The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mathieu Turuani: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron
    The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. [Citation Graph (0, 0)][DBLP]
    CAV, 2005, pp:281-285 [Conf]
  2. Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron
    The AVISS Security Protocol Analysis Tool. [Citation Graph (0, 0)][DBLP]
    CAV, 2002, pp:349-353 [Conf]
  3. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:94-110 [Conf]
  4. Michaël Rusinowitch, Mathieu Turuani
    Protocol Insecurity with Finite Number of Sessions is NP-Complete. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:174-0 [Conf]
  5. Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron
    Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. [Citation Graph (0, 0)][DBLP]
    CSL, 2003, pp:128-141 [Conf]
  6. Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
    Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 2003, pp:124-135 [Conf]
  7. Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani
    Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:16-29 [Conf]
  8. François Laroussinie, Ph. Schnoebelen, Mathieu Turuani
    On the Expressivity and Complexity of Quantitative Branching-Time Temporal Logics. [Citation Graph (0, 0)][DBLP]
    LATIN, 2000, pp:437-446 [Conf]
  9. Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
    An NP Decision Procedure for Protocol Insecurity with XOR. [Citation Graph (0, 0)][DBLP]
    LICS, 2003, pp:261-270 [Conf]
  10. Mathieu Turuani
    The CL-Atse Protocol Analyser. [Citation Graph (0, 0)][DBLP]
    RTA, 2006, pp:277-286 [Conf]
  11. Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
    Deciding the Security of Protocols with Commuting Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:55-66 [Journal]
  12. Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
    Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal]
  13. Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
    An NP decision procedure for protocol insecurity with XOR. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:338, n:1-3, pp:247-274 [Journal]
  14. François Laroussinie, Ph. Schnoebelen, Mathieu Turuani
    On the expressivity and complexity of quantitative branching-time temporal logics. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:1, n:297, pp:297-315 [Journal]
  15. Michaël Rusinowitch, Mathieu Turuani
    Protocol insecurity with a finite number of sessions, composed keys is NP-complete. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:1, n:299, pp:451-475 [Journal]
  16. Max Tuengerthal, Ralf Küsters, Mathieu Turuani
    Implementing a Unification Algorithm for Protocol Analysis with XOR [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  17. Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists. [Citation Graph (, )][DBLP]


  18. Validating Integrity for the Ephemerizer's Protocol with CL-Atse. [Citation Graph (, )][DBLP]


Search in 0.018secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002