Name
Papers
Collaborators
MICHAËL RUSINOWITCH
107
76
Citations 
PageRank 
Referers 
1377
101.15
1107
Referees 
References 
1294
1374
Search Limit
1001000
Title
Citations
PageRank
Year
Double Mask: An Efficient Rule Encoding for Software Defined Networking00.342020
Gender Inference for Facebook Picture Owners.00.342019
One-variable context-free hedge automata00.342019
Online Testing of User Profile Resilience Against Inference Attacks in Social Networks.00.342018
Private Link Exchange over Social Graphs.00.342016
A Model-Based Testing Approach for Security Protocols.00.342016
Network Structure Release under Differential Privacy.00.342016
Analyse d'activité et exposition de la vie privée sur les médias sociaux.00.342016
Detecting Communities under Differential Privacy.20.362016
Online Link Disclosure Strategies for Social Networks.00.342016
Model‐based mutation testing from security protocols in HLPSL40.412015
Parametrized automata simulation and application to service composition.20.392015
Expressive Equivalence and Succinctness of Parametrized Automata with Respect to Finite Memory Automata.00.342015
Differentially Private Publication of Social Graphs at Linear Cost.10.352015
Practical access control management for distributed collaborative editors.60.432014
An EXPTIME Algorithm for Data-Aware Service Simulation Using Parametrized Automata.00.342014
Unification modulo a 2-sorted Equational theory for Cipher-Decipher Block Chaining.10.372014
A Parametrized Propositional Dynamic Logic with Application to Service Synthesis.20.382014
Compiling Symbolic Attacks To Protocol Implementation Tests00.342013
SVMAX: a system for secure and valid manipulation of XML data10.352013
Fresh-Variable Automata for Service Composition10.372013
Secure Collaboration For Smartphones00.342013
Guarded Variable Automata over Infinite Alphabets30.422013
Rewrite Closure and CF Hedge Automata10.362013
Intruder deducibility constraints with negation. Decidability and application to secured service compositions10.352012
Towards the orchestration of secured services under non-disclosure policies10.362012
Decidability of Equivalence of Symbolic Derivations50.442012
Optimistic access control for distributed collaborative editors30.402011
Web services verification and prudent implementation40.402011
Distributed orchestration of web services under security constraints20.372011
String Rewriting and Security Analysis: An Extension of a Result of Book and Otto.10.482011
Safe and efficient strategies for updating firewall policies10.372010
Orchestration under security constraints20.382010
Combinable Extensions of Abelian Groups70.482009
A Flexible Access Control Model for Distributed Collaborative Editors40.402009
Satisfiability Procedures for Combination of Theories Sharing Integer Offsets80.502009
Data structures with arithmetic constraints: a non-disjoint combination60.432009
08171 Abstracts Collection - Beyond the Finite: New Challenges in Verification and Semistructured Data.00.342008
An inference system for detecting firewall filtering rules anomalies100.662008
Automatic Composition of Services with Security Policies150.702008
08171 Summary - Beyond the Finite: New Challenges in Verification and Semistructured Data.00.342008
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption70.452008
Intruders with Caps120.572007
Verifying cryptographic protocols with subterms constraints30.382007
Towards an Automatic Analysis of Web Service Security60.422007
Formal design and verification of operational transformation algorithms for copies convergence311.292006
Automated Reasoning for Security Protocol Analysis00.342006
Combining Intruder Theories271.012005
Towards synchronizing linear collaborative objects with operational transformation20.382005
Deciding the Security of Protocols with Commuting Public Key Encryption110.732005
  • 1
  • 2