{"id":13,"date":"2015-06-15T10:26:53","date_gmt":"2015-06-15T08:26:53","guid":{"rendered":"http:\/\/members.loria.fr\/thierrygartiser\/?page_id=13"},"modified":"2016-06-17T16:25:58","modified_gmt":"2016-06-17T14:25:58","slug":"publications","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/MRusinowitch\/publications\/","title":{"rendered":"Publis"},"content":{"rendered":"<p>&nbsp;<br \/>\n   <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD XHTML 1.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/xhtml1\/DTD\/xhtml1-transitional.dtd\"> <html xmlns='http:\/\/www.w3.org\/1999\/xhtml' xml:lang='fr' lang='fr'> <head> <meta name=\"robots\" content=\"noindex, nofollow\" \/> <meta http-equiv=\"content-type\" content= \"text\/html;charset=UTF-8\" \/> <meta http-equiv=\"Content-Language\" content=\"fr\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"..\/css\/VisuGen.css\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/haltools.inria.fr\/\/css\/VisuRubriqueEncadre.css\" \/> <!-- Piwik haltools.inria.fr--> <script type=\"text\/javascript\">   var _paq = _paq || [];   _paq.push(['trackPageView']);   _paq.push(['enableLinkTracking']);   (function() {     var u=\"\/\/piwik.inria.fr\/\";     _paq.push(['setTrackerUrl', u+'piwik.php']);     _paq.push(['setSiteId', 25]);     var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];     g.type='text\/javascript'; g.async=true; g.defer=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s);   })(); <\/script> <noscript><\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p><\/noscript> <!-- End Piwik Code -->  <title>Publications HAL de  Michael, Rusinowitch<\/title> <\/head> <body> <\/p>\n<div id=\"res_script\">\n<p class='Rubrique'>2026<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-05589750v1\" target=\"_blank\" >CauseRL: Reinforcement Learning-based Random Walks for Root Cause Analysis in Microservices<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jhon Sebastian Rojas Rodriguez, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>41st ACM\/SIGAPP Symposium On Applied Computing<\/i>, Mar 2026, Thessaloniki, Greece. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3748522.3779836\">&#x27E8;10.1145\/3748522.3779836&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3748522.3779836\" target=\"_blank\" >10.1145\/3748522.3779836<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-05589750\/file\/CauseRL.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-05589750\/file\/CauseRL.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-05589750\/file\/CauseRL.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-05589750v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2025<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-05327868v1\" target=\"_blank\" >Deep Reinforcement Learning for In-Network Placement of ACL Rules Under Constraints<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Wafik Zahwa, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CNSM 2025 &#8211; 21st International Conference on Network and Service Management<\/i>, Oct 2025, Bologne, Italy<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-05327868\/file\/cnsm-1.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-05327868\/file\/cnsm-1.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-05327868\/file\/cnsm-1.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-05327868v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2024<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04703877v1\" target=\"_blank\" >In-Network ACL Rules Placement using Deep Reinforcement Learning<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Wafik Zahwa, Abdelkader Lahmadi, Michael Rusinowitch, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2024 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)<\/i>, Jul 2024, Madrid, Spain. pp.341-346, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/MeditCom61057.2024.10621188\">&#x27E8;10.1109\/MeditCom61057.2024.10621188&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/MeditCom61057.2024.10621188\" target=\"_blank\" >10.1109\/MeditCom61057.2024.10621188<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04703877\/file\/papier_wafik_Meditcom.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04703877\/file\/papier_wafik_Meditcom.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04703877\/file\/papier_wafik_Meditcom.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04703877v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2023<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04128213v1\" target=\"_blank\" >Inferring RPO Symbol Ordering<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Wei Du, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>UNIF 2023 &#8211; 37th International Workshop on Unification<\/i>, Veena Ravishankar; Christophe Ringeissen, Jul 2023, Rome, Italy<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04128213\/file\/UNIF_2023_paper_7.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04128213\/file\/UNIF_2023_paper_7.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04128213\/file\/UNIF_2023_paper_7.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04128213v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04236850v1\" target=\"_blank\" >Automated Placement of In-Network ACL Rules<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Wafik Zahwa, Abdelkader Lahmadi, Michael Rusinowitch, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2023 IEEE 9th International Conference on Network Softwarization (NetSoft)<\/i>, Jun 2023, Madrid, Spain. pp.486-491, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NetSoft57336.2023.10175436\">&#x27E8;10.1109\/NetSoft57336.2023.10175436&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NetSoft57336.2023.10175436\" target=\"_blank\" >10.1109\/NetSoft57336.2023.10175436<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04236850\/file\/netadata_v2.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04236850\/file\/netadata_v2.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04236850\/file\/netadata_v2.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04236850v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2022<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03937202v1\" target=\"_blank\" >Differentially Private Friends Recommendation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Kamal Macwan, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The 15th International Symposium on Foundations &#038; Practice of Security<\/i>, Dec 2022, Ottawa (Ontario), Canada. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-30122-3_15\">&#x27E8;10.1007\/978-3-031-30122-3_15&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-031-30122-3_15\" target=\"_blank\" >10.1007\/978-3-031-30122-3_15<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-03937202v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03937249v1\" target=\"_blank\" >Privacy Preserving Recommendations for Social Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Kamal Macwan, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The 9th International Conference on Social Networks Analysis, Management and Security<\/i>, Nov 2022, Milan, Italy<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-03937249v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03850745v1\" target=\"_blank\" >Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, Remi Garcia, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Adel Bouhoula, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium<\/i>, Apr 2022, Budapest, Hungary. pp.1-9, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/NOMS54207.2022.9789807\">&#x27E8;10.1109\/NOMS54207.2022.9789807&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/NOMS54207.2022.9789807\" target=\"_blank\" >10.1109\/NOMS54207.2022.9789807<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-03850745v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2021<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03480304v1\" target=\"_blank\" >FOX: Fooling with Explanations Privacy Protection with Adversarial Reactions in Social Media<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Noreddine Belhadj-Cheikh, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>PST 2021 &#8211; 18th Annual International Conference on Privacy, Security and Trust<\/i>, Dec 2021, Auckland\/Virtual, New Zealand<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03480304\/file\/main-pst-final.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03480304\/file\/main-pst-final.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03480304\/file\/main-pst-final.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03480304v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03463789v1\" target=\"_blank\" >Implementing Security Protocol Monitors<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>SCSS 2021 &#8211; 9th International Symposium on Symbolic Computation in Software Science<\/i>, Sep 2021, Linz\/virtual, Austria. pp.22-34, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4204\/EPTCS.342.3\">&#x27E8;10.4204\/EPTCS.342.3&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.4204\/EPTCS.342.3\" target=\"_blank\" >10.4204\/EPTCS.342.3<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03463789\/file\/eptcs.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03463789\/file\/eptcs.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03463789\/file\/eptcs.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03463789v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03463902v1\" target=\"_blank\" >Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec)<\/i>, Jul 2021, Calgary, AB, Canada. pp.338-356, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-81242-3_20\">&#x27E8;10.1007\/978-3-030-81242-3_20&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-030-81242-3_20\" target=\"_blank\" >10.1007\/978-3-030-81242-3_20<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03463902\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03463902\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03463902\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03463902v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2020<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02996034v1\" target=\"_blank\" >Inferring attributes with picture metadata embeddings<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Bizhan Alipour Pijani, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ACM SIGAPP applied computing review : a publication of the Special Interest Group on Applied Computing<\/i>, 2020, 20 (2), pp.36-45. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3412816.3412819\">&#x27E8;10.1145\/3412816.3412819&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3412816.3412819\" target=\"_blank\" >10.1145\/3412816.3412819<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02996034\/file\/attribute.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02996034\/file\/attribute.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02996034\/file\/attribute.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02996034v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03036350v1\" target=\"_blank\" >Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, R\u00e9mi Garcia, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Adel Bouhoula<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>NCA 2020 &#8211; 19th IEEE International Symposium on Network Computing and Applications<\/i>, Nov 2020, Online conference, France<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03036350\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03036350\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03036350\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03036350v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02988123v1\" target=\"_blank\" >Online Attacks on Picture Owner Privacy<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Bizhan Alipour Pijani, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>DEXA 2020 &#8211; 31st International Conference on Database and Expert Systems Applications<\/i>, Sep 2020, Bratislava, Slovakia. pp.33-47, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-59051-2_3\">&#x27E8;10.1007\/978-3-030-59051-2_3&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-030-59051-2_3\" target=\"_blank\" >10.1007\/978-3-030-59051-2_3<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02988123\/file\/dexa.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02988123\/file\/dexa.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02988123\/file\/dexa.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02988123v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02985551v1\" target=\"_blank\" >Your Age Revealed by Facebook Picture Metadata<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Sanaz Eidizadehakhcheloo, Bizhan Alipour Pijani, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>BBIGAP 2020 &#8211; Second Workshop of BI and Big Data Applications<\/i>, Aug 2020, Lyon \/ Virtual, France. pp.259-270, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-55814-7_22\">&#x27E8;10.1007\/978-3-030-55814-7_22&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-030-55814-7_22\" target=\"_blank\" >10.1007\/978-3-030-55814-7_22<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-02985551v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02974078v1\" target=\"_blank\" >You are what emojis say about your pictures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Bizhan Alipour Pijani, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>SAC &rsquo;20 &#8211; 35th ACM\/SIGAPP Symposium on Applied Computing<\/i>, Mar 2020, Brno, Czech Republic. pp.1826-1834, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3341105.3373943\">&#x27E8;10.1145\/3341105.3373943&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/3341105.3373943\" target=\"_blank\" >10.1145\/3341105.3373943<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02974078\/file\/sac.