Follow
Pierre-Cyrille Heam
Pierre-Cyrille Heam
Université de Franche-Comté, Computer Science
Verified email at femto-st.fr
Title
Cited by
Cited by
Year
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
16192005
Improvements on the Genet and Klay technique to automatically verify security protocols
Y Boichut, PC Héam, O Kouchnarenko, F Oehl
Proc. AVIS 4, 84, 2004
992004
Mutation-based test generation from security protocols in HLPSL
F Dadeau, PC Héam, R Kheddam
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
522011
Automatic verification of security protocols using approximations
Y Boichut, PC Héam, O Kouchnarenko
INRIA, 2005
482005
Efficient and cryptographically secure generation of chaotic pseudorandom numbers on gpu
C Guyeux, R Couturier, PC Héam, JM Bahi
The journal of Supercomputing 71, 3877-3903, 2015
372015
Finer is better: Abstraction refinement for rewriting approximations
Y Boichut, R Courbis, PC Héam, O Kouchnarenko
Rewriting Techniques and Applications: 19th International Conference, RTA …, 2008
302008
A comparison of random task graph generation methods for scheduling problems
LC Canon, ME Sayah, PC Héam
Euro-Par 2019: Parallel Processing: 25th International Conference on …, 2019
272019
Model‐based mutation testing from security protocols in HLPSL
F Dadeau, PC Héam, R Kheddam, G Maatoug, M Rusinowitch
Software Testing, Verification and Reliability 25 (5-7), 684-711, 2015
242015
A theoretical limit for safety verification techniques with regular fix-point computations
Y Boichut, PC Héam
Information Processing Letters 108 (1), 1-2, 2008
242008
Approximation based tree regular model checking
Y Boichut, PC Heam, O Kouchnarenko
Nordic Journal of Computing 14, 216-241, 2008
242008
Handling algebraic properties in automatic analysis of security protocols
Y Boichut, PC Héam, O Kouchnarenko
International Colloquium on Theoretical Aspects of Computing, 153-167, 2006
222006
Component simulation-based substitutivity managing QoS and composition issues
PC Héam, O Kouchnarenko, J Voinot
Science of Computer Programming 75 (10), 898-917, 2010
152010
Tree automata for detecting attacks on protocols with algebraic cryptographic primitives
Y Boichut, PC Héam, O Kouchnarenko
Electronic Notes in Theoretical Computer Science 239, 57-72, 2009
152009
A lower bound for reversible automata
PC Héam
RAIRO-Theoretical Informatics and Applications 34 (5), 331-341, 2000
152000
Seed: An easy-to-use random generator of recursive data structures for testing
PC Héam, C Nicaud
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
142011
On shuffle ideals
PC Héam
RAIRO-Theoretical Informatics and Applications 36 (4), 359-384, 2002
142002
Pseudorandom number generators with balanced gray codes
JF Couchot, PC Heam, C Guyeux, Q Wang, JM Bahi
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-7, 2014
132014
Efficiency of automata in semi-commutation verification techniques
G Cécé, PC Héam, Y Mainier
RAIRO-Theoretical Informatics and Applications 42 (2), 197-215, 2008
132008
How to handle qos aspects in web services substitutivity verification
PC Héam, O Kouchnarenko, J Voinot
16th IEEE International Workshops on Enabling Technologies: Infrastructure …, 2007
132007
Automatic approximation for the verification of cryptographic protocols
Y Boichut, PC Héam, O Kouchnarenko
Proc. AVIS, 2004
132004
The system can't perform the operation now. Try again later.
Articles 1–20