|
Search the dblp DataBase
Kamel Adi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- L. Hamza, K. Adi, Karim El Guemhioui
Automatic generation of attack scenarios for intrusion detection systems. [Citation Graph (0, 0)][DBLP] AICT/ICIW, 2006, pp:205- [Conf]
- Kamel Adi, Mourad Debbabi, Mohamed Mejri
A New Logic for Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP] AMAST, 2000, pp:499-513 [Conf]
- Didier Bert, Rachid Echahed, Kamel Adi
Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation. [Citation Graph (0, 0)][DBLP] AMAST, 1996, pp:629-632 [Conf]
- Kamel Adi, L. Pene
Secrecy Correctness for Security Protocols. [Citation Graph (0, 0)][DBLP] DFMA, 2005, pp:22-29 [Conf]
- Kamel Adi, Mourad Debbabi
Abstract interpretation for proving secrecy properties in security protocols. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2001, v:55, n:1, pp:- [Journal]
- Kamel Adi, Mourad Debbabi, Mohamed Mejri
A new logic for electronic commerce protocols. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:291, n:3, pp:223-283 [Journal]
Secrecy UML Method for Model Transformations. [Citation Graph (, )][DBLP]
A Formal Approach for Security Policy Enforcement in Concurrent Programs. [Citation Graph (, )][DBLP]
Using Edit Automata for Rewriting-Based Security Enforcement. [Citation Graph (, )][DBLP]
Temporalised Epistemic Logic for Reasoning about Agent-Based Systems. [Citation Graph (, )][DBLP]
Robust Key Management scheme for certification in mobile ad-hoc networks. [Citation Graph (, )][DBLP]
Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon. [Citation Graph (, )][DBLP]
Formal Specification and Analysis of Firewalls. [Citation Graph (, )][DBLP]
Formal Reasoning for Security Protocol Correctness. [Citation Graph (, )][DBLP]
Formal Technique for Discovering Complex Attacks in Computer Systems. [Citation Graph (, )][DBLP]
A Calculus for Distributed Firewall Specification and Verification. [Citation Graph (, )][DBLP]
Enforcing Security Policies on Programs. [Citation Graph (, )][DBLP]
Typing for Conflict Detection in Access Control Policies. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|