Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
geoffrey e hinton
Joan Boyar
Helen M. Grindley
Bryan Abreo
Claudia Calabrese
Hao Mao
Peter Malec
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
MATHIEU TURUANI
Author Info
Open Visualization
Name
Affiliation
Papers
MATHIEU TURUANI
LORIA-INRIA-Université Henri Poincaré, 54506 Vandoeuvre-les-Nancy, France
23
Collaborators
Citations
PageRank
51
698
31.32
Referers
Referees
References
633
365
381
Search Limit
100
633
Publications (23 rows)
Collaborators (51 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability
0
0.34
2022
Verifiability Analysis of CHVote.
0
0.34
2018
A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif
5
0.44
2018
Automated Verification of Electrum Wallet
2
0.40
2016
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
1
0.35
2012
Towards the orchestration of secured services under non-disclosure policies
1
0.36
2012
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
50
1.45
2012
Distributed orchestration of web services under security constraints
2
0.37
2011
Towards formal validation of trust and security in the internet of services
2
0.37
2011
Satisfiability of general intruder constraints with a set constructor
4
0.41
2010
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists
5
0.42
2009
Validating Integrity for the Ephemerizer's Protocol with CL-Atse
7
0.56
2009
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
7
0.45
2008
Implementing a Unification Algorithm for Protocol Analysis with XOR
4
0.46
2006
The CL-Atse protocol analyser
90
2.49
2006
Compositional Analysis of Contract Signing Protocols
13
0.67
2005
Probabilistic polynomial-time semantics for a protocol security logic
61
1.78
2005
Deciding the Security of Protocols with Commuting Public Key Encryption
11
0.73
2005
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents
70
3.12
2003
An NP Decision Procedure for Protocol Insecurity with XOR
114
4.61
2003
Protocol insecurity with a finite number of sessions and composed keys is NP-complete
76
2.07
2003
The AVISS Security Protocol Analysis Tool
36
2.89
2002
Protocol Insecurity with Finite Number of Sessions is NP-Complete
137
6.25
2001
1