|
Search the dblp DataBase
Mathieu Turuani:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. [Citation Graph (0, 0)][DBLP] CAV, 2005, pp:281-285 [Conf]
- Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron
The AVISS Security Protocol Analysis Tool. [Citation Graph (0, 0)][DBLP] CAV, 2002, pp:349-353 [Conf]
- Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
Compositional Analysis of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2005, pp:94-110 [Conf]
- Michaël Rusinowitch, Mathieu Turuani
Protocol Insecurity with Finite Number of Sessions is NP-Complete. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:174-0 [Conf]
- Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. [Citation Graph (0, 0)][DBLP] CSL, 2003, pp:128-141 [Conf]
- Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. [Citation Graph (0, 0)][DBLP] FSTTCS, 2003, pp:124-135 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. [Citation Graph (0, 0)][DBLP] ICALP, 2005, pp:16-29 [Conf]
- François Laroussinie, Ph. Schnoebelen, Mathieu Turuani
On the Expressivity and Complexity of Quantitative Branching-Time Temporal Logics. [Citation Graph (0, 0)][DBLP] LATIN, 2000, pp:437-446 [Conf]
- Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
An NP Decision Procedure for Protocol Insecurity with XOR. [Citation Graph (0, 0)][DBLP] LICS, 2003, pp:261-270 [Conf]
- Mathieu Turuani
The CL-Atse Protocol Analyser. [Citation Graph (0, 0)][DBLP] RTA, 2006, pp:277-286 [Conf]
- Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
Deciding the Security of Protocols with Commuting Public Key Encryption. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:55-66 [Journal]
- Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani
Compositional analysis of contract-signing protocols. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:33-56 [Journal]
- Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
An NP decision procedure for protocol insecurity with XOR. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2005, v:338, n:1-3, pp:247-274 [Journal]
- François Laroussinie, Ph. Schnoebelen, Mathieu Turuani
On the expressivity and complexity of quantitative branching-time temporal logics. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:1, n:297, pp:297-315 [Journal]
- Michaël Rusinowitch, Mathieu Turuani
Protocol insecurity with a finite number of sessions, composed keys is NP-complete. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:1, n:299, pp:451-475 [Journal]
- Max Tuengerthal, Ralf Küsters, Mathieu Turuani
Implementing a Unification Algorithm for Protocol Analysis with XOR [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists. [Citation Graph (, )][DBLP]
Validating Integrity for the Ephemerizer's Protocol with CL-Atse. [Citation Graph (, )][DBLP]
Search in 0.023secs, Finished in 0.024secs
|