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02974078\/file\/sac.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02974078\/file\/sac.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02974078v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02547097v1\" target=\"_blank\" >Double Mask: An efficient rule encoding for Software Defined Networking<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, Abdelkader Lahmadi, Michael Rusinowitch, Miguel Couceiro, Adel Bouhoula, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ICIN 2020 &#8211; 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops<\/i>, Feb 2020, Paris, France. pp.186&#8211;193<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02547097\/file\/1570605208.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02547097\/file\/1570605208.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02547097\/file\/1570605208.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02547097v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Poster communications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03036292v1\" target=\"_blank\" >R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, R\u00e9mi Garcia, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Adel Bouhoula<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CNSM 2020 &#8211; 16th International Conference on Network and Service Management<\/i>, Nov 2020, Izmir\/Virtual, Turkey<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03036292\/file\/poster.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03036292\/file\/poster.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03036292\/file\/poster.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03036292v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2019<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.univ-lorraine.fr\/hal-02271825v1\" target=\"_blank\" >Gender Inference for Facebook Picture Owners<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Bizhan Alipour, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>TrustBus 2019 &#8211; 16th International Conference on Trust, Privacy and Security in Digital Business<\/i>, Aug 2019, Linz, Austria. pp.145&#8211;160, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-27813-7_10\">&#x27E8;10.1007\/978-3-030-27813-7_10&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-030-27813-7_10\" target=\"_blank\" >10.1007\/978-3-030-27813-7_10<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.univ-lorraine.fr\/hal-02271825\/file\/Main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.univ-lorraine.fr\/hal-02271825\/file\/Main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.univ-lorraine.fr\/hal-02271825\/file\/Main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.univ-lorraine.fr\/hal-02271825v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02123709v1\" target=\"_blank\" >Unification modulo Lists with Reverse, Relation with Certain Word Equations<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Peter Hibbs, Paliath Narendran, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CADE-27 &#8211; The 27th International Conference on Automated Deduction<\/i>, Association for Automated Reasoning (AAR), Aug 2019, Natal, Brazil. pp.1&#8211;17, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-29436-6_1\">&#x27E8;10.1007\/978-3-030-29436-6_1&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-030-29436-6_1\" target=\"_blank\" >10.1007\/978-3-030-29436-6_1<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02123709\/file\/Cade27-Final.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02123709\/file\/Cade27-Final.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02123709\/file\/Cade27-Final.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02123709v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Poster communications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02393008v1\" target=\"_blank\" >Minimizing Range Rules for Packet Filtering Using a Double Mask Representation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Miguel Couceiro, Adel Bouhoula<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IFIP Networking 2019<\/i>, May 2019, Varsovie, Poland<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02393008\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02393008\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02393008\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02393008v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02123648v2\" target=\"_blank\" >Unification modulo Lists with Reverse as Solving Simple Sets of Word Equations<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Peter Hibbs, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] LIFO, Universit\u00e9 d&rsquo;Orl\u00e9ans; INSA, Centre Val de Loire. 2019<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02123648\/file\/Research-Report2019.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02123648\/file\/Research-Report2019.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02123648\/file\/Research-Report2019.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02123648v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02102225v4\" target=\"_blank\" >Minimizing Range Rules for Packet Filtering Using Double Mask Representation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ahmad Abboud, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch, Miguel Couceiro, Adel Bouhoula, Saif El Hakk Awainia, Mondher Ayadi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2019<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02102225\/file\/Double%20Mask%20General%20Version.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02102225\/file\/Double%20Mask%20General%20Version.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02102225\/file\/Double%20Mask%20General%20Version.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02102225v4\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2018<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01939277v1\" target=\"_blank\" >Online Testing of User Profile Resilience Against Inference Attacks in Social Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Younes Abid, Abdessamad Imine, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ADBIS 2018 &#8211; First International Workshop on Advances on Big Data Management, Analytics, Data Privacy and Security, BigDataMAPS 2018<\/i>, Sep 2018, Budapest, Hungary<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01939277\/file\/telerise_2018.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01939277\/file\/telerise_2018.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01939277\/file\/telerise_2018.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01939277v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01939283v1\" target=\"_blank\" >Sensitive attribute prediction for social networks users<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Younes Abid, Abdessamad Imine, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>DARLI-AP 2018 &#8211; 2nd International workshop on Data Analytics solutions for Real-LIfe APplications<\/i>, Mar 2018, Vienne, Austria<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01939283\/file\/WORKSHOP_EDBT.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01939283\/file\/WORKSHOP_EDBT.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01939283\/file\/WORKSHOP_EDBT.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01939283v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2017<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01405842v1\" target=\"_blank\" >Satisfiability of General Intruder Constraints with and without a Set Constructor<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tigran Avanesov, Yannick Chevalier, Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Symbolic Computation<\/i>, 2017, Special issue: SI: Program Verification, 80, pp.27-61. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jsc.2016.07.009\">&#x27E8;10.1016\/j.jsc.2016.07.009&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.jsc.2016.07.009\" target=\"_blank\" >10.1016\/j.jsc.2016.07.009<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01405842\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01405842\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01405842\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01405842v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01405851v1\" target=\"_blank\" >Intruder deducibility constraints with negation. Decidability and application to secured service compositions<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Symbolic Computation<\/i>, 2017, 80, pp.4 &#8211; 26. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jsc.2016.07.008\">&#x27E8;10.1016\/j.jsc.2016.07.008&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.jsc.2016.07.008\" target=\"_blank\" >10.1016\/j.jsc.2016.07.008<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01405851\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01405851\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01405851\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01405851v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01649246v1\" target=\"_blank\" >Two-phase preference disclosure in attributed social networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Ra\u00efssi, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>DEXA 2017 &#8211; 28th International Conference on Database and Expert Systems Applications <\/i>, Aug 2017, Lyon, France. pp.249-263, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-64468-4_19\">&#x27E8;10.1007\/978-3-319-64468-4_19&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-319-64468-4_19\" target=\"_blank\" >10.1007\/978-3-319-64468-4_19<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01649246\/file\/DEXA_2017_1.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01649246\/file\/DEXA_2017_1.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01649246\/file\/DEXA_2017_1.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01649246v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Books<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01649032v1\" target=\"_blank\" >SCSS 2017, The 8th International Symposium on Symbolic Computation in Software Science<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mohamed Mosbah, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2017<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01649032v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2016<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01424911v1\" target=\"_blank\" >Network Structure Release under Differential Privacy<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Hiep Nguyen, Abdessamad Imine, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Transactions on Data Privacy<\/i>, 2016, 9 (3), pp.26. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5555\/3121413.3121415\">&#x27E8;10.5555\/3121413.3121415&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.5555\/3121413.3121415\" target=\"_blank\" >10.5555\/3121413.3121415<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01424911\/file\/graph-dp-tdp.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01424911\/file\/graph-dp-tdp.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01424911\/file\/graph-dp-tdp.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01424911v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01320646v1\" target=\"_blank\" >Detection of firewall configuration errors with updatable tree<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tarek Abbes, Adel Bouhoula, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Journal of Information Security<\/i>, 2016, 15 (3), pp.301-317. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10207-015-0290-0\">&#x27E8;10.1007\/s10207-015-0290-0&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s10207-015-0290-0\" target=\"_blank\" >10.1007\/s10207-015-0290-0<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01320646\/file\/firewall.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01320646\/file\/firewall.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01320646\/file\/firewall.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01320646v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01426626v1\" target=\"_blank\" >One-variable context-free hedge automata<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Computer and System Sciences<\/i>, 2016, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jcss.2016.10.006\">&#x27E8;10.1016\/j.jcss.2016.10.006&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.jcss.2016.10.006\" target=\"_blank\" >10.1016\/j.jcss.2016.10.006<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01426626\/file\/CFHA-long.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01426626\/file\/CFHA-long.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01426626\/file\/CFHA-long.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01426626v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01393266v1\" target=\"_blank\" >Detecting Communities under Differential Privacy<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Hiep H Nguyen, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i> Workshop on Privacy in the Electronic Society &#8211; WPES 206<\/i>, Oct 2016, Vienna, Austria. pp.83 &#8211; 93<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01393266\/file\/wpes08-nguyen-non-acm.