default search action
Boutheina Chetali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j4]Olga Gadyatskaya, Fabio Massacci, Quang Huy Nguyen, Boutheina Chetali:
Load time code validation for mobile phone Java Cards. J. Inf. Secur. Appl. 18(2-3): 108-129 (2013) - [j3]Maria Christofi, Boutheina Chetali, Louis Goubin, David Vigilant:
Formal verification of a CRT-RSA implementation against fault attacks. J. Cryptogr. Eng. 3(3): 157-167 (2013)
2000 – 2009
- 2009
- [j2]Boutheina Chetali, Quang Huy Nguyen:
An automated testing experiment for layered embedded C code. Int. J. Softw. Tools Technol. Transf. 11(3): 175-185 (2009) - [c9]Boutheina Chetali:
Security Testing and Formal Methods for High Levels Certification of Smart Cards. TAP@TOOLS 2009: 1-5 - 2008
- [c8]Boutheina Chetali, Quang Huy Nguyen:
Industrial Use of Formal Methods for a High-Level Security Evaluation. FM 2008: 198-213 - 2006
- [c7]Quang Huy Nguyen, Boutheina Chetali:
Certifying Native Java API by Formal Refinement. CARDIS 2006: 313-328 - [c6]Walid Attiaoui, Mohamed Ben Ahmed, Moncef Tagina, Boutheina Chetali:
Wrapping and Integrating USB Smart Card to Web Based Heterogeneous Medical Databases: Application for the Pathology of Cancer. CCECE 2006: 1403-1408 - 2005
- [c5]June Andronick, Boutheina Chetali, Christine Paulin-Mohring:
Formal Verification of Security Properties of Smart Card Embedded Source Code. FM 2005: 302-317 - 2003
- [c4]June Andronick, Boutheina Chetali, Olivier Ly:
Using Coq to Verify Java Card Applet Isolation Properties. TPHOLs 2003: 335-351
1990 – 1999
- 1998
- [j1]Boutheina Chetali:
Formal Verification of Concurrent Programs Using the Larch Prover. IEEE Trans. Software Eng. 24(1): 46-62 (1998) - 1997
- [c3]Boutheina Chetali, Barbara Heyd:
Formal Verification of Concurrent Programs in LP and in COQ: A Comparative Analysis. TPHOLs 1997: 69-85 - 1996
- [b1]Boutheïna Chetali:
Vérification formelle des systèmes parallèles décrits en UNITY à l'aide d'un outil de démonstration automatique. Henri Poincaré University, Nancy, France, 1996 - 1995
- [c2]Boutheina Chetali, Pierre Lescanne:
Formal Verfication of a Protocol for Communications over Faulty Channels. FORTE 1995: 91-108 - 1992
- [c1]Boutheina Chetali, Pierre Lescanne:
An Exercise in LP: The Proof of a Non Restoring Division Circuit. Larch 1992: 55-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint