|
Search the dblp DataBase
Mohamed Mejri:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mourad Debbabi, Y. Legaré, Mohamed Mejri
An Environment for the Specification and Analysis of Cryptoprotocols. [Citation Graph (0, 0)][DBLP] ACSAC, 1998, pp:321-332 [Conf]
- Kamel Adi, Mourad Debbabi, Mohamed Mejri
A New Logic for Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP] AMAST, 2000, pp:499-513 [Conf]
- Mahjoub Langar, Mohamed Mejri
Formal and Efficient Enforcement of Security Policies. [Citation Graph (0, 0)][DBLP] FCS, 2005, pp:143-149 [Conf]
- Mohamed Mejri
Chaotic Protocols. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:938-948 [Conf]
- Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
Formal Automatic Verification of Authentication Crytographic Protocols. [Citation Graph (0, 0)][DBLP] ICFEM, 1997, pp:50-59 [Conf]
- Mathieu Couture, Béchir Ktari, Mohamed Mejri, Frédéric Massicotte
A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. [Citation Graph (0, 0)][DBLP] PST, 2004, pp:175-179 [Conf]
- Alexandre Lacasse, Mohamed Mejri, Béchir Ktari
Formal Implementation of Network Security Policies. [Citation Graph (0, 0)][DBLP] PST, 2004, pp:161-166 [Conf]
- Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. [Citation Graph (0, 0)][DBLP] WETICE, 1997, pp:256-262 [Conf]
- Hamido Fujita, Béchir Ktari, Mohamed Mejri
Implementing Lyee-Calculus in Java. [Citation Graph (0, 0)][DBLP] Knowl.-Based Syst., 2006, v:19, n:2, pp:116-129 [Journal]
- Hamido Fujita, Mohamed Mejri, Béchir Ktari
A process algebra to formalize the Lyee methodology. [Citation Graph (0, 0)][DBLP] Knowl.-Based Syst., 2004, v:17, n:5-6, pp:263-281 [Journal]
- Mohamed Mbarki, Mohamed Mejri, Béchir Ktari
Converting an imperative program to a declarative one. [Citation Graph (0, 0)][DBLP] Knowl.-Based Syst., 2006, v:19, n:2, pp:130-140 [Journal]
- Mohamed Mejri, Béchir Ktari, Hamido Fujita, M. M. Erhioui
Static analysis of Lyee requirements. [Citation Graph (0, 0)][DBLP] Knowl.-Based Syst., 2003, v:16, n:7-8, pp:361-382 [Journal]
- Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell
Security by typing. [Citation Graph (0, 0)][DBLP] STTT, 2003, v:4, n:4, pp:472-495 [Journal]
- Kamel Adi, Mourad Debbabi, Mohamed Mejri
A new logic for electronic commerce protocols. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:291, n:3, pp:223-283 [Journal]
Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. [Citation Graph (, )][DBLP]
A Formal Approach for Security Policy Enforcement in Concurrent Programs. [Citation Graph (, )][DBLP]
Using Edit Automata for Rewriting-Based Security Enforcement. [Citation Graph (, )][DBLP]
Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study. [Citation Graph (, )][DBLP]
Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy. [Citation Graph (, )][DBLP]
Practical and Universal Interpretation Functions for Secrecy. [Citation Graph (, )][DBLP]
Formal Specification and Analysis of Firewalls. [Citation Graph (, )][DBLP]
Enforcing Security Policies Using Algebraic Approach. [Citation Graph (, )][DBLP]
A Decision Procedure for Structured Cryptographic Protocols. [Citation Graph (, )][DBLP]
A Formal Translation From an Imperative Language With Array to a Declarative Language. [Citation Graph (, )][DBLP]
Enforcing Security Policies on Programs. [Citation Graph (, )][DBLP]
LyeeBuilder. [Citation Graph (, )][DBLP]
Automatic Enforcement of Security in Computer Networks. [Citation Graph (, )][DBLP]
Search in 0.019secs, Finished in 0.020secs
|