Mathieu Turuani

From MaRDI portal
(Redirected from Person:507347)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
ACM Transactions on Computational Logic
2017-07-12Paper
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
Journal of Symbolic Computation
2017-02-06Paper
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
Journal of Symbolic Computation
2017-02-06Paper
Satisfiability of general intruder constraints with and without a set constructor
Journal of Symbolic Computation
2017-02-06Paper
Deciding the security of protocols with commuting public key encryption2013-09-25Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
Lecture Notes in Computer Science
2009-08-06Paper
The CL-Atse Protocol Analyser
Lecture Notes in Computer Science
2008-09-25Paper
Computer Science Logic
Lecture Notes in Computer Science
2007-06-21Paper
Compositional analysis of contract-signing protocols
Theoretical Computer Science
2007-01-09Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
An NP decision procedure for protocol insecurity with XOR
Theoretical Computer Science
2005-06-30Paper
Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
Theoretical Computer Science
2003-05-25Paper
scientific article; zbMATH DE number 1903364 (Why is no real title available?)2003-05-01Paper


Research outcomes over time


This page was built for person: Mathieu Turuani