability and application to secured service compositions. J. Symb. Comput. 80: 4-26 (2017) - [j51]Tigran Avanesov, Yannick Chevalier
, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of general intruder constraints with and without a set constructor. J. Symb. Comput. 80: 27-61 (2017) - [c104]Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Raïssi, Michaël Rusinowitch:
Two-Phase Preference Disclosure in Attributed Social Networks. DEXA (1) 2017: 249-263 - [e6]Mohamed Mosbah, Michaël Rusinowitch:
SCSS 2017, The 8th International Symposium on Symbolic Computation in Software Science 2017, April 6-9, 2017, Gammarth, Tunisia. EPiC Series in Computing 45, EasyChair 2017 [contents] - 2016
- [j50]Tarek Abbes
, Adel Bouhoula, Michaël Rusinowitch:
Detection of firewall configuration errors with updatable tree. Int. J. Inf. Sec. 15(3): 301-317 (2016) - [j49]Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
Network Structure Release under Differential Privacy. Trans. Data Priv. 9(3): 215-241 (2016) - [c103]Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Raïssi, Michaël Rusinowitch:
Online Link Disclosure Strategies for Social Networks. CRiSIS 2016: 153-168 - [c102]Pierre-Cyrille Héam, Frédéric Dadeau, Rafik Kheddam, Ghazi Maatoug, Michaël Rusinowitch:
A Model-Based Testing Approach for Security Protocols. CSE/EUC/DCABES 2016: 553-556 - [c101]Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Raïssi, Marc Rigolot, Michaël Rusinowitch:
Analyse d'activité et exposition de la vie privée sur les médias sociaux. EGC 2016: 545-546 - [c100]Mathieu Turuani, Thomas Voegtlin, Michaël Rusinowitch:
Automated Verification of Electrum Wallet. Financial Cryptography Workshops 2016: 27-42 - [c99]Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
Detecting Communities under Differential Privacy. WPES@CCS 2016: 83-93 - [e5]Rakesh M. Verma, Michaël Rusinowitch:
Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, IWSPA@CODASPY 2016, New Orleans, LA, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4077-9 [contents] - [i14]Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
Detecting Communities under Differential Privacy. CoRR abs/1607.02060 (2016) - [i13]Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
Private Link Exchange over Social Graphs. CoRR abs/1609.01616 (2016) - 2015
- [j48]Walid Belkhir, Yannick Chevalier
, Michaël Rusinowitch:
Parametrized automata simulation and application to service composition. J. Symb. Comput. 69: 40-60 (2015) - [j47]Frédéric Dadeau, Pierre-Cyrille Héam, Rafik Kheddam, Ghazi Maatoug, Michaël Rusinowitch:
Model-based mutation testing from security protocols in HLPSL. Softw. Test. Verification Reliab. 25(5-7): 684-711 (2015) - [c98]Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
Differentially Private Publication of Social Graphs at Linear Cost. ASONAM 2015: 596-599 - [c97]Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
Anonymizing Social Graphs via Uncertainty Semantics. AsiaCCS 2015: 495-506 - [c96]Tushant Jha, Walid Belkhir, Yannick Chevalier
, Michaël Rusinowitch:
Expressive Equivalence and Succinctness of Parametrized Automata with Respect to Finite Memory Automata. ICSOC Workshops 2015: 145-156 - 2014
- [j46]Siva Anantharaman, Christopher Bouchard, Paliath Narendran, Michaël Rusinowitch:
Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining. Log. Methods Comput. Sci. 10(1) (2014) - [j45]Asma Cherif, Abdessamad Imine, Michaël Rusinowitch:
Practical access control management for distributed collaborative editors. Pervasive Mob. Comput. 15: 62-86 (2014) - [c95]Walid Belkhir, Gisela Rossi, Michaël Rusinowitch:
A Parametrized Propositional Dynamic Logic with Application to Service Synthesis. Advances in Modal Logic 2014: 34-53 - [c94]Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
Enforcing Privacy in Decentralized Mobile Social Networks. ESSoS Doctoral Symposium 2014 - [c93]Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
