default search action
Tigran Avanesov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c12]Georgios Varisteas, Tigran Avanesov, Radu State:
Distributed C++-Python embedding for fast predictions and fast prototyping. DIDL@Middleware 2018: 9-14 - 2017
- [j2]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Intruder deducibility constraints with negation. Decidability and application to secured service compositions. J. Symb. Comput. 80: 4-26 (2017) - [j1]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of general intruder constraints with and without a set constructor. J. Symb. Comput. 80: 27-61 (2017) - 2016
- [c11]Manxing Du, Radu State, Mats Brorsson, Tigran Avanesov:
Behavior profiling for mobile advertising. BDCAT 2016: 302-307 - 2015
- [c10]Tigran Avanesov, Gabriela Gheorghe, Maria Rita Palattella, Miroslaw Kantor, Ciprian P. Popoviciu, Thomas Engel:
Network troubleshooting with SDN-RADAR. IM 2015: 1137-1138 - [c9]Gabriela Gheorghe, Tigran Avanesov, Maria Rita Palattella, Thomas Engel, Ciprian P. Popoviciu:
SDN-RADAR: Network troubleshooting combining user experience and SDN capabilities. NetSoft 2015: 1-5 - 2013
- [c8]Nicolas Louveton, Roderick McCall, Tigran Avanesov, Vincent Koenig, Thomas Engel:
Assessing in-vehicle information systems application in the car: a versatile tool and unified testing platform. AutomotiveUI 2013: 266-269 - [c7]Ioannis P. Chochliouros, Rod McCall, Andrei Popleteev, Tigran Avanesov, Tomas Kamarauskas, Anastasia S. Spiliopoulou, Evangelos Sfakianakis, Evangelia Georgiadou, Nikoletta Liakostavrou, Ioannis Kampourakis, Ioannis M. Stephanakis:
(Semi-) Pervasive Gaming Educational and Entertainment Facilities via Interactive Video-to-Video Communication over the Internet, for Museum Exhibits. AIAI 2013: 474-485 - 2012
- [c6]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Towards the Orchestration of Secured Services under Non-disclosure Policies. MMM-ACNS 2012: 130-145 - [c5]Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea, Sebastian Mödersheim, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - [i2]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Intruder deducibility constraints with negation. Decidability and application to secured service compositions. CoRR abs/1207.4871 (2012) - 2011
- [b1]Tigran Avanesov:
Resolution of constraint systems for automatic composition of security-aware Web Services. (Résolution de contraintes de déductibilité. Application à la composition de services Web sécurisés). Henri Poincaré University, Nancy, France, 2011 - [c4]Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch:
Web Services Verification and Prudent Implementation. DPM/SETOP 2011: 173-189 - [c3]Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch, Mathieu Turuani:
Distributed Orchestration of Web Services under Security Constraints. DPM/SETOP 2011: 235-252 - [i1]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of General Intruder Constraints with and without a Set Constructor. CoRR abs/1103.0220 (2011) - 2010
- [c2]Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani:
Satisfiability of general intruder constraints with a set constructor. CRiSIS 2010: 1-8
2000 – 2009
- 2008
- [c1]Humberto J. Abdelnur, Tigran Avanesov, Michaël Rusinowitch, Radu State:
Abusing SIP Authentication. IAS 2008: 237-242
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint