Michael Rusinowitch
Michael Rusinowitch
INRIA
Verified email at loria.fr
TitleCited byYear
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
9632005
Protocol insecurity with finite number of sessions is NP-complete
M Rusinowitch, M Turuani
3212001
An NP decision procedure for protocol insecurity with XOR
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
Theoretical Computer Science 338 (1-3), 247-274, 2005
2402005
Deduction with symbolic constraints
C Kirchner, H Kirchner, M Rusinowitch
2231990
On word problems in equational theories
J Hsiang, M Rusinowitch
International Colloquium on Automata, Languages, and Programming, 54-71, 1987
2171987
Protocol insecurity with a finite number of sessions and composed keys is NP-complete
M Rusinowitch, M Turuani
Theoretical Computer Science 299 (1-3), 451-475, 2003
1962003
A rewriting approach to satisfiability procedures
A Armando, S Ranise, M Rusinowitch
Information and Computation 183 (2), 140-164, 2003
1802003
Proving refutational completeness of theorem-proving strategies: the transfinite semantic tree method
J Hsiang, M Rusinowitch
Journal of the ACM (JACM) 38 (3), 558-586, 1991
1721991
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
Y Chevalier, R Küsters, M Rusinowitch, M Turuani
International Conference on Foundations of Software Technology and …, 2003
1572003
Compiling and verifying security protocols
F Jacquemard, M Rusinowitch, L Vigneron
International Conference on Logic for Programming Artificial Intelligence …, 2000
1492000
Implicit induction in conditional theories
A Bouhoula, M Rusinowitch
Journal of automated reasoning 14 (2), 189-235, 1995
1451995
On termination of the direct sum of term-rewriting systems
M Rusinowitch
Information processing letters 26 (2), 65-70, 1987
1401987
Proving correctness of transformation functions in real-time groupware
A Imine, P Molli, G Oster, M Rusinowitch
ECSCW 2003, 277-293, 2003
1272003
Protocol analysis in intrusion detection using decision tree
T Abbes, A Bouhoula, M Rusinowitch
International Conference on Information Technology: Coding and Computing …, 2004
1122004
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
1062012
Automated mathematical induction
A Bouhoula, E Kounalis, M Rusinowitch
Journal of Logic and Computation 5 (5), 631-668, 1995
981995
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
972002
Mechanizing inductive reasoning
E Kounalis, M Rusinowitch
Bulletin of the EATCS 41, 216-226, 1990
851990
Formal design and verification of operational transformation algorithms for copies convergence
A Imine, M Rusinowitch, G Oster, P Molli
Theoretical Computer Science 351 (2), 167-183, 2006
752006
Theorem-proving with resolution and superposition
M Rusinowitch
Journal of Symbolic Computation 11 (1-2), 21-49, 1991
741991
The system can't perform the operation now. Try again later.
Articles 1–20