Mohamed Mejri Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHakima Ould-Slimane, Mohamed Mejri, Kamel Adi: Using Edit Automata for Rewriting-Based Security Enforcement. DBSec 2009: 175-190
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMohamed Mejri, Kamel Adi, Hamido Fujita: Formal Specification and Analysis of Firewalls. SoMeT 2009: 284-293
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMehdi Talbi, Mohamed Mejri, Adel Bouhoula: Specification and evaluation of polymorphic shellcode properties using a new temporal logic. Journal in Computer Virology 5(3): 171-186 (2009)
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHanane Houmani, Mohamed Mejri, Hamido Fujita: Secrecy of cryptographic protocols under equational theory. Knowl.-Based Syst. 22(3): 160-173 (2009)
2008
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohamed Mejri: Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study. ICICS 2008: 403-418
29no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHanane Houmani, Mohamed Mejri: Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy. SECRYPT 2008: 184-189
28no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMohamed Mejri, Hamido Fujita: Enforcing Security Policies Using Algebraic Approach. SoMeT 2008: 84-98
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMehdi Talbi, Meriam Ben Ghorbel, Mohamed Mejri: Intrusion Detection Prototype Based on ADM-Logic. JSW 3(2): 15-22 (2008)
2007
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMeriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri: Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. ARES 2007: 206-212
25no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHanane Houmani, Mohamed Mejri: Practical and Universal Interpretation Functions for Secrecy. SECRYPT 2007: 157-164
24no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMahjoub Langar, Mohamed Mejri, Kamel Adi: A Formal Approach for Security Policy Enforcement in Concurrent Programs. Security and Management 2007: 165-171
23no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLT. Mechri, Mahjoub Langar, Mohamed Mejri, Hamido Fujita, Yutaka Funyu: Automatic Enforcement of Security in Computer Networks. SoMeT 2007: 200-222
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHanane Houmani, Mohamed Mejri: Secrecy by interpretation functions. Knowl.-Based Syst. 20(7): 617-635 (2007)
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBéchir Ktari, Hamido Fujita, Mohamed Mejri, Daniel Godbout: Toward a new software development environment. Knowl.-Based Syst. 20(7): 683-693 (2007)
2006
20no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHamido Fujita, Mohamed Mejri: New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada IOS Press 2006
19no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHakima Ould-Slimane, Mohamed Mejri, Kamel Adi: Enforcing Security Policies on Programs. SoMeT 2006: 195-207
18no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFrançois Gagnon, Mohamed Mejri: A Decision Procedure for Structured Cryptographic Protocols. SoMeT 2006: 272-286
17no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel Godbout, Béchir Ktari, Mohamed Mejri: A Formal Translation From an Imperative Language With Array to a Declarative Language. SoMeT 2006: 319-339
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHamido Fujita, Béchir Ktari, Mohamed Mejri: Implementing Lyee-Calculus in Java. Knowl.-Based Syst. 19(2): 116-129 (2006)
15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMohamed Mbarki, Mohamed Mejri, Béchir Ktari: Converting an imperative program to a declarative one. Knowl.-Based Syst. 19(2): 130-140 (2006)
2005
14no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHamido Fujita, Mohamed Mejri: New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2005, September 28-30, 2005, Tokyo, Japan IOS Press 2005
13no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMahjoub Langar, Mohamed Mejri: Formal and Efficient Enforcement of Security Policies. FCS 2005: 143-149
12no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLBéchir Ktari, Mohamed Mejri, Daniel Godbout, Hamido Fujita: LyeeBuilder. SoMeT 2005: 83-99
2004
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMohamed Mejri: Chaotic Protocols. ICCSA (1) 2004: 938-948
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAlexandre Lacasse, Mohamed Mejri, Béchir Ktari: Formal Implementation of Network Security Policies. PST 2004: 161-166
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMathieu Couture, Béchir Ktari, Mohamed Mejri, Frédéric Massicotte: A Declarative Approach to Stateful Intrusion Detection and Network Monitoring. PST 2004: 175-179
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHamido Fujita, Mohamed Mejri, Béchir Ktari: A process algebra to formalize the Lyee methodology. Knowl.-Based Syst. 17(5-6): 263-281 (2004)
2003
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMohamed Mejri, Béchir Ktari, Hamido Fujita, M. M. Erhioui: Static analysis of Lyee requirements. Knowl.-Based Syst. 16(7-8): 361-382 (2003)
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell: Security by typing. STTT 4(4): 472-495 (2003)
5no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKamel Adi, Mourad Debbabi, Mohamed Mejri: A new logic for electronic commerce protocols. Theor. Comput. Sci. 291(3): 223-283 (2003)
2000
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKamel Adi, Mourad Debbabi, Mohamed Mejri: A New Logic for Electronic Commerce Protocols. AMAST 2000: 499-513
1998
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMourad Debbabi, Y. Legaré, Mohamed Mejri: An Environment for the Specification and Analysis of Cryptoprotocols. ACSAC 1998: 321-332
1997
2no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi: Formal Automatic Verification of Authentication Crytographic Protocols. ICFEM 1997: 50-59
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi: From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. WETICE 1997: 256-262

Coauthor Index

1Kamel Adi [4] [5] [19] [24] [33] [34]
2Meriam Ben-Ghorbel-Talbi (Meriam Ben Ghorbel) [26] [27]
3Adel Bouhoula [30] [32]
4Mathieu Couture [9]
5Mourad Debbabi [1] [2] [3] [4] [5] [6]
6Nancy A. Durgin [6]
7M. M. Erhioui [7]
8Hamido Fujita [7] [8] [12] [14] [16] [20] [21] [23] [28] [31] [33]
9Yutaka Funyu [23]
10François Gagnon [18]
11Daniel Godbout [12] [17] [21]
12Hanane Houmani [22] [25] [29] [31]
13Béchir Ktari [7] [8] [9] [10] [12] [15] [16] [17] [21]
14Alexandre Lacasse [10]
15Mahjoub Langar [13] [23] [24]
16Y. Legaré [3]
17Frédéric Massicotte [9]
18Mohamed Mbarki [15]
19T. Mechri [23]
20John C. Mitchell [6]
21Benjamin Morin [30]
22Hakima Ould-Slimane [19] [34]
23Mehdi Talbi [26] [27] [30] [32]
24Nadia Tawbi [1] [2]
25Valérie Viet Triem Tong [30]
26I. Yahmadi [1] [2]

Colors in the list of coauthors

Copyright © Mon Mar 15 21:39:48 2010 by Michael Ley (ley@uni-trier.de)