A Maximum Variance Approach for Graph Anonymization. FPS 2014: 49-64 - [c92]Walid Belkhir, Yannick Chevalier
, Michaël Rusinowitch:
An EXPTIME Algorithm for Data-Aware Service Simulation Using Parametrized Automata. ICSOC Workshops 2014: 295-307 - [i12]Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
Anonymizing Social Graphs via Uncertainty Semantics. CoRR abs/1408.1209 (2014) - 2013
- [c91]Houari Mahfoud, Abdessamad Imine, Michaël Rusinowitch:
SVMAX: a system for secure and valid manipulation of XML data. IDEAS 2013: 154-161 - [c90]Florent Jacquemard, Michaël Rusinowitch:
Rewrite Closure and CF Hedge Automata. LATA 2013: 371-382 - [c89]Walid Belkhir, Yannick Chevalier
, Michaël Rusinowitch:
Fresh-Variable Automata: Application to Service Composition. SYNASC 2013: 153-160 - [i11]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Fresh-Variable Automata for Service Composition. CoRR abs/1302.4205 (2013) - [i10]Walid Belkhir, Yannick Chevalier, Michaël Rusinowitch:
Guarded Variable Automata over Infinite Alphabets. CoRR abs/1304.6297 (2013) - [i9]Abdessamad Imine, Michaël Rusinowitch:
Secure Collaboration for Smartphones. ERCIM News 2013(93) (2013) - 2012
- [j44]Siva Anantharaman, Hai Lin, Christopher Lynch
, Paliath Narendran, Michaël Rusinowitch:
Unification Modulo Homomorphic Encryption. J. Autom. Reason. 48(2): 135-158 (2012) - [j43]Yannick Chevalier
, Michaël Rusinowitch:
Decidability of Equivalence of Symbolic Derivations. J. Autom. Reason. 48(2): 263-292 (2012) - [c88]Siva Anantharaman, Serdar Erbatur, Christopher Lynch
, Paliath Narendran, Michaël Rusinowitch:
Unification Modulo Synchronous Distributivity. IJCAR 2012: 14-29 - [c87]Siva Anantharaman, Christopher Bouchard, Paliath Narendran, Michaël Rusinowitch:
Unification Modulo Chaining. LATA 2012: 70-82 - [c86]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Towards the Orchestration of Secured Services under Non-disclosure Policies. MMM-ACNS 2012: 130-145 - [c85]Alessandro Armando
, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone
, Yannick Chevalier
, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea, Sebastian Mödersheim
, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - [c84]Hatem Ghabri, Ghazi Maatoug, Michaël Rusinowitch:
Compiling symbolic attacks to protocol implementation tests. SCSS 2012: 39-49 - [i8]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Intruder deducibility constraints with negation. Decidability and application to secured service compositions. CoRR abs/1207.4871 (2012) - [i7]Florent Jacquemard, Michaël Rusinowitch:
Rewrite Closure and CF Hedge Automata. CoRR abs/1212.5108 (2012) - 2011
- [j42]Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch:
String Rewriting and Security Analysis: An Extension of a Result of Book and Otto. J. Autom. Lang. Comb. 16(2-4): 75-90 (2011) - [c83]Tigran Avanesov, Yannick Chevalier
, Mohammed Anis Mekki, Michaël Rusinowitch:
Web Services Verification and Prudent Implementation. DPM/SETOP 2011: 173-189 - [c82]Tigran Avanesov, Yannick Chevalier
, Mohammed Anis Mekki, Michaël Rusinowitch, Mathieu Turuani:
Distributed Orchestration of Web Services under Security Constraints. DPM/SETOP 2011: 235-252 - [c81]Jagdish Prasad Achara, Abdessamad Imine, Michaël Rusinowitch:
DeSCal - Decentralized Shared Calendar for P2P and Ad-Hoc Networks. ISPDC 2011: 223-231 - [c80]Asma Cherif, Abdessamad Imine, Michaël Rusinowitch:
Optimistic access control for distributed collaborative editors. SAC 2011: 861-868 - [p1]Michaël Rusinowitch, Mathieu Turuani:
Verifying a bounded number of sessions and its complexity. Formal Models and Techniques for Analyzing Security Protocols 2011: 13-34 - [i6]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of General Intruder Constraints with and without a Set Constructor. CoRR abs/1103.0220 (2011) - 2010
- [j41]Enrica Nicolini, Christophe Ringeissen, Michaël Rusinowitch:
Combining Satisfiability Procedures for Unions of Theories with a Shared Counting Operator. Fundam. Informaticae 105(1-2): 163-187 (2010) - [j40]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