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01393266\/file\/wpes08-nguyen-non-acm.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01393266\/file\/wpes08-nguyen-non-acm.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01393266v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01402062v1\" target=\"_blank\" >Online link disclosure strategies for social networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Ra\u00efssi, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The 11th International Conference on Risks and Security of Internet and Systems<\/i>, Sep 2016, Roscoff, France<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01402062\/file\/crisis_2016_1.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01402062\/file\/crisis_2016_1.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01402062\/file\/crisis_2016_1.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01402062v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01256397v1\" target=\"_blank\" >Automated Verification of Electrum Wallet<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mathieu Turuani, Thomas Voegtlin, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>3rd Workshop on Bitcoin and Blockchain Research<\/i>, Feb 2016, Christ Church, Barbados<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01256397\/file\/longversion.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01256397\/file\/longversion.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01256397\/file\/longversion.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01256397v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Poster communications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01241619v1\" target=\"_blank\" >Analyse d&rsquo;activit\u00e9 et exposition de la vie priv\u00e9e sur les m\u00e9dias sociaux<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Younes Abid, Abdessamad Imine, Amedeo Napoli, Chedy Ra\u00efssi, Marc Rigolot, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>16\u00e8me conf\u00e9rence francophone sur l&rsquo;Extraction et la Gestion des Connaissances (EGC 2016)<\/i>, Jan 2016, Reims, France. 2016<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01241619\/file\/EGC_Younes_Abid.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01241619\/file\/EGC_Younes_Abid.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01241619\/file\/EGC_Younes_Abid.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01241619v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Proceedings<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01408625v1\" target=\"_blank\" >International Workshop on Security And Privacy Analytics<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Rakesh Verma, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Workshop on Security And Privacy Analytics<\/i>, Mar 2016, New Orleans, United States. <a target=\"_blank\" href=\"http:\/\/dl.acm.org\/citation.cfm?id=2875475\">ACM<\/a>, 2016, IWSPA &rsquo;16: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, 978-1-4503-4077-9<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01408625v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2015<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01090881v1\" target=\"_blank\" >Model-based mutation testing from security protocols in HLPSL<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Fr\u00e9d\u00e9ric Dadeau, Pierre-Cyrille H\u00e9am, Rafik Kheddam, Ghazi Maatoug, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Software Testing, Verification and Reliability<\/i>, 2015, pp.30. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1002\/stvr.1531\">&#x27E8;10.1002\/stvr.1531&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1002\/stvr.1531\" target=\"_blank\" >10.1002\/stvr.1531<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01090881v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01089128v1\" target=\"_blank\" >Parametrized automata simulation and application to service composition<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Walid Belkhir, Yannick Chevalier, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Symbolic Computation<\/i>, 2015, 69, pp.40&#8211;60. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jsc.2014.09.029\">&#x27E8;10.1016\/j.jsc.2014.09.029&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.jsc.2014.09.029\" target=\"_blank\" >10.1016\/j.jsc.2014.09.029<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01089128\/file\/Belkhir_2015.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01089128\/file\/Belkhir_2015.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01089128\/file\/Belkhir_2015.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01089128v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01224144v1\" target=\"_blank\" >Expressive Equivalence and Succinctness of Parametrized Automata with respect to Finite Memory Automata<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tushant Jha, Walid Belkhir, Yannick Chevalier, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>FOR-MOVES 2015: FORmal MOdeling and VErification of Service-based systems<\/i>, Nov 2015, Goa, India<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01224144\/file\/FOR-MOVES_2015_paper_1.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01224144\/file\/FOR-MOVES_2015_paper_1.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01224144\/file\/FOR-MOVES_2015_paper_1.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01224144v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01179528v1\" target=\"_blank\" >Differentially Private Publication of Social Graphs at Linear Cost<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Huu Hiep Nguyen, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ASONAM 2015<\/i>, Aug 2015, Paris, France<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01179528\/file\/asonam068-nguyen.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01179528\/file\/asonam068-nguyen.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01179528\/file\/asonam068-nguyen.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01179528v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01108437v1\" target=\"_blank\" >Anonymizing Social Graphs via Uncertainty Semantics<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Huu Hiep Nguyen, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ASIACCS 2015 &#8211; 10th ACM Symposium on Information, Computer and Communications Security<\/i>, Apr 2015, Singapour, Singapore<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01108437v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2014<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01094068v1\" target=\"_blank\" >Practical access control management for distributed collaborative editors<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Asma Cherif, Abdessamad Imine, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Pervasive and Mobile Computing<\/i>, 2014, pp.62-86<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-01094068v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00854841v3\" target=\"_blank\" >Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Christopher Bouchard, Paliath Narendran, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Logical Methods in Computer Science<\/i>, 2014, 10 (1:5), pp. 1&#8211;26. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.2168\/LMCS-10(1:5)2014\">&#x27E8;10.2168\/LMCS-10(1:5)2014&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.2168\/LMCS-10(1:5)2014\" target=\"_blank\" >10.2168\/LMCS-10(1:5)2014<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00854841\/file\/dbctheory-LMCS2014.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00854841\/file\/dbctheory-LMCS2014.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00854841\/file\/dbctheory-LMCS2014.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00854841v3\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01092442v1\" target=\"_blank\" >A Maximum Variance Approach for Graph Anonymization<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Huu Hiep Nguyen, Abdessamad Imine, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The 7th International Symposium on Foundations &#038; Practice of Security FPS\u20192014<\/i>, Nov 2014, Montreal, Canada<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01092442\/file\/uncertain-graph-fps-final.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01092442\/file\/uncertain-graph-fps-final.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01092442\/file\/uncertain-graph-fps-final.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01092442v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01087829v1\" target=\"_blank\" >A Parametrized Propositional Dynamic Logic with Application to Service Synthesis<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Walid Belkhir, Gisela Rossi, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Advances in Modal Logic<\/i>, Aug 2014, Groningen, Netherlands. pp.34-53<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01087829v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01090000v1\" target=\"_blank\" >Automated Verification of Security Protocols and Services<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Third International Seminar on Program Verification, Automated Debugging and Symbolic Computation<\/i>, Tudor Jebelean; Wei Li ; Dongming Wang, Jul 2014, Vienna, Austria<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01090000v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01089682v1\" target=\"_blank\" >Model-Based Vulnerability Testing of Payment Protocol Implementations<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ghazi Maatoug, Fr\u00e9d\u00e9ric Dadeau, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>HotSpot&rsquo;14 &#8211; 2nd Workshop on Hot Issues in Security Principles and Trust, affiliated with ETAPS 2014<\/i>, Apr 2014, Grenoble, France<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-01089682v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01092447v1\" target=\"_blank\" >Enforcing Privacy in Decentralized Mobile Social Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Huu Hiep Nguyen, Abdessamad Imine, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ESSoS Doctoral Symposium 2014<\/i>, Feb 2014, Munich, Germany<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01092447\/file\/essos-phd.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01092447\/file\/essos-phd.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01092447\/file\/essos-phd.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01092447v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2013<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00915317v1\" target=\"_blank\" >Secure Collaboration for Smartphones<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdessamad Imine, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ERCIM News<\/i>, 2013, 93<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00915317v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00915323v1\" target=\"_blank\" >Automated verification of security protocols and application to services<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Verification and Evaluation of Computer and Communication Systems<\/i>, Alessandro Fantechi, University of Florence, Italy, Nov 2013, Florence, Italy<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00915323v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00915318v1\" target=\"_blank\" >SVMAX: a system for secure and valid manipulation of XML data<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Houari Mahfoud, Abdessamad Imine, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IDEAS&rsquo;13 Proceedings of the 17th International Database Engineering &#038; Applications Symposium<\/i>, Oct 2013, Barcelone, Spain. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2513591.2513657\">&#x27E8;10.1145\/2513591.2513657&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/2513591.2513657\" target=\"_blank\" >10.1145\/2513591.2513657<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00915318v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00914778v1\" target=\"_blank\" >Fresh-Variable Automata for Service Composition<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Walid Belkhir, Yannick Chevalier, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>SYNASC 2013 -15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing<\/i>, West University of Timisoara Department of Computer Science, Sep 2013, Timisoara, Romania<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/arxiv.org\/pdf\/1302.4205\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/1302.4205\" src=\"https:\/\/haltools.inria.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00914778v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00852379v1\" target=\"_blank\" >Unranked Tree Rewriting and Effective Closures of Languages<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Meeting of the IFIP WG 1.6 on Term Rewriting<\/i>, Jun 2013, Eindhoven, Netherlands<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00852379\/file\/abstract.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00852379\/file\/abstract.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00852379\/file\/abstract.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00852379v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00767719v1\" target=\"_blank\" >Rewrite Closure and CF Hedge Automata<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>7th International Conference on Language and Automata Theory and Application<\/i>, Apr 2013, Bilbao, Spain<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00767719\/file\/CFHA.