2008 |
11 | | Kamel Adi,
Liviu Pene:
Formal Reasoning for Security Protocol Correctness.
SoMeT 2008: 63-83 |
2007 |
10 | | Mahjoub Langar,
Mohamed Mejri,
Kamel Adi:
A Formal Approach for Security Policy Enforcement in Concurrent Programs.
Security and Management 2007: 165-171 |
9 | | Lamia Hamza,
Kamel Adi:
Formal Technique for Discovering Complex Attacks in Computer Systems.
SoMeT 2007: 185-199 |
2006 |
8 | EE | Lamia Hamza,
Kamel Adi,
Karim El Guemhioui:
Automatic generation of attack scenarios for intrusion detection systems.
AICT/ICIW 2006: 205 |
7 | | Hakima Ould-Slimane,
Mohamed Mejri,
Kamel Adi:
Enforcing Security Policies on Programs.
SoMeT 2006: 195-207 |
6 | | Liviu Pene,
Kamel Adi:
A Calculus for Distributed Firewall Specification and Verification.
SoMeT 2006: 301-315 |
2005 |
5 | EE | Kamel Adi,
Liviu Pene:
Secrecy Correctness for Security Protocols.
DFMA 2005: 22-29 |
2003 |
4 | | Kamel Adi,
Mourad Debbabi,
Mohamed Mejri:
A new logic for electronic commerce protocols.
Theor. Comput. Sci. 291(3): 223-283 (2003) |
2001 |
3 | EE | Kamel Adi,
Mourad Debbabi:
Abstract interpretation for proving secrecy properties in security protocols.
Electr. Notes Theor. Comput. Sci. 55(1): (2001) |
2000 |
2 | EE | Kamel Adi,
Mourad Debbabi,
Mohamed Mejri:
A New Logic for Electronic Commerce Protocols.
AMAST 2000: 499-513 |
1996 |
1 | | Didier Bert,
Rachid Echahed,
Kamel Adi:
Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation.
AMAST 1996: 629-632 |