Efficient decision tree for protocol analysis in intrusion detection. Int. J. Secur. Networks 5(4): 220-235 (2010) - [j39]Yannick Chevalier
, Michaël Rusinowitch:
Compiling and securing cryptographic protocols. Inf. Process. Lett. 110(3): 116-122 (2010) - [j38]Yannick Chevalier
, Michaël Rusinowitch:
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures. Theor. Comput. Sci. 411(10): 1261-1282 (2010) - [c79]Siva Anantharaman, Hai Lin, Christopher Lynch
, Paliath Narendran, Michaël Rusinowitch:
Cap unification: application to protocol security modulo homomorphic encryption. AsiaCCS 2010: 192-203 - [c78]Tigran Avanesov, Yannick Chevalier
, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of general intruder constraints with a set constructor. CRiSIS 2010: 1-8 - [c77]Yannick Chevalier
, Mohammed Anis Mekki, Michaël Rusinowitch:
Orchestration under Security Constraints. FMCO 2010: 23-44 - [c76]Florent Jacquemard, Michaël Rusinowitch:
Rewrite-based verification of XML updates. PPDP 2010: 119-130 - [c75]Zeeshan Ahmed, Abdessamad Imine, Michaël Rusinowitch:
Safe and Efficient Strategies for Updating Firewall Policies. TrustBus 2010: 45-57
2000 – 2009
- 2009
- [c74]Enrica Nicolini, Christophe Ringeissen, Michaël Rusinowitch:
Combinable Extensions of Abelian Groups. CADE 2009: 51-66 - [c73]Najah Chridi, Mathieu Turuani, Michaël Rusinowitch:
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists. CSF 2009: 277-289 - [c72]Siva Anantharaman, Hai Lin, Christopher Lynch
, Paliath Narendran, Michaël Rusinowitch:
Unification Modulo Homomorphic Encryption. FroCoS 2009: 100-116 - [c71]Enrica Nicolini, Christophe Ringeissen, Michaël Rusinowitch:
Data Structures with Arithmetic Constraints: A Non-disjoint Combination. FroCoS 2009: 319-334 - [c70]Abdessamad Imine, Asma Cherif, Michaël Rusinowitch:
A Flexible Access Control Model for Distributed Collaborative Editors. Secure Data Management 2009: 89-106 - [c69]Enrica Nicolini, Christophe Ringeissen, Michaël Rusinowitch:
Satisfiability Procedures for Combination of Theories Sharing Integer Offsets. TACAS 2009: 428-442 - [i5]Florent Jacquemard, Michaël Rusinowitch:
Rewrite based Verification of XML Updates. CoRR abs/0907.5125 (2009) - [i4]Yannick Chevalier, Michaël Rusinowitch:
Compiling and securing cryptographic protocols. CoRR abs/0910.5099 (2009) - 2008
- [j37]Yannick Chevalier
, Michaël Rusinowitch:
Hierarchical combination of intruder theories. Inf. Comput. 206(2-4): 352-377 (2008) - [j36]Florent Jacquemard, Michaël Rusinowitch, Laurent Vigneron:
Tree automata with equality constraints modulo equational theories. J. Log. Algebraic Methods Program. 75(2): 182-208 (2008) - [j35]Yannick Chevalier
, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ACM Trans. Comput. Log. 9(4): 24:1-24:52 (2008) - [c68]Humberto J. Abdelnur, Tigran Avanesov, Michaël Rusinowitch, Radu State:
Abusing SIP Authentication. IAS 2008: 237-242 - [c67]Florent Jacquemard, Michaël Rusinowitch:
Closure of Hedge-Automata Languages by Hedge Rewriting. RTA 2008: 157-171 - [c66]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
An inference system for detecting firewall filtering rules anomalies. SAC 2008: 2122-2128 - [c65]Yannick Chevalier
, Mohammed Anis Mekki, Michaël Rusinowitch:
Automatic Composition of Services with Security Policies. SERVICES I 2008: 529-537 - [c64]Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch:
Unification modulo Homomorphic Encryption is Decidable. UNIF 2008: 1-15 - [e4]Anca Muscholl, Ramaswamy Ramanujam, Michaël Rusinowitch, Thomas Schwentick, Victor Vianu:
Beyond the Finite: New Challenges in Verification and Semistructured Data, 20.04. - 25.04.2008. Dagstuhl Seminar Proceedings 08171, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2008 [contents] - [i3]Anca Muscholl, Ramaswamy Ramanujam, Michaël Rusinowitch, Thomas Schwentick, Victor Vianu:
08171 Abstracts Collection - Beyond the Finite: New Challenges in Verification and Semistructured Data. Beyond the Finite: New Challenges in Verification and Semistructured Data 2008 - [i2]Anca Muscholl, Ramaswamy Ramanujam, Michaël Rusinowitch, Thomas Schwentick, Victor Vianu:
08171 Summary - Beyond the Finite: New Challenges in Verification and Semistructured Data. Beyond the Finite: New Challenges in Verification and Semistructured Data 2008 - 2007
- [j34]Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu:
Relating two standard notions of secrecy. Log. Methods Comput. Sci. 3(3) (2007) - [c63]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
A Traffic Classification Algorithm for Intrusion Detection. AINA Workshops (1) 2007: 188-193 - [c62]Abdessamad Imine, Michaël Rusinowitch:
Applying a Theorem Prover to the Verification of Optimistic Replication Algorithms. Rewriting, Computation and Proof 2007: 213-234 - [c61]Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch:
Towards an Automatic Analysis of Web Service Security. FroCoS 2007: 133-147 - [c60]Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch:
Verifying Cryptographic Protocols with Subterms Constraints. LPAR 2007: 181-195 - [c59]Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch:
Intruders with Caps. RTA 2007: 20-35 - [i1]Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu:
Relating two standard notions of secrecy. CoRR abs/0706.0502 (2007) - 2006
- [j33]Siva Anantharaman, Paul Gastin, Gaétan Hains, John Mullins, Michaël Rusinowitch:
Editorial. J. Autom. Lang. Comb. 11(1): 5-6 (2006) - [j32]Alessandro Armando
, David A. Basin, Jorge Cuéllar, Michaël Rusinowitch, Luca Viganò:
Automated Reasoning for Security Protocol Analysis. J. Autom. Reason. 36(1-2): 1-3 (2006) - [j31]Abdessamad Imine, Michaël Rusinowitch, Gérald Oster, Pascal Molli:
Formal design and verification of operational transformation algorithms for copies convergence. Theor. Comput. Sci. 351(2): 167-183 (2006) - [c58]Florent Jacquemard, Michaël Rusinowitch, Laurent Vigneron:
Tree Automata with Equality Constraints Modulo Equational Theories. IJCAR 2006: 557-571 - [c57]Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu:
Relating Two Standard Notions of Secrecy. CSL 2006: 303-318 - [c56]Eugen Zalinescu, Véronique Cortier, Michaël Rusinowitch:
Relating two standard notions of secrecy. Trustworthy Software 2006 - [c55]Yannick Chevalier, Michaël Rusinowitch:
Hierarchical Combination of Intruder Theories. RTA 2006: 108-122 - 2005
- [j30]Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch:
Closure properties and decision problems of dag automata. Inf. Process. Lett. 94(5): 231-240 (2005) - [j29]Yannick Chevalier
, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
An NP decision procedure for protocol insecurity with XOR. Theor. Comput. Sci. 338(1-3): 247-274 (2005) - [c54]Alessandro Armando, David A. Basin
, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko
, Jacopo Mantovani, Sebastian Mödersheim
, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 - [c53]Abdessamad Imine, Pascal Molli, Gérald Oster, Michaël Rusinowitch:
Towards Synchronizing Linear Collaborative Objects with Operational Transformation. FORTE 2005: 411-427 - [c52]Yannick Chevalier, Michaël Rusinowitch:
Combining Intruder Theories. ICALP 2005: 639-651 - [c51]Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu:
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. PPDP 2005: 12-22 - 2004
- [j28]Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
On the fly pattern matching for intrusion detection with Snort. Ann. des Télécommunications 59(9-10): 1045-1071 (2004) - [j27]Siva Anantharaman, Paliath Narendran, Michaël Rusinowitch:
Unification Modulo ACUI Plus Distributivity Axioms. J. Autom. Reason. 33(1): 1-28 (2004) - [j26]Georg Gottlob, Miki Hermann, Michaël Rusinowitch:
2nd International Workshop on Complexity in Automated Deduction (CiAD) - Foreword. Theory Comput. Syst. 37(6): 639-640 (2004) - [j25]