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00767719\/file\/CFHA.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00767719\/file\/CFHA.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00767719v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00914779v1\" target=\"_blank\" >Guarded Variable Automata over Infinite Alphabets<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Walid Belkhir, Yannick Chevalier, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2013<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/arxiv.org\/pdf\/1304.6297\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/1304.6297\" src=\"https:\/\/haltools.inria.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00914779v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2012<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00618336v1\" target=\"_blank\" >Unification modulo Homomorphic Encryption<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Automated Reasoning<\/i>, 2012, 48 (2), pp.135-158. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10817-010-9205-y\">&#x27E8;10.1007\/s10817-010-9205-y&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s10817-010-9205-y\" target=\"_blank\" >10.1007\/s10817-010-9205-y<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00618336v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00527630v1\" target=\"_blank\" >Decidability of Equivalence of Symbolic Derivations<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Automated Reasoning<\/i>, 2012, 48 (2), pp.263-292. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10817-010-9199-5\">&#x27E8;10.1007\/s10817-010-9199-5&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s10817-010-9199-5\" target=\"_blank\" >10.1007\/s10817-010-9199-5<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00527630v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00659009v1\" target=\"_blank\" >String rewriting and security analysis: an extension of a result of Book and Otto<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Automata Languages and Combinatorics<\/i>, 2012, 16 (2&#8211;4), pp.83&#8211;98<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00659009v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00915320v1\" target=\"_blank\" >Compiling symbolic attacks to protocol implementation tests<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Hatem Ghabri, Ghazi Maatoug, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Fourth International Symposium on Symbolic Computation in Software Science<\/i>, Adel Bouhoula and Tetsuo Ida and Fairouz Kamareddine, Dec 2012, Tunis, Tunisia. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4204\/EPTCS.122.4\">&#x27E8;10.4204\/EPTCS.122.4&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.4204\/EPTCS.122.4\" target=\"_blank\" >10.4204\/EPTCS.122.4<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/arxiv.org\/pdf\/1307.8210\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/1307.8210\" src=\"https:\/\/haltools.inria.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00915320v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00755947v1\" target=\"_blank\" >Towards the Orchestration of Secured Services under Non-disclosure Policies.<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012<\/i>, Oct 2012, St. Petersburg, Russia. pp.130-145, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-33704-8_12\">&#x27E8;10.1007\/978-3-642-33704-8_12&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-642-33704-8_12\" target=\"_blank\" >10.1007\/978-3-642-33704-8_12<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00755947v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00684185v1\" target=\"_blank\" >Unification modulo Synchronous Distributivity<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Serdar Erbatur, Christopher Lynch, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IJCAR 2012 (The 6th International Joint Conference on Automated Reasoning)<\/i>, Jun 2012, Manchester, United Kingdom. pp.14&#8211;29<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00684185v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00759725v1\" target=\"_blank\" >The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuellar, Gabriel Erzse, Simone Frau, Marius Minea, Sebastian Modersheim, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Micha\u00ebl Rusinowitch, Mohammad Torabi Dashti, Mathieu Turuani, Luca Vigano<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Tools and Algorithms for the Construction and Analysis of Systems &#8211; 18th International Conference, TACAS 2012<\/i>, Mar 2012, Tallinn, Estonia. pp.267-282, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-28756-5_19\">&#x27E8;10.1007\/978-3-642-28756-5_19&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-642-28756-5_19\" target=\"_blank\" >10.1007\/978-3-642-28756-5_19<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00759725v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00659027v1\" target=\"_blank\" >Unification modulo Chaining<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Christopher Bouchard, Paliath Narendran, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The 6th International Conference on Language and Automata Theory and Applications<\/i>, Mar 2012, A Coruna, Spain. pp. 70&#8211;82<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00659027v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00719011v1\" target=\"_blank\" >Intruder deducibility constraints with negation. Decidability and application to secured service compositions.<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tigran Avanesov, Yannick Chevalier, Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-8017, INRIA. 2012<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00719011\/file\/fullver.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00719011\/file\/fullver.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00719011\/file\/fullver.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00719011v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00752496v2\" target=\"_blank\" >Rewrite Closure and CF Hedge Automata<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2012<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00752496\/file\/CFHA.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00752496\/file\/CFHA.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00752496\/file\/CFHA.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00752496v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2011<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00641321v1\" target=\"_blank\" >Distributed Orchestration of Web Services under Security Constraints<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>4th SETOP International Workshop on Autonomous and Spontaneous Security<\/i>, Sep 2011, Leuven, Belgium<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00641321\/file\/setop2011_submission_20.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00641321\/file\/setop2011_submission_20.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00641321\/file\/setop2011_submission_20.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00641321v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00641326v1\" target=\"_blank\" >Web Services Verification and Prudent Implementation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>4th SETOP International Workshop on Autonomous and Spontaneous Security<\/i>, Sep 2011, Leuven, Belgium<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00641326\/file\/setop2011_submission_22.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00641326\/file\/setop2011_submission_22.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00641326\/file\/setop2011_submission_22.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00641326v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00644749v1\" target=\"_blank\" >DeSCal &#8212; Decentralized Shared Calendar for P2P and Ad-Hoc Networks<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jagdish Prasad Achara, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The 10th International Symposium on Parallel and Distributed Computing &#8211; ISPDC 2011<\/i>, Jul 2011, Cluj-Napoca, Romania. pp.223 &#8211; 231, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ISPDC.2011.40\">&#x27E8;10.1109\/ISPDC.2011.40&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/ISPDC.2011.40\" target=\"_blank\" >10.1109\/ISPDC.2011.40<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/hal-00644749v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00576880v1\" target=\"_blank\" >Optimistic access control for distributed collaborative editors<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Asma Cherif, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2011 ACM Symposium on Applied Computing (SAC)<\/i>, Mar 2011, Taichung, Taiwan. pp.861-868, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1982185.1982374\">&#x27E8;10.1145\/1982185.1982374&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/1982185.1982374\" target=\"_blank\" >10.1145\/1982185.1982374<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00576880v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00618376v1\" target=\"_blank\" >Unification modulo Block Chaining<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Christopher Bouchard, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] 2011<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00618376v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2010<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00527633v1\" target=\"_blank\" >Compiling and securing cryptographic protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Information Processing Letters<\/i>, 2010, 110 (3), pp.116-122. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.ipl.2009.11.004\">&#x27E8;10.1016\/j.ipl.2009.11.004&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.ipl.2009.11.004\" target=\"_blank\" >10.1016\/j.ipl.2009.11.004<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/arxiv.org\/pdf\/0910.5099\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/0910.5099\" src=\"https:\/\/haltools.inria.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00527633v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00526683v1\" target=\"_blank\" >Combining Satisfiability Procedures for Unions of Theories with a Shared Counting Operator<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Fundamenta Informaticae<\/i>, 2010, 105 (1-2), pp.163&#8211;187. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3233\/FI-2010-362\">&#x27E8;10.3233\/FI-2010-362&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.3233\/FI-2010-362\" target=\"_blank\" >10.3233\/FI-2010-362<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00526683v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00455290v1\" target=\"_blank\" >Symbolic Protocol Analysis in the Union of Disjoint Intruder Theories: Combining Decision Procedures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2010, 411 (10), pp.1261-1282. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.tcs.2009.10.022\">&#x27E8;10.1016\/j.tcs.2009.10.022&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.tcs.2009.10.022\" target=\"_blank\" >10.1016\/j.tcs.2009.10.022<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00455290v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00528201v1\" target=\"_blank\" >Efficient Decision Tree for Protocol Analysis in Intrusion Detection<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tarek Abbes, Adel Bouhoula, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Journal of Security and Networks<\/i>, 2010, 5 (4), pp.220-235. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1504\/IJSN.2010.037661\">&#x27E8;10.1504\/IJSN.2010.037661&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1504\/IJSN.2010.037661\" target=\"_blank\" >10.1504\/IJSN.2010.037661<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00528201v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-00642855v1\" target=\"_blank\" >Orchestration under Security Constraints<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Formal Methods for Components and Objects (FMCO 2010)<\/i>, Nov 2010, Graz, Austria<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-00642855\/file\/fmco.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-00642855\/file\/fmco.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-00642855\/file\/fmco.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-00642855v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00578884v1\" target=\"_blank\" >XML Access Control: from XACML to Annotated Schemas<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Ryma Abassi, Florent Jacquemard, Michael Rusinowitch, Sihem Guemara El Fatmi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Second International Conference on Communications and Networking (ComNet)<\/i>, Nov 2010, Tozeur, Tunisia. pp.1-8, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/COMNET.2010.5699810\">&#x27E8;10.1109\/COMNET.2010.5699810&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/COMNET.2010.5699810\" target=\"_blank\" >10.1109\/COMNET.2010.5699810<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00578884v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00531025v1\" target=\"_blank\" >Satisfiability of General Intruder Constraints with a Set Constructor<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>The Fifth International Conference on Risks and Security of Internet and Systems &#8211; CRiSIS 2010<\/i>, Oct 2010, Montreal, Canada<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00531025v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00529077v1\" target=\"_blank\" >Safe and Efficient Strategies for Updating Firewall Policies<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Zeeshan Ahmed, Abdessamad Imine, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>7th International Conference on Trust, Privacy &#038; Security in Digital Business &#8211; TrustBus 2010<\/i>, Aug 2010, Bilbao, Spain. pp.45-57<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00529077v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00578916v1\" target=\"_blank\" >Rewrite-Based Verification of XML Updates<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>12th international ACM SIGPLAN symposium on Principles and practice of declarative programming (PPDP)<\/i>, Jul 2010, Hagenberg, Austria. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1836089.1836105\">&#x27E8;10.1145\/1836089.1836105&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/1836089.1836105\" target=\"_blank\" >10.1145\/1836089.1836105<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00578916\/file\/ppdp06a-jacquemard-HAL.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00578916\/file\/ppdp06a-jacquemard-HAL.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00578916\/file\/ppdp06a-jacquemard-HAL.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00578916v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00448703v1\" target=\"_blank\" >Cap Unification: Application to Protocol Security modulo Homomorphic Encryption<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>5th ACM Symposium on Information, Computer and Communications Security &#8211; ASIACCS 2010<\/i>, Apr 2010, Beijing, China<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00448703v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00480632v3\" target=\"_blank\" >Satisfiability of General Intruder Constraints with and without a Set Constructor<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-7276, INRIA : Institut national de recherche en sciences et technologies du num\u00e9rique. 2010, 48p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00480632\/file\/RR-7276.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00480632\/file\/RR-7276.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00480632\/file\/RR-7276.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00480632v3\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2009<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00405356v1\" target=\"_blank\" >Abusing SIP authentication<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Humberto Abdelnur, Tigran Avanesov, Michael Rusinowitch, Radu State<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Information Assurance and Security<\/i>, 2009, Special Issue on Access Control and Protcols, 4 (4), pp.311-318<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00405356\/file\/jias-SIP.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00405356\/file\/jias-SIP.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00405356\/file\/jias-SIP.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00405356v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00428421v1\" target=\"_blank\" >Data Structures with Arithmetic Constraints: a Non-disjoint Combination<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>7th International Symposium on Frontiers of Combining Systems &#8211; FroCoS&rsquo;2009<\/i>, Sep 2009, Trento, Italy. pp.335-350, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-04222-5_20\">&#x27E8;10.1007\/978-3-642-04222-5_20&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-642-04222-5_20\" target=\"_blank\" >10.1007\/978-3-642-04222-5_20<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00428421v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00426798v1\" target=\"_blank\" >Unification Modulo Homomorphic Encryption<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Hai Lin, Christopher Lynch, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>7th International Symposium on Frontiers of Combining Systems &#8211; FroCoS 2009<\/i>, Sep 2009, Trento, Italy. pp.100-116, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-04222-5_6\">&#x27E8;10.1007\/978-3-642-04222-5_6&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-642-04222-5_6\" target=\"_blank\" >10.1007\/978-3-642-04222-5_6<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00426798v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00431341v1\" target=\"_blank\" >A Flexible Access Control Model for Distributed Collaborative Editors<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdessamad Imine, Asma Cherif, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>6th VLDB Workshop on Secure Data Management &#8211; SDM 2009<\/i>, Aug 2009, Lyon, France. pp.89-106, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-04219-5_6\">&#x27E8;10.1007\/978-3-642-04219-5_6&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-642-04219-5_6\" target=\"_blank\" >10.1007\/978-3-642-04219-5_6<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00431341v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00428077v1\" target=\"_blank\" >Combinable Extensions of Abelian Groups<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>22nd International Conference on Automated Deduction &#8211; CADE-22<\/i>, Aug 2009, Montreal, Canada. pp.51-66, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-02959-2_4\">&#x27E8;10.1007\/978-3-642-02959-2_4&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-642-02959-2_4\" target=\"_blank\" >10.1007\/978-3-642-02959-2_4<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00428077v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00426919v1\" target=\"_blank\" >Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Najah Chridi, Mathieu Turuani, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Computer Security Foundations Symposium<\/i>, Jul 2009, Port Jefferson, United States. pp.277-289<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00426919v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00427870v1\" target=\"_blank\" >Satisfiability Procedures for Combination of Theories Sharing Integer Offsets<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems &#8211; TACAS 2009<\/i>, Mar 2009, York, United Kingdom. pp.428-442<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00427870v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00383041v1\" target=\"_blank\" >Combinable Extensions of Abelian Groups<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-6920, INRIA. 2009, pp.30<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00383041\/file\/RR-6920.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00383041\/file\/RR-6920.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00383041\/file\/RR-6920.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00383041v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00381941v2\" target=\"_blank\" >An Optimistic Mandatory Access Control Model for Distributed Collaborative Editors<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdessamad Imine, Asma Cherif, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-6939, INRIA. 2009, pp.20<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00381941\/file\/RR-6939.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00381941\/file\/RR-6939.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00381941\/file\/RR-6939.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00381941v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00397080v1\" target=\"_blank\" >Data Structures with Arithmetic Constraints: a Non-Disjoint Combination<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-6963, INRIA. 2009, pp.23<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00397080\/file\/RR-6963.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00397080\/file\/RR-6963.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00397080\/file\/RR-6963.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00397080v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00426669v1\" target=\"_blank\" >Compiling and securing cryptographic protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] 2009, pp.12<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00426669\/file\/compil-RR.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00426669\/file\/compil-RR.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00426669\/file\/compil-RR.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00426669v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00408162v1\" target=\"_blank\" >Rewrite based Verification of XML Updates<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-7007, INRIA. 2009, pp.39<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00408162\/file\/RR-7007.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00408162\/file\/RR-7007.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00408162\/file\/RR-7007.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00408162v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00381778v2\" target=\"_blank\" >Safe and Efficient Strategies for Updating Firewall Policies<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Zeeshan Ahmed, Abdessamad Imine, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-6940, INRIA. 2009, pp.19<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00381778\/file\/RR-6940.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00381778\/file\/RR-6940.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00381778\/file\/RR-6940.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00381778v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2008<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00329715v1\" target=\"_blank\" >Hierarchical combination of intruder theories<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Information and Computation<\/i>, 2008, 206 (2-4), pp.352-377. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.ic.2007.07.004\">&#x27E8;10.1016\/j.ic.2007.07.004&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.ic.2007.07.004\" target=\"_blank\" >10.1016\/j.ic.2007.07.004<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00329715\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00329715\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00329715\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00329715v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00329740v1\" target=\"_blank\" >Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Ralf Kuesters, Michael Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ACM Transactions on Computational Logic<\/i>, 2008, 9 (4), pp.Article 24. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/1380572.1380573\">&#x27E8;10.1145\/1380572.1380573&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/1380572.1380573\" target=\"_blank\" >10.1145\/1380572.1380573<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00329740v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00329693v1\" target=\"_blank\" >Tree automata with equality constraints modulo equational theories<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Michael Rusinowitch, Laurent Vigneron<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Logic and Algebraic Programming<\/i>, 2008, 75 (2), pp.182-208. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.jlap.2007.10.006\">&#x27E8;10.1016\/j.jlap.2007.10.006&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.jlap.2007.10.006\" target=\"_blank\" >10.1016\/j.jlap.2007.10.006<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00329693\/file\/JacquemardRusinowitchVigneron-JLAP.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00329693\/file\/JacquemardRusinowitchVigneron-JLAP.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00329693\/file\/JacquemardRusinowitchVigneron-JLAP.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00329693v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00326077v1\" target=\"_blank\" >Abusing SIP Authentication<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Humberto Abdelnur, Tigran Avanesov, Micha\u00ebl Rusinowitch, Radu State<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Information Assurance and Security ( ISIAS)<\/i>, Sep 2008, Naples, Italy. pp.237-242, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/IAS.2008.29\">&#x27E8;10.1109\/IAS.2008.29&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/IAS.2008.29\" target=\"_blank\" >10.1109\/IAS.2008.29<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00326077\/file\/Abusing_SIP_Authentication.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00326077\/file\/Abusing_SIP_Authentication.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00326077\/file\/Abusing_SIP_Authentication.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00326077v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00332484v1\" target=\"_blank\" >Towards a Constrained-based Verification of Parameterized Cryptographic Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Najah Chridi, Mathieu Turuani, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>18th International Symposium on Logic-Based Program Synthesis and Transformation &#8211; LOPSTR 2008<\/i>, Jul 2008, Valence, Spain. pp.191-206<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00332484\/file\/LOPSTR08-PostConference_Chridi-Turuani-Rusinowitch.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00332484\/file\/LOPSTR08-PostConference_Chridi-Turuani-Rusinowitch.