Obserwuj
Pierre-Cyrille Heam
Pierre-Cyrille Heam
Université de Franche-Comté, Computer Science
Zweryfikowany adres z femto-st.fr
Tytuł
Cytowane przez
Cytowane przez
Rok
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
15582005
Improvements on the Genet and Klay technique to automatically verify security protocols
Y Boichut, PC Héam, O Kouchnarenko, F Oehl
Proc. AVIS 4, 84, 2004
1002004
Mutation-based test generation from security protocols in HLPSL
F Dadeau, PC Héam, R Kheddam
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
532011
Automatic verification of security protocols using approximations
Y Boichut, PC Héam, O Kouchnarenko
INRIA, 2005
472005
Efficient and cryptographically secure generation of chaotic pseudorandom numbers on gpu
C Guyeux, R Couturier, PC Héam, JM Bahi
The journal of Supercomputing 71, 3877-3903, 2015
372015
Finer is better: Abstraction refinement for rewriting approximations
Y Boichut, R Courbis, PC Héam, O Kouchnarenko
Rewriting Techniques and Applications: 19th International Conference, RTA …, 2008
292008
Model‐based mutation testing from security protocols in HLPSL
F Dadeau, PC Héam, R Kheddam, G Maatoug, M Rusinowitch
Software Testing, Verification and Reliability 25 (5-7), 684-711, 2015
232015
A theoretical limit for safety verification techniques with regular fix-point computations
Y Boichut, PC Héam
Information Processing Letters 108 (1), 1-2, 2008
232008
Approximation based tree regular model checking
Y Boichut, PC Héam, O Kouchnarenko
Nordic Journal of Computing 14, 216-241, 2008
232008
Handling algebraic properties in automatic analysis of security protocols
Y Boichut, PC Héam, O Kouchnarenko
International Colloquium on Theoretical Aspects of Computing, 153-167, 2006
232006
A comparison of random task graph generation methods for scheduling problems
LC Canon, ME Sayah, PC Héam
Euro-Par 2019: Parallel Processing: 25th International Conference on …, 2019
222019
Component simulation-based substitutivity managing QoS and composition issues
PC Héam, O Kouchnarenko, J Voinot
Science of Computer Programming 75 (10), 898-917, 2010
162010
Tree automata for detecting attacks on protocols with algebraic cryptographic primitives
Y Boichut, PC Héam, O Kouchnarenko
Electronic Notes in Theoretical Computer Science 239, 57-72, 2009
152009
Seed: An easy-to-use random generator of recursive data structures for testing
PC Héam, C Nicaud
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
142011
Efficiency of automata in semi-commutation verification techniques
G Cécé, PC Héam, Y Mainier
RAIRO-Theoretical Informatics and Applications 42 (2), 197-215, 2008
142008
A lower bound for reversible automata
PC Héam
RAIRO-Theoretical Informatics and Applications 34 (5), 331-341, 2000
142000
Random Walk in a -Cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations
S Contassot-Vivier, JF Couchot, C Guyeux, PC Heam
International Journal of Bifurcation and Chaos 27 (01), 1750014, 2017
132017
Pseudorandom number generators with balanced gray codes
JF Couchot, PC Heam, C Guyeux, Q Wang, JM Bahi
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-7, 2014
132014
How to handle qos aspects in web services substitutivity verification
PC Héam, O Kouchnarenko, J Voinot
16th IEEE International Workshops on Enabling Technologies: Infrastructure …, 2007
132007
Automatic approximation for the verification of cryptographic protocols
Y Boichut, PC Héam, O Kouchnarenko
Proc. AVIS, 2004
132004
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20