The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mohamed Mejri: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mourad Debbabi, Y. Legaré, Mohamed Mejri
    An Environment for the Specification and Analysis of Cryptoprotocols. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:321-332 [Conf]
  2. Kamel Adi, Mourad Debbabi, Mohamed Mejri
    A New Logic for Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    AMAST, 2000, pp:499-513 [Conf]
  3. Mahjoub Langar, Mohamed Mejri
    Formal and Efficient Enforcement of Security Policies. [Citation Graph (0, 0)][DBLP]
    FCS, 2005, pp:143-149 [Conf]
  4. Mohamed Mejri
    Chaotic Protocols. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:938-948 [Conf]
  5. Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
    Formal Automatic Verification of Authentication Crytographic Protocols. [Citation Graph (0, 0)][DBLP]
    ICFEM, 1997, pp:50-59 [Conf]
  6. Mathieu Couture, Béchir Ktari, Mohamed Mejri, Frédéric Massicotte
    A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:175-179 [Conf]
  7. Alexandre Lacasse, Mohamed Mejri, Béchir Ktari
    Formal Implementation of Network Security Policies. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:161-166 [Conf]
  8. Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi
    From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. [Citation Graph (0, 0)][DBLP]
    WETICE, 1997, pp:256-262 [Conf]
  9. Hamido Fujita, Béchir Ktari, Mohamed Mejri
    Implementing Lyee-Calculus in Java. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2006, v:19, n:2, pp:116-129 [Journal]
  10. Hamido Fujita, Mohamed Mejri, Béchir Ktari
    A process algebra to formalize the Lyee methodology. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2004, v:17, n:5-6, pp:263-281 [Journal]
  11. Mohamed Mbarki, Mohamed Mejri, Béchir Ktari
    Converting an imperative program to a declarative one. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2006, v:19, n:2, pp:130-140 [Journal]
  12. Mohamed Mejri, Béchir Ktari, Hamido Fujita, M. M. Erhioui
    Static analysis of Lyee requirements. [Citation Graph (0, 0)][DBLP]
    Knowl.-Based Syst., 2003, v:16, n:7-8, pp:361-382 [Journal]
  13. Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell
    Security by typing. [Citation Graph (0, 0)][DBLP]
    STTT, 2003, v:4, n:4, pp:472-495 [Journal]
  14. Kamel Adi, Mourad Debbabi, Mohamed Mejri
    A new logic for electronic commerce protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:291, n:3, pp:223-283 [Journal]

  15. Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. [Citation Graph (, )][DBLP]


  16. A Formal Approach for Security Policy Enforcement in Concurrent Programs. [Citation Graph (, )][DBLP]


  17. Using Edit Automata for Rewriting-Based Security Enforcement. [Citation Graph (, )][DBLP]


  18. Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study. [Citation Graph (, )][DBLP]


  19. Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy. [Citation Graph (, )][DBLP]


  20. Practical and Universal Interpretation Functions for Secrecy. [Citation Graph (, )][DBLP]


  21. Formal Specification and Analysis of Firewalls. [Citation Graph (, )][DBLP]


  22. Enforcing Security Policies Using Algebraic Approach. [Citation Graph (, )][DBLP]


  23. A Decision Procedure for Structured Cryptographic Protocols. [Citation Graph (, )][DBLP]


  24. A Formal Translation From an Imperative Language With Array to a Declarative Language. [Citation Graph (, )][DBLP]


  25. Enforcing Security Policies on Programs. [Citation Graph (, )][DBLP]


  26. LyeeBuilder. [Citation Graph (, )][DBLP]


  27. Automatic Enforcement of Security in Computer Networks. [Citation Graph (, )][DBLP]


Search in 0.019secs, Finished in 0.020secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002