Michaël Rusinowitch
Affiliations:- INRIA, France
According to our database1,
Michaël Rusinowitch
authored at least 171 papers
between 1986 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on loria.fr
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2024
2023
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023
2022
Proceedings of the 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2022
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022
Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
2021
Proceedings of the 9th International Symposium on Symbolic Computation in Software Science, 2021
FOX: Fooling with Explanations : Privacy Protection with Adversarial Reactions in Social Media.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
You are what emojis say about your pictures: language-independent gender inference attack on Facebook.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
Proceedings of the 23rd Conference on Innovation in Clouds, 2020
Proceedings of the Database and Expert Systems Applications, 2020
Proceedings of the 16th International Conference on Network and Service Management, 2020
Proceedings of the ADBIS, TPDL and EDA 2020 Common Workshops and Doctoral Consortium, 2020
2019
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
Poster : Minimizing range rules for packet filtering using a double mask representation.
Proceedings of the 2019 IFIP Networking Conference, 2019
Proceedings of the Automated Deduction - CADE 27, 2019
2018
Proceedings of the Workshops of the EDBT/ICDT 2018 Joint Conference (EDBT/ICDT 2018), 2018
Online Testing of User Profile Resilience Against Inference Attacks in Social Networks.
Proceedings of the New Trends in Databases and Information Systems, 2018
2017
J. Symb. Comput., 2017
Intruder deducibility constraints with negation. Decidability and application to secured service compositions.
J. Symb. Comput., 2017
Proceedings of the Database and Expert Systems Applications, 2017
2016
Int. J. Inf. Sec., 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 16ème Journées Francophones Extraction et Gestion des Connaissances, 2016
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
Softw. Test. Verification Reliab., 2015
J. Symb. Comput., 2015
Expressive Equivalence and Succinctness of Parametrized Automata with Respect to Finite Memory Automata.
Proceedings of the Service-Oriented Computing - ICSOC 2015 Workshops, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
Pervasive Mob. Comput., 2014
Log. Methods Comput. Sci., 2014
Proceedings of the Service-Oriented Computing - ICSOC 2014 Workshops, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014
Proceedings of the Advances in Modal Logic 10, 2014
2013
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013
Proceedings of the Language and Automata Theory and Applications, 2013
Proceedings of the 17th International Database Engineering & Applications Symposium, 2013
2012
Proceedings of the Proceedings Fourth International Symposium on Symbolic Computation in Software Science, 2012
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Language and Automata Theory and Applications, 2012
Proceedings of the Automated Reasoning - 6th International Joint Conference, 2012
2011
J. Autom. Lang. Comb., 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 10th International Symposium on Parallel and Distributed Computing, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures.
Theor. Comput. Sci., 2010
Int. J. Secur. Networks, 2010
Combining Satisfiability Procedures for Unions of Theories with a Shared Counting Operator.
Fundam. Informaticae, 2010
Proceedings of the Trust, 2010
Proceedings of the 12th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2010
Proceedings of the Formal Methods for Components and Objects - 9th International Symposium, 2010
Proceedings of the CRiSIS 2010, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Proceedings of the Frontiers of Combining Systems, 7th International Symposium, 2009
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the Automated Deduction, 2009
2008
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption.
ACM Trans. Comput. Log., 2008
J. Log. Algebraic Methods Program., 2008
Proceedings of the 22nd International Workshop on Unification, 2008
Proceedings of the 2008 IEEE Congress on Services, Part I, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the Rewriting Techniques and Applications, 19th International Conference, 2008
08171 Summary - Beyond the Finite: New Challenges in Verification and Semistructured Data.
Proceedings of the Beyond the Finite: New Challenges in Verification and Semistructured Data, 20.04., 2008
08171 Abstracts Collection - Beyond the Finite: New Challenges in Verification and Semistructured Data.
Proceedings of the Beyond the Finite: New Challenges in Verification and Semistructured Data, 20.04., 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the Term Rewriting and Applications, 18th International Conference, 2007
Proceedings of the Logic for Programming, 2007
Proceedings of the Frontiers of Combining Systems, 6th International Symposium, 2007
Proceedings of the Rewriting, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Formal design and verification of operational transformation algorithms for copies convergence.