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00332484\/file\/LOPSTR08-PostConference_Chridi-Turuani-Rusinowitch.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00332484v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00330338v1\" target=\"_blank\" >Automatic Composition of Services with Security Policies<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Mohammed Anis Mekki, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Web Service Composition and Adaptation Workshop (held in conjunction with SCC\/SERVICES-2008)<\/i>, Jul 2008, Honolulu, United States. pp.529-537, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/SERVICES-1.2008.13\">&#x27E8;10.1109\/SERVICES-1.2008.13&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/SERVICES-1.2008.13\" target=\"_blank\" >10.1109\/SERVICES-1.2008.13<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00330338v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00330532v1\" target=\"_blank\" >Active Intruders with Caps<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anatharaman, Hai Lin, Chris Lynch, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>FCS-ARSPA-WITS&rsquo;08<\/i>, Jun 2008, Pittsburgh, United States<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00330532v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00329803v1\" target=\"_blank\" >Closure of Hedge-Automata Languages by Hedge Rewriting<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>19th International Conference on Rewriting Techniques and Applications &#8211; RTA 2008<\/i>, 2008, Hagenberg, Austria. pp.157-171, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-70590-1_11\">&#x27E8;10.1007\/978-3-540-70590-1_11&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-540-70590-1_11\" target=\"_blank\" >10.1007\/978-3-540-70590-1_11<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00329803\/file\/rta30.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00329803\/file\/rta30.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00329803\/file\/rta30.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00329803v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00329730v1\" target=\"_blank\" >An inference system for detecting firewall filtering rules anomalies<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tarek Abbes, Adel Bouhoula, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>23rd Annual ACM Symposium on Applied Computing &#8211; SAC&rsquo;08<\/i>, 2008, Fortaleza, Brazil. pp.2122-2128<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00329730v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00331735v2\" target=\"_blank\" >Satisfiability Procedures for Combination of Theories Sharing Integer Offsets<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Enrica Nicolini, Christophe Ringeissen, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-6697, INRIA. 2008, pp.22<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00331735\/file\/RR-6697.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00331735\/file\/RR-6697.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00331735\/file\/RR-6697.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00331735v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00336539v1\" target=\"_blank\" >Constraints-based Verification of Parameterized Cryptographic Protocols.<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Najah Chridi, Mathieu Turuani, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-6712, INRIA. 2008, pp.54<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00336539\/file\/RR-6712.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00336539\/file\/RR-6712.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00336539\/file\/RR-6712.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00336539v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2007<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00178352v1\" target=\"_blank\" >Relating two standard notions of secrecy<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">V\u00e9ronique Cortier, Micha\u00ebl Rusinowitch, Eugen Zalinescu<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Logical Methods in Computer Science<\/i>, 2007, 3 (3, paper 2), pp.1-29. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.2168\/LMCS-3(3:2)2007\">&#x27E8;10.2168\/LMCS-3(3:2)2007&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.2168\/LMCS-3(3:2)2007\" target=\"_blank\" >10.2168\/LMCS-3(3:2)2007<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/arxiv.org\/pdf\/0706.0502\"  target=\"_blank\"><img decoding=\"async\" alt=\"https:\/\/arxiv.org\/pdf\/0706.0502\" src=\"https:\/\/haltools.inria.fr\/images\/arxiv.gif\" border=\"0\" title=\"arXiv PDF\" width=\"16px\" height=\"16px\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00178352v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00557710v1\" target=\"_blank\" >Verifying Cryptographic Protocols with Subterms Constraints<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Denis Lugiez, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning &#8211; LPAR 2007<\/i>, Oct 2007, Yerevan, Armenia. pp.181-195, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-75560-9_15\">&#x27E8;10.1007\/978-3-540-75560-9_15&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-540-75560-9_15\" target=\"_blank\" >10.1007\/978-3-540-75560-9_15<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00557710v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00557707v1\" target=\"_blank\" >Towards an Automatic Analysis of Web Service Security<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Denis Lugiez, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>6th International Symposium on Frontiers of Combining Systems &#8211; FroCoS&rsquo;07<\/i>, Sep 2007, Liverpool, United Kingdom. pp.133-147, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-74621-8_9\">&#x27E8;10.1007\/978-3-540-74621-8_9&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/978-3-540-74621-8_9\" target=\"_blank\" >10.1007\/978-3-540-74621-8_9<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00557707v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00468721v1\" target=\"_blank\" >Intruders with Caps<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Rewriting Techniques and Applications &#8211; RTA&rsquo;07<\/i>, Jun 2007, Paris, France. pp.20&#8211;35<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00468721v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Other publications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00144178v1\" target=\"_blank\" >Intruders with Caps<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Paliath Narendran, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2007<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00144178\/file\/Lifo-RR2007-02.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00144178\/file\/Lifo-RR2007-02.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00144178\/file\/Lifo-RR2007-02.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00144178v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00133996v2\" target=\"_blank\" >Toward an Automatic Analysis of Web Service Security<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Denis Lugiez, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-6341, INRIA. 2007, pp.40<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00133996\/file\/RR-6341.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00133996\/file\/RR-6341.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00133996\/file\/RR-6341.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00133996v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2006<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000426v1\" target=\"_blank\" >Formal Design and Verification of Operational Transformation Algorithms for Copies Convergence<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdessamad Imine, Micha\u00ebl Rusinowitch, G\u00e9rald Oster, Pascal Molli<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2006, Algebraic Methodology and Software Technology, 351 (2), pp.167&#8211;183. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.tcs.2005.09.066\">&#x27E8;10.1016\/j.tcs.2005.09.066&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.tcs.2005.09.066\" target=\"_blank\" >10.1016\/j.tcs.2005.09.066<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00000426v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00108391v1\" target=\"_blank\" >Relating two standard notions of secrecy<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">V\u00e9ronique Cortier, Micha\u00ebl Rusinowitch, Eugen Zalinescu<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Proc. of the 20th Int. Conference Computer Science Logic (CSL&rsquo;06)<\/i>, Sep 2006, Szeged, Hungary<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00108391v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00579011v1\" target=\"_blank\" >Tree automata with equality constraints modulo equational theories<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Michael Rusinowitch, Laurent Vigneron<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>3d International Joint Conference on Automated Reasoning (IJCAR)<\/i>, Aug 2006, Seattle, United States. pp.557-571, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/11814771_45\">&#x27E8;10.1007\/11814771_45&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/11814771_45\" target=\"_blank\" >10.1007\/11814771_45<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00579011\/file\/rr-lsv-2006-07.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00579011\/file\/rr-lsv-2006-07.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00579011\/file\/rr-lsv-2006-07.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00579011v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Books<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00468802v1\" target=\"_blank\" >Journal of Automata, Languages and Combinatorics, Vol. 11(1)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Ga\u00e9tan Hains, Michael Rusinowitch, Paul Gastin, John Mullins<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">Otto-von-Guericke-Universit\u00e4t, D-39016 Magdeburg, pp.142, 2006<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00468802v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00071357v1\" target=\"_blank\" >Relating two Standard Notions of Secrecy<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Eugen Zalinescu, V\u00e9ronique Cortier, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-5908, INRIA. 2006, pp.32<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00071357\/file\/RR-5908.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00071357\/file\/RR-5908.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00071357\/file\/RR-5908.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00071357v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2005<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00103807v1\" target=\"_blank\" >An NP Decision Procedure for Protocol Insecurity with XOR<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Ralf K\u00fcsters, Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2005, Theoretical Computer Science, 338 (1-3), pp.247-274. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.tcs.2005.01.015\">&#x27E8;10.1016\/j.tcs.2005.01.015&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.tcs.2005.01.015\" target=\"_blank\" >10.1016\/j.tcs.2005.01.015<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00103807v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00077495v1\" target=\"_blank\" >Closure properties and decision problems of dag automata<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Information Processing Letters<\/i>, 2005, 94, pp.231&#8211;240. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.ipl.2005.02.004\">&#x27E8;10.1016\/j.ipl.2005.02.004&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/j.ipl.2005.02.004\" target=\"_blank\" >10.1016\/j.ipl.2005.02.004<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00077495v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000427v1\" target=\"_blank\" >Towards Synchronizing Linear Collaborative Objects with Operation Transformation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdessamad Imine, Pascal Molli, G\u00e9rald Oster, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Conference on Formal Techniques for Networked and Distributed Systems &#8211; FORTE 2005<\/i>, Oct 2005, Taipei\/Taiwan, pp.411-427<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00000427\/file\/37310411.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00000427\/file\/37310411.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00000427\/file\/37310411.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00000427v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000557v1\" target=\"_blank\" >A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">V\u00e9ronique Cortier, Micha\u00ebl Rusinowitch, Eugen Zalinescu<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming &#8211; PPDP&rsquo;05<\/i>, Jul 2005, Lisbonne\/Portugal, pp.12-22<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00000557v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00000408v1\" target=\"_blank\" >The AVISPA Tool for the automated validation of internet security protocols and applications<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Alessandro Armando, David Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuellar, Paul Hankes Drielsma, Pierre-Cyrille H\u00e9am, Olga Kouchnarenko, Jacopo Mantovani, Sebastian M\u00f6dersheim, David von Oheimb, Micha\u00ebl Rusinowitch, Judson Santos Santiago, Luca Vigano, Mathieu Turuani, Laurent Vigneron<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>17th International Conference on Computer Aided Verification &#8211; CAV 2005<\/i>, Jul 2005, Edinburgh, Scotland\/UK, France. pp.281-285<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00000408\/file\/avispa-cav.