| 2008 |
| 11 | | Kamel Adi,
Liviu Pene:
Formal Reasoning for Security Protocol Correctness.
SoMeT 2008: 63-83 |
| 2007 |
| 10 | | Mahjoub Langar,
Mohamed Mejri,
Kamel Adi:
A Formal Approach for Security Policy Enforcement in Concurrent Programs.
Security and Management 2007: 165-171 |
| 9 | | Lamia Hamza,
Kamel Adi:
Formal Technique for Discovering Complex Attacks in Computer Systems.
SoMeT 2007: 185-199 |
| 2006 |
| 8 | EE | Lamia Hamza,
Kamel Adi,
Karim El Guemhioui:
Automatic generation of attack scenarios for intrusion detection systems.
AICT/ICIW 2006: 205 |
| 7 | | Hakima Ould-Slimane,
Mohamed Mejri,
Kamel Adi:
Enforcing Security Policies on Programs.
SoMeT 2006: 195-207 |
| 6 | | Liviu Pene,
Kamel Adi:
A Calculus for Distributed Firewall Specification and Verification.
SoMeT 2006: 301-315 |
| 2005 |
| 5 | EE | Kamel Adi,
Liviu Pene:
Secrecy Correctness for Security Protocols.
DFMA 2005: 22-29 |
| 2003 |
| 4 | | Kamel Adi,
Mourad Debbabi,
Mohamed Mejri:
A new logic for electronic commerce protocols.
Theor. Comput. Sci. 291(3): 223-283 (2003) |
| 2001 |
| 3 | EE | Kamel Adi,
Mourad Debbabi:
Abstract interpretation for proving secrecy properties in security protocols.
Electr. Notes Theor. Comput. Sci. 55(1): (2001) |
| 2000 |
| 2 | EE | Kamel Adi,
Mourad Debbabi,
Mohamed Mejri:
A New Logic for Electronic Commerce Protocols.
AMAST 2000: 499-513 |
| 1996 |
| 1 | | Didier Bert,
Rachid Echahed,
Kamel Adi:
Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation.
AMAST 1996: 629-632 |