dblp.uni-trier.dewww.uni-trier.de

Mohamed Mejri

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
29EEHanane Houmani, Mohamed Mejri, Hamido Fujita: Secrecy of cryptographic protocols under equational theory. Knowl.-Based Syst. 22(3): 160-173 (2009)
2008
28EEMehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohamed Mejri: Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study. ICICS 2008: 403-418
27 Mohamed Mejri, Hamido Fujita: Enforcing Security Policies Using Algebraic Approach. SoMeT 2008: 84-98
26EEMehdi Talbi, Meriam Ben Ghorbel, Mohamed Mejri: Intrusion Detection Prototype Based on ADM-Logic. JSW 3(2): 15-22 (2008)
2007
25EEMeriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri: Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. ARES 2007: 206-212
24 Mahjoub Langar, Mohamed Mejri, Kamel Adi: A Formal Approach for Security Policy Enforcement in Concurrent Programs. Security and Management 2007: 165-171
23 T. Mechri, Mahjoub Langar, Mohamed Mejri, Hamido Fujita, Yutaka Funyu: Automatic Enforcement of Security in Computer Networks. SoMeT 2007: 200-222
22EEHanane Houmani, Mohamed Mejri: Secrecy by interpretation functions. Knowl.-Based Syst. 20(7): 617-635 (2007)
21EEBéchir Ktari, Hamido Fujita, Mohamed Mejri, Daniel Godbout: Toward a new software development environment. Knowl.-Based Syst. 20(7): 683-693 (2007)
2006
20 Hamido Fujita, Mohamed Mejri: New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada IOS Press 2006
19 Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi: Enforcing Security Policies on Programs. SoMeT 2006: 195-207
18 François Gagnon, Mohamed Mejri: A Decision Procedure for Structured Cryptographic Protocols. SoMeT 2006: 272-286
17 Daniel Godbout, Béchir Ktari, Mohamed Mejri: A Formal Translation From an Imperative Language With Array to a Declarative Language. SoMeT 2006: 319-339
16EEHamido Fujita, Béchir Ktari, Mohamed Mejri: Implementing Lyee-Calculus in Java. Knowl.-Based Syst. 19(2): 116-129 (2006)
15EEMohamed Mbarki, Mohamed Mejri, Béchir Ktari: Converting an imperative program to a declarative one. Knowl.-Based Syst. 19(2): 130-140 (2006)
2005
14 Hamido Fujita, Mohamed Mejri: New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2005, September 28-30, 2005, Tokyo, Japan IOS Press 2005
13 Mahjoub Langar, Mohamed Mejri: Formal and Efficient Enforcement of Security Policies. FCS 2005: 143-149
12 Béchir Ktari, Mohamed Mejri, Daniel Godbout, Hamido Fujita: LyeeBuilder. SoMeT 2005: 83-99
2004
11EEMohamed Mejri: Chaotic Protocols. ICCSA (1) 2004: 938-948
10EEAlexandre Lacasse, Mohamed Mejri, Béchir Ktari: Formal Implementation of Network Security Policies. PST 2004: 161-166
9EEMathieu Couture, Béchir Ktari, Mohamed Mejri, Frédéric Massicotte: A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. PST 2004: 175-179
8EEHamido Fujita, Mohamed Mejri, Béchir Ktari: A process algebra to formalize the Lyee methodology. Knowl.-Based Syst. 17(5-6): 263-281 (2004)
2003
7EEMohamed Mejri, Béchir Ktari, Hamido Fujita, M. M. Erhioui: Static analysis of Lyee requirements. Knowl.-Based Syst. 16(7-8): 361-382 (2003)
6EEMourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell: Security by typing. STTT 4(4): 472-495 (2003)
5 Kamel Adi, Mourad Debbabi, Mohamed Mejri: A new logic for electronic commerce protocols. Theor. Comput. Sci. 291(3): 223-283 (2003)
2000
4EEKamel Adi, Mourad Debbabi, Mohamed Mejri: A New Logic for Electronic Commerce Protocols. AMAST 2000: 499-513
1998
3EEMourad Debbabi, Y. Legaré, Mohamed Mejri: An Environment for the Specification and Analysis of Cryptoprotocols. ACSAC 1998: 321-332
1997
2 Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi: Formal Automatic Verification of Authentication Crytographic Protocols. ICFEM 1997: 50-59
1EEMourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi: From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. WETICE 1997: 256-262

Coauthor Index

1Kamel Adi [4] [5] [19] [24]
2Meriam Ben-Ghorbel-Talbi (Meriam Ben Ghorbel) [25] [26]
3Adel Bouhoula [28]
4Mathieu Couture [9]
5Mourad Debbabi [1] [2] [3] [4] [5] [6]
6Nancy A. Durgin [6]
7M. M. Erhioui [7]
8Hamido Fujita [7] [8] [12] [14] [16] [20] [21] [23] [27] [29]
9Yutaka Funyu [23]
10François Gagnon [18]
11Daniel Godbout [12] [17] [21]
12Hanane Houmani [22] [29]
13Béchir Ktari [7] [8] [9] [10] [12] [15] [16] [17] [21]
14Alexandre Lacasse [10]
15Mahjoub Langar [13] [23] [24]
16Y. Legaré [3]
17Frédéric Massicotte [9]
18Mohamed Mbarki [15]
19T. Mechri [23]
20John C. Mitchell [6]
21Benjamin Morin [28]
22Hakima Ould-Slimane [19]
23Mehdi Talbi [25] [26] [28]
24Nadia Tawbi [1] [2]
25Valérie Viet Triem Tong [28]
26I. Yahmadi [1] [2]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)