Mourad Debbabi

Affiliations: 
Universite Laval (Canada) 
Area:
Computer Science
Google:
"Mourad Debbabi"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Houmani H, Debbabi M. (2012) Formal analysis of the TLS handshake protocol Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 192-205
Adi K, Debbabi M. (2003) Abstract interpretation for proving secrecy properties in security protocols Electronic Notes in Theoretical Computer Science. 55: 25-50
Debbabi M, Durgin N, Mejri M, et al. (2003) Security by typing International Journal On Software Tools For Technology Transfer. 4: 472-495
Adi K, Debbabi M, Mejri M. (2000) A new logic for electronic commerce protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1816: 499-513
Adi K, Debbabi M, Mejri M. (2000) A new logic for electronic commerce protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1816: 499-513
Debbabi M, Benzakour A, Ktari B. (1998) A synergy between model-checking and type inference for the verification of value-passing higher-order processes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1548: 214-230
Debbabi M, Faour A, Tawbi N. (1997) A type based algorithm for the control flow analysis of higher order concurrent programs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1268: 247-266
Debbabi M, Mejri M, Tawbi N, et al. (1997) From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm Journal of Engineering and Applied Science. 256-261
Debbabi M, Mejri M, Tawbi N, et al. (1997) Formal automatic verification of authentication cryptographic protocols Proceedings of the International Conference On Formal Engineering Methods, Icfem. 50-59
See more...