Follow
Michael Rusinowitch
Michael Rusinowitch
INRIA
Verified email at loria.fr
Title
Cited by
Cited by
Year
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
15582005
Protocol insecurity with finite number of sessions is NP-complete
M Rusinowitch, M Turuani
INRIA, 2001
3412001
An NP decision procedure for protocol insecurity with XOR
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Theoretical Computer Science 338 (1-3), 247-274, 2005
2652005
On word problems in equational theories
J Hsiang, M Rusinowitch
Automata, Languages and Programming: 14th International Colloquium Karlsruhe …, 1987
2341987
Protocol insecurity with a finite number of sessions and composed keys is NP-complete
M Rusinowitch, M Turuani
Theoretical Computer Science 299 (1-3), 451-475, 2003
2252003
Deduction with symbolic constraints
C Kirchner, H Kirchner, M Rusinowitch
INRIA, 1990
2251990
A rewriting approach to satisfiability procedures
A Armando, S Ranise, M Rusinowitch
Information and Computation 183 (2), 140-164, 2003
1942003
Proving refutational completeness of theorem-proving strategies: The transfinite semantic tree method
J Hsiang, M Rusinowitch
Journal of the ACM (JACM) 38 (3), 558-586, 1991
1901991
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
International Conference on Foundations of Software Technology and …, 2003
1652003
Compiling and verifying security protocols
F Jacquemard, M Rusinowitch, L Vigneron
International Conference on Logic for Programming Artificial Intelligence …, 2000
1572000
Implicit induction in conditional theories
A Bouhoula, M Rusinowitch
Journal of automated reasoning 14, 189-235, 1995
1551995
On termination of the direct sum of term-rewriting systems
M Rusinowitch
Information processing letters 26 (2), 65-70, 1987
1541987
Proving correctness of transformation functions in real-time groupware
A Imine, P Molli, G Oster, M Rusinowitch
ECSCW 2003: Proceedings of the Eighth European Conference on Computer …, 2003
1502003
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1372012
Protocol analysis in intrusion detection using decision tree
T Abbes, A Bouhoula, M Rusinowitch
International Conference on Information Technology: Coding and Computing …, 2004
1332004
Automated mathematical induction
A Bouhoula, E Kounalis, M Rusinowitch
Journal of Logic and Computation 5 (5), 631-668, 1995
1161995
Theorem-proving with resolution and superposition
M Rusinowitch
Journal of Symbolic Computation 11 (1-2), 21-49, 1991
1081991
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification: 14th International Conference, CAV 2002 …, 2002
1052002
Mechanizing inductive reasoning
E Kounalis, M Rusinowitch
Bulletin of the EATCS 41, 216-226, 1990
951990
Formal design and verification of operational transformation algorithms for copies convergence
A Imine, M Rusinowitch, G Oster, P Molli
Theoretical Computer Science 351 (2), 167-183, 2006
902006
The system can't perform the operation now. Try again later.
Articles 1–20