Michael Rusinowitch
Michael Rusinowitch
Dirección de correo verificada de
Citado por
Citado por
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
Protocol insecurity with finite number of sessions is NP-complete
M Rusinowitch, M Turuani
INRIA, 2001
An NP decision procedure for protocol insecurity with XOR
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Theoretical Computer Science 338 (1-3), 247-274, 2005
On word problems in equational theories
J Hsiang, M Rusinowitch
Automata, Languages and Programming: 14th International Colloquium Karlsruhe …, 1987
Deduction with symbolic constraints
C Kirchner, H Kirchner, M Rusinowitch
INRIA, 1990
Protocol insecurity with a finite number of sessions and composed keys is NP-complete
M Rusinowitch, M Turuani
Theoretical Computer Science 299 (1-3), 451-475, 2003
A rewriting approach to satisfiability procedures
A Armando, S Ranise, M Rusinowitch
Information and Computation 183 (2), 140-164, 2003
Proving refutational completeness of theorem-proving strategies: The transfinite semantic tree method
J Hsiang, M Rusinowitch
Journal of the ACM (JACM) 38 (3), 558-586, 1991
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
International Conference on Foundations of Software Technology and …, 2003
Compiling and verifying security protocols
F Jacquemard, M Rusinowitch, L Vigneron
International Conference on Logic for Programming Artificial Intelligence …, 2000
Implicit induction in conditional theories
A Bouhoula, M Rusinowitch
Journal of automated reasoning 14, 189-235, 1995
On termination of the direct sum of term-rewriting systems
M Rusinowitch
Information processing letters 26 (2), 65-70, 1987
Proving correctness of transformation functions in real-time groupware
A Imine, P Molli, G Oster, M Rusinowitch
ECSCW 2003: Proceedings of the Eighth European Conference on Computer …, 2003
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
Protocol analysis in intrusion detection using decision tree
T Abbes, A Bouhoula, M Rusinowitch
International Conference on Information Technology: Coding and Computing …, 2004
Automated mathematical induction
A Bouhoula, E Kounalis, M Rusinowitch
Journal of Logic and Computation 5 (5), 631-668, 1995
Theorem-proving with resolution and superposition
M Rusinowitch
Journal of Symbolic Computation 11 (1-2), 21-49, 1991
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002
Mechanizing inductive reasoning
E Kounalis, M Rusinowitch
Bulletin of the EATCS 41, 216-226, 1990
Formal design and verification of operational transformation algorithms for copies convergence
A Imine, M Rusinowitch, G Oster, P Molli
Theoretical Computer Science 351 (2), 167-183, 2006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20