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00000408\/file\/avispa-cav.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00000408\/file\/avispa-cav.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00000408v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00070512v1\" target=\"_blank\" >Combining Intruder Theories<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-5495, INRIA. 2005, pp.37<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00070512\/file\/RR-5495.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00070512\/file\/RR-5495.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00070512\/file\/RR-5495.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00070512v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00071215v1\" target=\"_blank\" >Tree Automata with Equality Constraints Modulo Equational Theories<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Micha\u00ebl Rusinowitch, Laurent Vigneron<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-5754, INRIA. 2005, pp.27<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00071215\/file\/RR-5754.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00071215\/file\/RR-5754.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00071215\/file\/RR-5754.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00071215v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2004<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00077499v1\" target=\"_blank\" >Unification modulo ACUI plus Distributivity Axioms<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Paliath Narendran, Michael Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Automated Reasoning<\/i>, 2004, 33, pp.1&#8211;28<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00077499v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100005v1\" target=\"_blank\" >On the Fly Pattern Matching For Intrusion Detection with Snort<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tarek Abbes, Adel Bouhoula, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Annals of Telecommunications &#8211; annales des t\u00e9l\u00e9communications<\/i>, 2004, 59 (9-10), pp.941&#8211;967. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/BF03179710\">&#x27E8;10.1007\/BF03179710&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/BF03179710\" target=\"_blank\" >10.1007\/BF03179710<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100005v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099990v1\" target=\"_blank\" >Unification Modulo ACUI Plus Distributivity Axioms<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Paliath Narendran, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Automated Reasoning<\/i>, 2004, 33, pp.1-28. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s10817-004-2279-7\">&#x27E8;10.1007\/s10817-004-2279-7&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1007\/s10817-004-2279-7\" target=\"_blank\" >10.1007\/s10817-004-2279-7<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099990v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100013v1\" target=\"_blank\" >Deciding the Security of Protocols with Commuting Public Key Encryption.<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Ralf K\u00fcsters, Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Workshop on Automated Reasoning for Security Protocol Analysis &#8211; ARSPA&rsquo;2004<\/i>, Jul 2004, Cork, Ireland. 11 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100013v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100007v1\" target=\"_blank\" >Fast Multipattern Matching for Intrusion Detection<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tarek Abbes, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>13th Annual Conference on European Institute for Computer Anti-virus Research &#8211; EICAR&rsquo;2004<\/i>, May 2004, Luxemburg, Luxembourg, 22 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100007v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100006v1\" target=\"_blank\" >Protocol Analysis in Intrusion Detection Using Decision Tree<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tarek Abbes, Adel Bouhoula, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Conference on Information Technology: Coding and Computing &#8211; ITCC&rsquo;04<\/i>, Apr 2004, Las Vegas, Nevada, USA, pp.404&#8211;408<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100006v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100008v1\" target=\"_blank\" >High Performance Intrusion Detection using Traffic Classification<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tarek Abbes, Alakesh Haloi, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Conference on Advances in Intelligent Systems &#8211; Theory and Applications &#8211; AISTA 2004<\/i>, 2004, Luxembourg<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100008v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099991v1\" target=\"_blank\" >Automated Reasoning<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">David Basin, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Second International Joint Conference on Automated Reasoning &#8211; IJCAR&rsquo;2004<\/i>, 2004, Cork, Irlande, France. XII-491 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099991v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099993v1\" target=\"_blank\" >A Decidable Analysis of Security Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>18th IFIP World Computer Congress on Theoretical Computer Science &#8211; TCS&rsquo;2004<\/i>, 2004, Toulouse, France, 1 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099993v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099986v1\" target=\"_blank\" >Deductive Verification of Distributed Groupware Systems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdessamad Imine, Pascal Molli, G\u00e9rald Oster, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Tenth International Conference on Algebraic Methodology and Software Technology &#8211; AMAST 2004<\/i>, 2004, Stirling, Scotland, United Kingdom, pp.226-240<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099986v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Other publications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00077510v1\" target=\"_blank\" >How Useful are Dag Automata?<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Paliath Narendran, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2004<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00077510\/file\/RR2004-12.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00077510\/file\/RR2004-12.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00077510\/file\/RR2004-12.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00077510v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00071398v1\" target=\"_blank\" >Achieving Convergence with Operational Transformation in Distributed Groupware Systems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdessamad Imine, Pascal Molli, G\u00e9rald Oster, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-5188, INRIA. 2004, pp.19<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00071398\/file\/RR-5188.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00071398\/file\/RR-5188.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00071398\/file\/RR-5188.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00071398v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00070766v1\" target=\"_blank\" >Network Traffic Classification for Intrusion Detection<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tarek Abbes, Micha\u00ebl Rusinowitch, Alakesh Haloi<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-5230, INRIA. 2004, pp.20<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00070766\/file\/RR-5230.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00070766\/file\/RR-5230.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00070766\/file\/RR-5230.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00070766v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2003<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00103985v1\" target=\"_blank\" >Protocol insecurity with a finite number of sessions, composed keys is NP-complete.<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2003, Theoretical Computer Science, 1-3 (299), pp.451-475. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/S0304-3975(02)00490-5\">&#x27E8;10.1016\/S0304-3975(02)00490-5&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/S0304-3975(02)00490-5\" target=\"_blank\" >10.1016\/S0304-3975(02)00490-5<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00103985v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099508v1\" target=\"_blank\" >Deciding the Confluence of Ordered Term Rewrite Systems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Hubert Comon-Lundh, Paliath Narendran, Robert Nieuwenhuis, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ACM Transactions on Computational Logic<\/i>, 2003, 4 (1), pp.33-55. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/601775.601777\">&#x27E8;10.1145\/601775.601777&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1145\/601775.601777\" target=\"_blank\" >10.1145\/601775.601777<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099508v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00103935v1\" target=\"_blank\" >Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Ralf K\u00fcsters, Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference<\/i>, Dec 2003, Mumbai, India, pp.124-135<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00103935v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099514v1\" target=\"_blank\" >Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Ralf K\u00fcsters, Micha\u00ebl Rusinowitch, Mathieu Turuani, Laurent Vigneron<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Computer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt G\u00fcdel Colloquium, KGC 2003<\/i>, Aug 2003, Vienna, Austria, pp.128-141<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099514v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099496v1\" target=\"_blank\" >Filtrage Efficace Pour la D\u00e9tection d&rsquo;Intrusions<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Tarek Abbes, Adel Bouhoula, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Conf\u00e9rence Francophone sur S\u00e9curit\u00e9 et Architecture R\u00e9seaux (SAR&rsquo;03)<\/i>, Jul 2003, Nancy, France, 10 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00099496\/file\/A03-R-537.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00099496\/file\/A03-R-537.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00099496\/file\/A03-R-537.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00099496v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00103954v1\" target=\"_blank\" >An NP Decision Procedure for Protocol Insecurity with XOR<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Ralf K\u00fcsters, Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>18th IEEE Symposium on Logic in Computer Science (LICS 2003)<\/i>, Jun 2003, Ottawa, Canada, pp.261-270<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00103954v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00080670v1\" target=\"_blank\" >Unification modulo ACUI plus Homomorphisms\/Distributivity<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Paliath Narendran, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2003, pp.442&#8211;457<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00080670v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00107652v1\" target=\"_blank\" >Proving Correctness of Transformation Functions in Real-Time Groupware<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Abdessamad Imine, Pascal Molli, G\u00e9rald Oster, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>8th European Conference of Computer-supported Cooperative Work &#8211; ECSCW&rsquo;03<\/i>, 2003, Helsinki, Finland, 18 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00107652\/file\/A03-R-096.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00107652\/file\/A03-R-096.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00107652\/file\/A03-R-096.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00107652v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00080663v1\" target=\"_blank\" >ACID-Unification is NEXPTIME-Decidable<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Siva Anantharaman, Paliath Narendran, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2003, pp.169&#8211;178<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-00080663v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00071714v1\" target=\"_blank\" >Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Ralf K\u00fcsters, Micha\u00ebl Rusinowitch, Mathieu Turuani, Laurent Vigneron<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-4869, INRIA. 2003, pp.22<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00071714\/file\/RR-4869.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00071714\/file\/RR-4869.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00071714\/file\/RR-4869.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00071714v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00071889v1\" target=\"_blank\" >An NP Decision Procedure for Protocol Insecurity with XOR<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Yannick Chevalier, Ralf K\u00fcsters, Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-4697, INRIA. 