Theor. Comput. Sci., 2006
2005
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures.
Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005
2004
Theory Comput. Syst., 2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Ann. des Télécommunications, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004
Proceedings of the Algebraic Methodology and Software Technology, 2004
2003
ACM Trans. Comput. Log., 2003
Theor. Comput. Sci., 2003
J. Autom. Reason., 2003
Proceedings of the 12th International Workshop on Functional and Constraint Logic Programming, 2003
Proceedings of the Mathematical Foundations of Computer Science 2003, 2003
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents.
Proceedings of the FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 2003
Proceedings of the FME 2003: Formal Methods, 2003
Proceedings of the Eighth European Conference on Computer Supported Cooperative Work, 2003
Proceedings of the Computer Science Logic, 17th International Workshop, 2003
Proceedings of the Automated Deduction - CADE-19, 19th International Conference on Automated Deduction Miami Beach, FL, USA, July 28, 2003
2002
Proceedings of the Computer Aided Verification, 14th International Conference, 2002
2001
Proceedings of the Logical Aspects of Cryptographic Protocol Verification, 2001
Proceedings of the Rewriting Techniques and Applications, 12th International Conference, 2001
Proceedings of the Computer Science Logic, 15th International Workshop, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
Proceedings of the Logic for Programming and Automated Reasoning, 2000
Proceedings of the Computational Logic, 2000
Proceedings of the Computer Aided Verification, 12th International Conference, 2000
1999
Proceedings of the Perspectives of System Informatics, 1999
1998
Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, 1998
Proceedings of the Fundamental Approaches to Software Engineering, 1998
Proceedings of the Computer Science Logic, 12th International Workshop, 1998
1997
Theor. Comput. Sci., 1997
1996
J. Autom. Reason., 1996
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996
Proceedings of the Rewriting Techniques and Applications, 7th International Conference, 1996
Proceedings of the Computer Aided Verification, 8th International Conference, 1996
1995
Inf. Process. Lett., 1995
Appl. Algebra Eng. Commun. Comput., 1995
Proceedings of the Algebraic Methodology and Software Technology, 1995
1994
Proceedings of the 1994 ACM Symposium on Applied Computing, 1994
The Complexity of Testing Ground Reducibility for Linear Word Rewriting Systems with Variables.
Proceedings of the Conditional and Typed Rewriting Systems, 4th International Workshop, 1994
1993
Int. J. Artif. Intell. Tools, 1993
Proceedings of the Eighth Annual Symposium on Logic in Computer Science (LICS '93), 1993
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993
1992
Proceedings of the Logic Programming and Automated Reasoning, 1992
1991
Proving Refutational Completeness of Theorem-Proving Strategies: The Transfinite Semantic Tree Method.
J. ACM, 1991
Proceedings of the Rewriting Techniques and Applications, 4th International Conference, 1991
Proceedings of the Fundamentals of Computation Theory, 8th International Symposium, 1991
Studies on the Ground Convergence Property of Conditional Theories.
Proceedings of the Algebraic Methodology and Software Technology (AMAST '91), 1991
1990
Mechanizing inductive reasoning.
Bull. EATCS, 1990
Proceedings of the Expert Systems in Engineering, 1990
Deductive/Abductvie Diagnosis: The DA-Principles.
Proceedings of the 9th European Conference on Artificial Intelligence, 1990
Proceedings of the Conditional and Typed Rewriting Systems, 1990
1988
Theorem-Proving with Resolution and Superposition: An Extension of the Knuth and Bendic Procedure to a Complete Set of Inference Rules.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1988
1987
J. Symb. Comput., 1987
Inf. Process. Lett., 1987
Proceedings of the 10th International Joint Conference on Artificial Intelligence. Milan, 1987
Proceedings of the Automata, Languages and Programming, 14th International Colloquium, 1987
1986
Proceedings of the 8th International Conference on Automated Deduction, Oxford, England, July 27, 1986