Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Itsaka Rakotonirina
DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice
Related publications
Deciding Knowledge in Security Protocols Under Some E-Voting Theories
RAIRO - Theoretical Informatics and Applications
Mathematics
Computer Science Applications
Software
Equivalence Properties by Typing in Cryptographic Branching Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Watermarking Security: Theory and Practice
IEEE Transactions on Signal Processing
Electronic Engineering
Signal Processing
Electrical
Deciding Equivalence of Separated Non-Nested Attribute Systems in Polynomial Time
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Compositional Logic for Proving Security Properties of Protocols*
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
Evaluation Theory and Practice as Applied to Security Education
IFIP Advances in Information and Communication Technology
Computer Networks
Information Systems
Management
Communications
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Strong Shift Equivalence Theory and the Shift Equivalence Problem
Bulletin of the American Mathematical Society
Mathematics
Applied Mathematics