2003, pp.22<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00071889\/file\/RR-4697.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00071889\/file\/RR-4697.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00071889\/file\/RR-4697.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00071889v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00071812v1\" target=\"_blank\" >Computing Approximations of Linear Transition Systems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Julien Musset, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-4774, INRIA. 2003, pp.20<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00071812\/file\/RR-4774.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00071812\/file\/RR-4774.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00071812\/file\/RR-4774.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00071812v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2002<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100714v1\" target=\"_blank\" >Observational proofs by rewriting<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Adel Bouhoula, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2002, 275 (1-2), pp.675-698. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/S0304-3975(01)00333-4\">&#x27E8;10.1016\/S0304-3975(01)00333-4&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1016\/S0304-3975(01)00333-4\" target=\"_blank\" >10.1016\/S0304-3975(01)00333-4<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100714v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00103879v1\" target=\"_blank\" >Analyse Automatique de Protocoles de S\u00e9curit\u00e9 avec CASRUL<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mehdi Bouallagui, Yannick Chevalier, Micha\u00ebl Rusinowitch, Mathieu Turuani, Laurent Vigneron<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>S\u00e9curit\u00e9 et Architecture R\u00e9seaux &#8211; SAR&rsquo;2002<\/i>, Jul 2002, Marrackech, Maroc, Morocco<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00103879v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100915v1\" target=\"_blank\" >The AVISS Security Protocol Analysis Tool<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Alessandro Armando, David Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Moedersheim, Micha\u00ebl Rusinowitch, Mathieu Turuani, Luca Vigano, Laurent Vigneron<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>14th International Conference on Computer Aided Verification &#8211; CAV&rsquo;2002<\/i>, Jul 2002, Copenhaguen, Denmark, pp.349-353<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100915v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00107574v1\" target=\"_blank\" >Development of Transformation Functions Assisted by a Theorem Prover<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Imine Abdessamad, Pascal Molli, G\u00e9rald Oster, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Fourth International Workshop on Collaborative Editing 2002 &#8211; ACM CSCW&rsquo;2002<\/i>, 2002, Nouvelle-Orl\u00e9ans, USA, 8 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00107574\/file\/A02-R-161.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00107574\/file\/A02-R-161.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00107574\/file\/A02-R-161.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00107574v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2001<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100446v1\" target=\"_blank\" >Algorithms and Reductions for Rewriting Problems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Rakesh Verma, Micha\u00ebl Rusinowitch, Denis Lugiez<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Fundamenta Informaticae<\/i>, 2001, 46 (3), pp.257-276<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100446v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100412v1\" target=\"_blank\" >Uniform Derivation of Decision Procedures by Superposition<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Alessandro Armando, Silvio Ranise, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Conference of the European Association for Computer Science Logic &#8211; CSl&rsquo;2001<\/i>, Sep 2001, Paris, France, 15 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100412v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100411v1\" target=\"_blank\" >Protocol Insecurity with Finite Number of Sessions is NP-complete<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>14th IEEE Computer Security Foundations Workshop<\/i>, Jun 2001, Cape Breton, Nova Scotia, Canada, 14 p, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CSFW.2001.930145\">&#x27E8;10.1109\/CSFW.2001.930145&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">DOI<\/dt>\n<dd class=\"ValeurRes DOI\">DOI : <a href=\"\/\/dx.doi.org\/10.1109\/CSFW.2001.930145\" target=\"_blank\" >10.1109\/CSFW.2001.930145<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100411v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100501v1\" target=\"_blank\" >An effective fixed point calculus for deterministic systems applied to model checking<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Julien Musset, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>First International Workshop on Automated Verification of Infinite-State Systems &#8211; AVIS&rsquo;01<\/i>, Mar 2001, Berlin, Germany, 4 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100501v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100928v1\" target=\"_blank\" >Incorporating Decision Procedures in Implicit Induction<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Alessandro Armando, Micha\u00ebl Rusinowitch, Sorin Stratulat<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Eight International Conference on Computer Aided Systems Theory &#8211; Eurocast&rsquo;2001<\/i>, Feb 2001, Casa de Colon, Las Palmas de Gran Canaria, Spain, 16 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100928v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100558v1\" target=\"_blank\" >Deciding insecurity for non-atomic keys<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Dagstuhl Seminar on Specification and Analysis of Secure Cryptographic Protocols<\/i>, D. Basin (Freiburg), G. Denker (SRI, Menlo Park), G. Lowe (Leicester), J. Millen (SRI Menlo Park), 2001, Dagstuhl, Germany<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100558v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100610v1\" target=\"_blank\" >Incorporating Decision Procedures in Implicit Induction<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Alessandro Armando, Micha\u00ebl Rusinowitch, Sorin Stratulat<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>9th Symposium on the Integration of Symbolic Computation and Mechanized Reasoning &#8211; CALCULEMUS&rsquo;2001<\/i>, 2001, Sienne, Italy, 16 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100610v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100414v1\" target=\"_blank\" >The practice of cryptographic protocols verification<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CAV Workshop on Logical Aspects of Cryptographic Protocols Verification<\/i>, 2001, Paris, France, 1 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100414v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100611v1\" target=\"_blank\" >Uniform Derivation of Satisfiability Procedures<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>R\u00e9solution de contraintes du 1er ordre dans des structures vari\u00e9es<\/i>, A. Colmerauer, 2001, Marseille, France, 2 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100611v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100561v1\" target=\"_blank\" >Improved Subsumption for CLP-based Verification<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Julien Musset, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Workshop on (Constraint) Logic Programming and Software Engineering &#8211; CLPSE&rsquo;2001<\/i>, Gopal Gupta, 2001, Paphos, Cyprus, 9 p<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100561v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100559v1\" target=\"_blank\" >V\u00e9rification automatique de protocoles cryptographiques avec CASRUL<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journ\u00e9es Syst\u00e8mes et Logiciels Critiques<\/i>, 2001, Grenoble, France<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100559v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100413v1\" target=\"_blank\" >Rewriting for Deduction and Verification<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Conference on Rewriting Techniques and Applications &#8211; RTA&rsquo;2001<\/i>, 2001, Utrecht, The Netherlands, pp.2<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100413v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00100557v1\" target=\"_blank\" >V\u00e9rification et r\u00e9\u00e9criture<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journ\u00e9es Syst\u00e8mes Infinis<\/i>, A. Bouajjani, 2001, Paris, France<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00100557v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00072492v1\" target=\"_blank\" >Protocol Insecurity with Finite Number of Sessions is NP-complete<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-4134, INRIA. 2001, pp.18<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00072492\/file\/RR-4134.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00072492\/file\/RR-4134.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00072492\/file\/RR-4134.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00072492v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00072474v1\" target=\"_blank\" >Uniform Derivation of Decision Procedures by Superposition<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Alessandro Armando, Silvio Ranise, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-4151, INRIA. 2001, pp.13<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00072474\/file\/RR-4151.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00072474\/file\/RR-4151.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00072474\/file\/RR-4151.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00072474v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2000<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099167v1\" target=\"_blank\" >Mechanical Verification of an Ideal Incremental ABR Conformance Algorithm<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Micha\u00ebl Rusinowitch, Sorin Stratulat, Francis Klay<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>12th International Conference on Computer Aided Verification &#8211; CAV&rsquo;2000<\/i>, 2000, Chicago, USA, pp.344-357<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099167v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099161v1\" target=\"_blank\" >Compiling and Verifying Security Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Micha\u00ebl Rusinowitch, Laurent Vigneron<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Conference on Logic Programming &#038; Automated Reasoning &#8211; LPAR&rsquo;2000<\/i>, 2000, Reunion Island, France, pp.131-160<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099161v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00099166v1\" target=\"_blank\" >The theory of total unary RPO is decidable<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Paliath Narendran, Micha\u00ebl Rusinowitch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>First International Conference on Computational Logic &#8211; Cl&rsquo;2000<\/i>, 2000, Londres, UK, pp.660-672<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/inria.hal.science\/inria-00099166v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/inria-00072712v1\" target=\"_blank\" >Compiling and Verifying Security Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Florent Jacquemard, Micha\u00ebl Rusinowitch, Laurent Vigneron<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] RR-3938, INRIA. 2000, pp.25<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/inria-00072712\/file\/RR-3938.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/inria-00072712\/file\/RR-3938.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/inria-00072712\/file\/RR-3938.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/inria-00072712v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl><\/div>\n<p> <\/body> <\/html> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Publications HAL de Michael, Rusinowitch 2026 Conference papers titre CauseRL: Reinforcement Learning-based Random Walks for Root Cause Analysis in Microservices auteur Jhon Sebastian Rojas Rodriguez, Abdelkader Lahmadi, Micha\u00ebl Rusinowitch article 41st ACM\/SIGAPP Symposium On Applied Computing, Mar 2026, Thessaloniki, Greece. &#x27E8;10.1145\/3748522.3779836&#x27E9; DOI DOI : 10.1145\/3748522.3779836 Acc\u00e8s au texte int\u00e9gral et bibtex 2025 Conference papers [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/MRusinowitch\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/MRusinowitch\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/MRusinowitch\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/MRusinowitch\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/MRusinowitch\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":17,"href":"https:\/\/members.loria.fr\/MRusinowitch\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":238,"href":"https:\/\/members.loria.fr\/MRusinowitch\/wp-json\/wp\/v2\/pages\/13\/revisions\/238"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/MRusinowitch\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}